{"name":"sysdig","version":"3.5.0","description":"A Pulumi provider dynamically bridged from sysdig.","attribution":"This Pulumi package is based on the [`sysdig` Terraform Provider](https://github.com/sysdiglabs/terraform-provider-sysdig).","repository":"https://github.com/sysdiglabs/terraform-provider-sysdig","publisher":"sysdiglabs","meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"language":{"csharp":{"compatibility":"tfbridge20","liftSingleValueMethodReturns":true,"respectSchemaVersion":true},"go":{"generateExtraInputTypes":true,"importBasePath":"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig","liftSingleValueMethodReturns":true,"respectSchemaVersion":true,"rootPackageName":"sysdig"},"java":{"basePackage":"","buildFiles":"","gradleNexusPublishPluginVersion":"","gradleTest":""},"nodejs":{"compatibility":"tfbridge20","disableUnionOutputTypes":true,"liftSingleValueMethodReturns":true,"packageDescription":"A Pulumi provider dynamically bridged from sysdig.","readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/sysdiglabs/terraform-provider-sysdig)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-sysdig` repo](https://github.com/sysdiglabs/terraform-provider-sysdig/issues).","respectSchemaVersion":true},"python":{"compatibility":"tfbridge20","pyproject":{"enabled":true},"readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/sysdiglabs/terraform-provider-sysdig)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-sysdig` repo](https://github.com/sysdiglabs/terraform-provider-sysdig/issues).","respectSchemaVersion":true}},"config":{"variables":{"extraHeaders":{"type":"object","additionalProperties":{"type":"string"}},"ibmMonitorApiKey":{"type":"string"},"ibmMonitorIamUrl":{"type":"string"},"ibmMonitorInstanceId":{"type":"string"},"ibmSecureApiKey":{"type":"string"},"ibmSecureIamUrl":{"type":"string"},"ibmSecureInstanceId":{"type":"string"},"sysdigMonitorApiToken":{"type":"string","secret":true},"sysdigMonitorInsecureTls":{"type":"boolean"},"sysdigMonitorTeamId":{"type":"number"},"sysdigMonitorTeamName":{"type":"string"},"sysdigMonitorUrl":{"type":"string"},"sysdigSecureApiToken":{"type":"string","secret":true},"sysdigSecureInsecureTls":{"type":"boolean"},"sysdigSecureSkipPolicyv2msg":{"type":"boolean"},"sysdigSecureTeamId":{"type":"number"},"sysdigSecureTeamName":{"type":"string"},"sysdigSecureUrl":{"type":"string"}}},"types":{"sysdig:index/AgentAccessKeyTimeouts:AgentAccessKeyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/CustomRolePermissions:CustomRolePermissions":{"properties":{"monitorPermissions":{"type":"array","items":{"type":"string"},"description":"Set of Monitor permissions assigned to the role. Check GET /api/permissions to get the list of available values\n"},"securePermissions":{"type":"array","items":{"type":"string"},"description":"Set of Secure permissions assigned to the role. Check GET /api/permissions to get the list of available values.\n"}},"type":"object"},"sysdig:index/CustomRoleTimeouts:CustomRoleTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/GroupMappingConfigTimeouts:GroupMappingConfigTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/GroupMappingTeamMap:GroupMappingTeamMap":{"properties":{"allTeams":{"type":"boolean","description":"Flag indicating whether team map should resemble all customer teams.\n"},"teamIds":{"type":"array","items":{"type":"number"},"description":"Set of team IDs, is empty when \u003cspan pulumi-lang-nodejs=\"`allTeams`\" pulumi-lang-dotnet=\"`AllTeams`\" pulumi-lang-go=\"`allTeams`\" pulumi-lang-python=\"`all_teams`\" pulumi-lang-yaml=\"`allTeams`\" pulumi-lang-java=\"`allTeams`\"\u003e`all_teams`\u003c/span\u003e is true, otherwise needs at least 1 element.\n"}},"type":"object"},"sysdig:index/GroupMappingTimeouts:GroupMappingTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2ChangeCapture:MonitorAlertV2ChangeCapture":{"properties":{"durationSeconds":{"type":"number"},"enabled":{"type":"boolean","description":"Boolean that defines if the alert is enabled or not. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string"},"filter":{"type":"string"},"storage":{"type":"string"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2ChangeCustomNotification:MonitorAlertV2ChangeCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCustomNotificationAdditionalField:MonitorAlertV2ChangeCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2ChangeCustomNotificationAdditionalField:MonitorAlertV2ChangeCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2ChangeLink:MonitorAlertV2ChangeLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2ChangeNotificationChannel:MonitorAlertV2ChangeNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean","description":"Whether this notification channel is used for the main threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled. Default: \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e.\n"},"warningThreshold":{"type":"boolean","description":"Whether this notification channel is used for the warning threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2ChangeScope:MonitorAlertV2ChangeScope":{"properties":{"label":{"type":"string","description":"Label in prometheus notation to select a part of the infrastructure.\n"},"operator":{"type":"string","description":"Operator to match the label. It can be \u003cspan pulumi-lang-nodejs=\"`equals`\" pulumi-lang-dotnet=\"`Equals`\" pulumi-lang-go=\"`equals`\" pulumi-lang-python=\"`equals`\" pulumi-lang-yaml=\"`equals`\" pulumi-lang-java=\"`equals`\"\u003e`equals`\u003c/span\u003e, `notEquals`, \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e, `notIn`, \u003cspan pulumi-lang-nodejs=\"`contains`\" pulumi-lang-dotnet=\"`Contains`\" pulumi-lang-go=\"`contains`\" pulumi-lang-python=\"`contains`\" pulumi-lang-yaml=\"`contains`\" pulumi-lang-java=\"`contains`\"\u003e`contains`\u003c/span\u003e, `notContains`, `startsWith`.\n"},"values":{"type":"array","items":{"type":"string"},"description":"List of values to match the scope.\n"}},"type":"object","required":["label","operator","values"]},"sysdig:index/MonitorAlertV2ChangeTimeouts:MonitorAlertV2ChangeTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2DowntimeCapture:MonitorAlertV2DowntimeCapture":{"properties":{"durationSeconds":{"type":"number","description":"Time frame of the capture. Default: \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"Whether to enable captures. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string","description":"Defines the name of the capture file. Must have `.scap` suffix.\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name contains nginx`.\n"},"storage":{"type":"string","description":"Custom bucket where to save the capture.\n"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2DowntimeCustomNotification:MonitorAlertV2DowntimeCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCustomNotificationAdditionalField:MonitorAlertV2DowntimeCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2DowntimeCustomNotificationAdditionalField:MonitorAlertV2DowntimeCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2DowntimeLink:MonitorAlertV2DowntimeLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2DowntimeNotificationChannel:MonitorAlertV2DowntimeNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled. Default: \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e.\n"},"warningThreshold":{"type":"boolean"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2DowntimeScope:MonitorAlertV2DowntimeScope":{"properties":{"label":{"type":"string","description":"Label in prometheus notation to select a part of the infrastructure.\n"},"operator":{"type":"string","description":"Operator to match the label. It can be \u003cspan pulumi-lang-nodejs=\"`equals`\" pulumi-lang-dotnet=\"`Equals`\" pulumi-lang-go=\"`equals`\" pulumi-lang-python=\"`equals`\" pulumi-lang-yaml=\"`equals`\" pulumi-lang-java=\"`equals`\"\u003e`equals`\u003c/span\u003e, `notEquals`, \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e, `notIn`, \u003cspan pulumi-lang-nodejs=\"`contains`\" pulumi-lang-dotnet=\"`Contains`\" pulumi-lang-go=\"`contains`\" pulumi-lang-python=\"`contains`\" pulumi-lang-yaml=\"`contains`\" pulumi-lang-java=\"`contains`\"\u003e`contains`\u003c/span\u003e, `notContains`, `startsWith`.\n"},"values":{"type":"array","items":{"type":"string"},"description":"List of values to match the scope.\n"}},"type":"object","required":["label","operator","values"]},"sysdig:index/MonitorAlertV2DowntimeTimeouts:MonitorAlertV2DowntimeTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2EventCapture:MonitorAlertV2EventCapture":{"properties":{"durationSeconds":{"type":"number","description":"Time frame of the capture. Default: \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"Whether to enable captures. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string","description":"Defines the name of the capture file. Must have `.scap` suffix.\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name contains nginx`.\n"},"storage":{"type":"string","description":"Custom bucket where to save the capture.\n"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2EventCustomNotification:MonitorAlertV2EventCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCustomNotificationAdditionalField:MonitorAlertV2EventCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2EventCustomNotificationAdditionalField:MonitorAlertV2EventCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2EventLink:MonitorAlertV2EventLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2EventNotificationChannel:MonitorAlertV2EventNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean","description":"Whether this notification channel is used for the main threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled. Default: \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e.\n"},"warningThreshold":{"type":"boolean","description":"Whether this notification channel is used for the warning threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2EventScope:MonitorAlertV2EventScope":{"properties":{"label":{"type":"string","description":"Label in prometheus notation to select a part of the infrastructure.\n"},"operator":{"type":"string","description":"Operator to match the label. It can be \u003cspan pulumi-lang-nodejs=\"`equals`\" pulumi-lang-dotnet=\"`Equals`\" pulumi-lang-go=\"`equals`\" pulumi-lang-python=\"`equals`\" pulumi-lang-yaml=\"`equals`\" pulumi-lang-java=\"`equals`\"\u003e`equals`\u003c/span\u003e, `notEquals`, \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e, `notIn`, \u003cspan pulumi-lang-nodejs=\"`contains`\" pulumi-lang-dotnet=\"`Contains`\" pulumi-lang-go=\"`contains`\" pulumi-lang-python=\"`contains`\" pulumi-lang-yaml=\"`contains`\" pulumi-lang-java=\"`contains`\"\u003e`contains`\u003c/span\u003e, `notContains`, `startsWith`.\n"},"values":{"type":"array","items":{"type":"string"},"description":"List of values to match the scope.\n"}},"type":"object","required":["label","operator","values"]},"sysdig:index/MonitorAlertV2EventTimeouts:MonitorAlertV2EventTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2FormBasedPrometheusCapture:MonitorAlertV2FormBasedPrometheusCapture":{"properties":{"durationSeconds":{"type":"number","description":"Specifies the amount of time, in seconds, that an alert condition must remain continuously true before the alert rule is triggered.\n"},"enabled":{"type":"boolean","description":"Boolean that defines if the alert is enabled or not. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string"},"filter":{"type":"string"},"storage":{"type":"string"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2FormBasedPrometheusCustomNotification:MonitorAlertV2FormBasedPrometheusCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCustomNotificationAdditionalField:MonitorAlertV2FormBasedPrometheusCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2FormBasedPrometheusCustomNotificationAdditionalField:MonitorAlertV2FormBasedPrometheusCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2FormBasedPrometheusLink:MonitorAlertV2FormBasedPrometheusLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2FormBasedPrometheusNotificationChannel:MonitorAlertV2FormBasedPrometheusNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean","description":"Whether this notification channel is used for the main threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled.\n"},"warningThreshold":{"type":"boolean","description":"Whether this notification channel is used for the warning threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2FormBasedPrometheusScope:MonitorAlertV2FormBasedPrometheusScope":{"properties":{"label":{"type":"string"},"operator":{"type":"string","description":"Operator for the condition to alert on. It can be `\u003e`, `\u003e=`, `\u003c`, `\u003c=`, `==` or `!=`.\n"},"values":{"type":"array","items":{"type":"string"}}},"type":"object","required":["label","operator","values"]},"sysdig:index/MonitorAlertV2FormBasedPrometheusTimeouts:MonitorAlertV2FormBasedPrometheusTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2GroupOutlierCapture:MonitorAlertV2GroupOutlierCapture":{"properties":{"durationSeconds":{"type":"number","description":"Time frame of the capture. Default: \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"Whether to enable captures. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string","description":"Defines the name of the capture file. Must have `.scap` suffix.\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name contains nginx`.\n"},"storage":{"type":"string","description":"Custom bucket where to save the capture.\n"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2GroupOutlierCustomNotification:MonitorAlertV2GroupOutlierCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCustomNotificationAdditionalField:MonitorAlertV2GroupOutlierCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2GroupOutlierCustomNotificationAdditionalField:MonitorAlertV2GroupOutlierCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2GroupOutlierLink:MonitorAlertV2GroupOutlierLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2GroupOutlierNotificationChannel:MonitorAlertV2GroupOutlierNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean","description":"Whether this notification channel is used for the main threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled. Default: \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e.\n"},"warningThreshold":{"type":"boolean","description":"Whether this notification channel is used for the warning threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2GroupOutlierScope:MonitorAlertV2GroupOutlierScope":{"properties":{"label":{"type":"string","description":"Label in prometheus notation to select a part of the infrastructure.\n"},"operator":{"type":"string","description":"Operator to match the label. It can be \u003cspan pulumi-lang-nodejs=\"`equals`\" pulumi-lang-dotnet=\"`Equals`\" pulumi-lang-go=\"`equals`\" pulumi-lang-python=\"`equals`\" pulumi-lang-yaml=\"`equals`\" pulumi-lang-java=\"`equals`\"\u003e`equals`\u003c/span\u003e, `notEquals`, \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e, `notIn`, \u003cspan pulumi-lang-nodejs=\"`contains`\" pulumi-lang-dotnet=\"`Contains`\" pulumi-lang-go=\"`contains`\" pulumi-lang-python=\"`contains`\" pulumi-lang-yaml=\"`contains`\" pulumi-lang-java=\"`contains`\"\u003e`contains`\u003c/span\u003e, `notContains`, `startsWith`.\n"},"values":{"type":"array","items":{"type":"string"},"description":"List of values to match the scope.\n"}},"type":"object","required":["label","operator","values"]},"sysdig:index/MonitorAlertV2GroupOutlierTimeouts:MonitorAlertV2GroupOutlierTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2MetricCapture:MonitorAlertV2MetricCapture":{"properties":{"durationSeconds":{"type":"number","description":"Time frame of the capture. Default: \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"Whether to enable captures. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string","description":"Defines the name of the capture file. Must have `.scap` suffix.\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name contains nginx`.\n"},"storage":{"type":"string","description":"Custom bucket where to save the capture.\n"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2MetricCustomNotification:MonitorAlertV2MetricCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCustomNotificationAdditionalField:MonitorAlertV2MetricCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2MetricCustomNotificationAdditionalField:MonitorAlertV2MetricCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2MetricLink:MonitorAlertV2MetricLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2MetricNotificationChannel:MonitorAlertV2MetricNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean","description":"Whether this notification channel is used for the main threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled. Default: \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e.\n"},"warningThreshold":{"type":"boolean","description":"Whether this notification channel is used for the warning threshold of the alert. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2MetricScope:MonitorAlertV2MetricScope":{"properties":{"label":{"type":"string","description":"Label in prometheus notation to select a part of the infrastructure.\n"},"operator":{"type":"string","description":"Operator to match the label. It can be \u003cspan pulumi-lang-nodejs=\"`equals`\" pulumi-lang-dotnet=\"`Equals`\" pulumi-lang-go=\"`equals`\" pulumi-lang-python=\"`equals`\" pulumi-lang-yaml=\"`equals`\" pulumi-lang-java=\"`equals`\"\u003e`equals`\u003c/span\u003e, `notEquals`, \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e, `notIn`, \u003cspan pulumi-lang-nodejs=\"`contains`\" pulumi-lang-dotnet=\"`Contains`\" pulumi-lang-go=\"`contains`\" pulumi-lang-python=\"`contains`\" pulumi-lang-yaml=\"`contains`\" pulumi-lang-java=\"`contains`\"\u003e`contains`\u003c/span\u003e, `notContains`, `startsWith`.\n"},"values":{"type":"array","items":{"type":"string"},"description":"List of values to match the scope.\n"}},"type":"object","required":["label","operator","values"]},"sysdig:index/MonitorAlertV2MetricTimeouts:MonitorAlertV2MetricTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorAlertV2PrometheusCapture:MonitorAlertV2PrometheusCapture":{"properties":{"durationSeconds":{"type":"number","description":"Specifies the amount of time, in seconds, that an alert condition must remain continuously true before the alert rule is triggered.\n"},"enabled":{"type":"boolean","description":"Boolean that defines if the alert is enabled or not. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filename":{"type":"string"},"filter":{"type":"string"},"storage":{"type":"string"}},"type":"object","required":["filename"]},"sysdig:index/MonitorAlertV2PrometheusCustomNotification:MonitorAlertV2PrometheusCustomNotification":{"properties":{"additionalFields":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCustomNotificationAdditionalField:MonitorAlertV2PrometheusCustomNotificationAdditionalField"},"description":"Set of additional fields to add to the notification.\n"},"append":{"type":"string","description":"Text to add after the alert template.\n"},"prepend":{"type":"string","description":"Text to add before the alert template.\n"},"subject":{"type":"string","description":"Sets the title of the alert.\n"}},"type":"object"},"sysdig:index/MonitorAlertV2PrometheusCustomNotificationAdditionalField:MonitorAlertV2PrometheusCustomNotificationAdditionalField":{"properties":{"name":{"type":"string","description":"field name.\n"},"value":{"type":"string","description":"field value.\n"}},"type":"object","required":["name","value"]},"sysdig:index/MonitorAlertV2PrometheusLink:MonitorAlertV2PrometheusLink":{"properties":{"href":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e type, url of the external resource.\n"},"id":{"type":"string","description":"When using \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e type, dashboard id. When using `dashboardTemplate` type, the dashboard template id (e.g. `view.promcat.mysql`).\n"},"type":{"type":"string","description":"Type of link. Must be \u003cspan pulumi-lang-nodejs=\"`runbook`\" pulumi-lang-dotnet=\"`Runbook`\" pulumi-lang-go=\"`runbook`\" pulumi-lang-python=\"`runbook`\" pulumi-lang-yaml=\"`runbook`\" pulumi-lang-java=\"`runbook`\"\u003e`runbook`\u003c/span\u003e for generic links, \u003cspan pulumi-lang-nodejs=\"`dashboard`\" pulumi-lang-dotnet=\"`Dashboard`\" pulumi-lang-go=\"`dashboard`\" pulumi-lang-python=\"`dashboard`\" pulumi-lang-yaml=\"`dashboard`\" pulumi-lang-java=\"`dashboard`\"\u003e`dashboard`\u003c/span\u003e for internal links to existing dashboards, or `dashboardTemplate` for links to dashboard templates.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorAlertV2PrometheusNotificationChannel:MonitorAlertV2PrometheusNotificationChannel":{"properties":{"id":{"type":"number","description":"The ID of the notification channel.\n"},"mainThreshold":{"type":"boolean"},"notifyOnAcknowledge":{"type":"string","description":"Whether to send a notification when the alert is acknowledged. If not defined, this option is inherited from the \u003cspan pulumi-lang-nodejs=\"`notifyWhenResolved`\" pulumi-lang-dotnet=\"`NotifyWhenResolved`\" pulumi-lang-go=\"`notifyWhenResolved`\" pulumi-lang-python=\"`notify_when_resolved`\" pulumi-lang-yaml=\"`notifyWhenResolved`\" pulumi-lang-java=\"`notifyWhenResolved`\"\u003e`notify_when_resolved`\u003c/span\u003e option from the specific notification channel selected.\n"},"notifyOnResolve":{"type":"boolean","description":"Whether to send a notification when the alert is resolved. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"renotifyEveryMinutes":{"type":"number","description":"the amount of minutes to wait before re sending the notification to this channel. \u003cspan pulumi-lang-nodejs=\"`0`\" pulumi-lang-dotnet=\"`0`\" pulumi-lang-go=\"`0`\" pulumi-lang-python=\"`0`\" pulumi-lang-yaml=\"`0`\" pulumi-lang-java=\"`0`\"\u003e`0`\u003c/span\u003e means no renotification enabled.\n"},"warningThreshold":{"type":"boolean"}},"type":"object","required":["id"]},"sysdig:index/MonitorAlertV2PrometheusTimeouts:MonitorAlertV2PrometheusTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorCloudAccountTimeouts:MonitorCloudAccountTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorDashboardPanel:MonitorDashboardPanel":{"properties":{"autosizeText":{"type":"boolean","description":"If true, the text will be autosized in the panel.\nThis field is ignored for all panel types except \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e.\n"},"content":{"type":"string","description":"This field is required if the panel type is \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e. It represents the \ntext that will be displayed in the panel.\n"},"description":{"type":"string","description":"Description of the panel.\n"},"height":{"type":"number","description":"Height of the panel. Min value: 1.\n"},"legend":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanelLegend:MonitorDashboardPanelLegend"},"name":{"type":"string","description":"Name of the panel.\n"},"posX":{"type":"number","description":"Position of the panel in the X axis. Min value: 0, max value: 23.\n"},"posY":{"type":"number","description":"Position of the panel in the Y axis. Min value: 0.\n"},"queries":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanelQuery:MonitorDashboardPanelQuery"},"description":"The PromQL query that will show information in the panel. \nIf the type of the panel is \u003cspan pulumi-lang-nodejs=\"`timechart`\" pulumi-lang-dotnet=\"`Timechart`\" pulumi-lang-go=\"`timechart`\" pulumi-lang-python=\"`timechart`\" pulumi-lang-yaml=\"`timechart`\" pulumi-lang-java=\"`timechart`\"\u003e`timechart`\u003c/span\u003e, then it can be specified multiple\ntimes, to have multiple metrics in the same graph.\nIf the type of the panel is \u003cspan pulumi-lang-nodejs=\"`number`\" pulumi-lang-dotnet=\"`Number`\" pulumi-lang-go=\"`number`\" pulumi-lang-python=\"`number`\" pulumi-lang-yaml=\"`number`\" pulumi-lang-java=\"`number`\"\u003e`number`\u003c/span\u003e then only one can be specified.\nThis field is required if the panel type is \u003cspan pulumi-lang-nodejs=\"`timechart`\" pulumi-lang-dotnet=\"`Timechart`\" pulumi-lang-go=\"`timechart`\" pulumi-lang-python=\"`timechart`\" pulumi-lang-yaml=\"`timechart`\" pulumi-lang-java=\"`timechart`\"\u003e`timechart`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`number`\" pulumi-lang-dotnet=\"`Number`\" pulumi-lang-go=\"`number`\" pulumi-lang-python=\"`number`\" pulumi-lang-yaml=\"`number`\" pulumi-lang-java=\"`number`\"\u003e`number`\u003c/span\u003e.\n"},"transparentBackground":{"type":"boolean","description":"If true, the panel will have a transparent background.\nThis field is ignored for all panel types except \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e.\n"},"type":{"type":"string","description":"Kind of panel, must be either \u003cspan pulumi-lang-nodejs=\"`timechart`\" pulumi-lang-dotnet=\"`Timechart`\" pulumi-lang-go=\"`timechart`\" pulumi-lang-python=\"`timechart`\" pulumi-lang-yaml=\"`timechart`\" pulumi-lang-java=\"`timechart`\"\u003e`timechart`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`number`\" pulumi-lang-dotnet=\"`Number`\" pulumi-lang-go=\"`number`\" pulumi-lang-python=\"`number`\" pulumi-lang-yaml=\"`number`\" pulumi-lang-java=\"`number`\"\u003e`number`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e.\n"},"visibleTitle":{"type":"boolean","description":"If true, the title of the panel will be displayed. Default: false.\nThis field is ignored for all panel types except \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e.\n"},"width":{"type":"number","description":"Width of the panel. Min value: 1, max value: 24.\n"}},"type":"object","required":["height","name","posX","posY","type","width"]},"sysdig:index/MonitorDashboardPanelLegend:MonitorDashboardPanelLegend":{"properties":{"enabled":{"type":"boolean","description":"Whether to display the legend for the panel. Default: true.\n"},"layout":{"type":"string","description":"Legend display layout. Can be one of: \u003cspan pulumi-lang-nodejs=\"`table`\" pulumi-lang-dotnet=\"`Table`\" pulumi-lang-go=\"`table`\" pulumi-lang-python=\"`table`\" pulumi-lang-yaml=\"`table`\" pulumi-lang-java=\"`table`\"\u003e`table`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`inline`\" pulumi-lang-dotnet=\"`Inline`\" pulumi-lang-go=\"`inline`\" pulumi-lang-python=\"`inline`\" pulumi-lang-yaml=\"`inline`\" pulumi-lang-java=\"`inline`\"\u003e`inline`\u003c/span\u003e.\n"},"position":{"type":"string","description":"Positioning of the legend related to the panel data. Can be one of: \u003cspan pulumi-lang-nodejs=\"`bottom`\" pulumi-lang-dotnet=\"`Bottom`\" pulumi-lang-go=\"`bottom`\" pulumi-lang-python=\"`bottom`\" pulumi-lang-yaml=\"`bottom`\" pulumi-lang-java=\"`bottom`\"\u003e`bottom`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`right`\" pulumi-lang-dotnet=\"`Right`\" pulumi-lang-go=\"`right`\" pulumi-lang-python=\"`right`\" pulumi-lang-yaml=\"`right`\" pulumi-lang-java=\"`right`\"\u003e`right`\u003c/span\u003e.\n"},"showCurrent":{"type":"boolean","description":"Whether to display the most recent datapoint value in the legend.\n"}},"type":"object","required":["layout","position","showCurrent"]},"sysdig:index/MonitorDashboardPanelQuery:MonitorDashboardPanelQuery":{"properties":{"displayInfos":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanelQueryDisplayInfo:MonitorDashboardPanelQueryDisplayInfo"},"description":"Configure the time series display visualization for the selected query.\n\nNested scheme for \u003cspan pulumi-lang-nodejs=\"`displayInfo`\" pulumi-lang-dotnet=\"`DisplayInfo`\" pulumi-lang-go=\"`displayInfo`\" pulumi-lang-python=\"`display_info`\" pulumi-lang-yaml=\"`displayInfo`\" pulumi-lang-java=\"`displayInfo`\"\u003e`display_info`\u003c/span\u003e:\n"},"format":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanelQueryFormat:MonitorDashboardPanelQueryFormat","description":"Configure query formatting. It's optional due to backward compatibility. If no format block is provided, default one will be used.\n\nNested scheme for \u003cspan pulumi-lang-nodejs=\"`format`\" pulumi-lang-dotnet=\"`Format`\" pulumi-lang-go=\"`format`\" pulumi-lang-python=\"`format`\" pulumi-lang-yaml=\"`format`\" pulumi-lang-java=\"`format`\"\u003e`format`\u003c/span\u003e:\n"},"promql":{"type":"string","description":"The PromQL query. Must be a valid PromQL query with existing\nmetrics in Sysdig Monitor.\n"},"unit":{"type":"string","description":"The type of metric for this query. Can be one of: \u003cspan pulumi-lang-nodejs=\"`percent`\" pulumi-lang-dotnet=\"`Percent`\" pulumi-lang-go=\"`percent`\" pulumi-lang-python=\"`percent`\" pulumi-lang-yaml=\"`percent`\" pulumi-lang-java=\"`percent`\"\u003e`percent`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`data`\" pulumi-lang-dotnet=\"`Data`\" pulumi-lang-go=\"`data`\" pulumi-lang-python=\"`data`\" pulumi-lang-yaml=\"`data`\" pulumi-lang-java=\"`data`\"\u003e`data`\u003c/span\u003e, `data rate`, \n\u003cspan pulumi-lang-nodejs=\"`number`\" pulumi-lang-dotnet=\"`Number`\" pulumi-lang-go=\"`number`\" pulumi-lang-python=\"`number`\" pulumi-lang-yaml=\"`number`\" pulumi-lang-java=\"`number`\"\u003e`number`\u003c/span\u003e, `number rate`, \u003cspan pulumi-lang-nodejs=\"`time`\" pulumi-lang-dotnet=\"`Time`\" pulumi-lang-go=\"`time`\" pulumi-lang-python=\"`time`\" pulumi-lang-yaml=\"`time`\" pulumi-lang-java=\"`time`\"\u003e`time`\u003c/span\u003e.\n"}},"type":"object","required":["promql","unit"]},"sysdig:index/MonitorDashboardPanelQueryDisplayInfo:MonitorDashboardPanelQueryDisplayInfo":{"properties":{"displayName":{"type":"string","description":"Configure the query display name summary, the text will appears as a title for the legend.\n"},"timeSeriesDisplayNameTemplate":{"type":"string","description":"Configure the display name of the time series for the query using text and any label values returned with the metric. For example: `CPU usage % for {{host}}`.\n"},"type":{"type":"string","description":"Configure the visualization type in the timechart, can be \u003cspan pulumi-lang-nodejs=\"`lines`\" pulumi-lang-dotnet=\"`Lines`\" pulumi-lang-go=\"`lines`\" pulumi-lang-python=\"`lines`\" pulumi-lang-yaml=\"`lines`\" pulumi-lang-java=\"`lines`\"\u003e`lines`\u003c/span\u003e, `stackedArea`, `stackedBar`\n"}},"type":"object","required":["timeSeriesDisplayNameTemplate","type"]},"sysdig:index/MonitorDashboardPanelQueryFormat:MonitorDashboardPanelQueryFormat":{"properties":{"decimals":{"type":"number","description":"Max number of decimals to be displayed for each datapoint.\n"},"displayFormat":{"type":"string","description":"Overrides display data format, must match the selected input unit. 'auto' is allowed and default. For example: `KiB`\n"},"inputFormat":{"type":"string","description":"Input data format, must match the selected input unit. 'auto' is not allowed except for dashboard libraries. For example: `MiB`\n"},"minInterval":{"type":"string","description":"Minimum interval to be used as a replacement of the $__interval variable in PromQL queries. For example: \u003cspan pulumi-lang-nodejs=\"`60s`\" pulumi-lang-dotnet=\"`60s`\" pulumi-lang-go=\"`60s`\" pulumi-lang-python=\"`60s`\" pulumi-lang-yaml=\"`60s`\" pulumi-lang-java=\"`60s`\"\u003e`60s`\u003c/span\u003e\n"},"nullValueDisplayMode":{"type":"string","description":"Defines the timechart behavior for missing data points. For example: `nullGap`\n"},"yAxis":{"type":"string","description":"Selects which YAxis to be used for displaying over a timechart.\n"}},"type":"object","required":["displayFormat","inputFormat","yAxis"]},"sysdig:index/MonitorDashboardScope:MonitorDashboardScope":{"properties":{"comparator":{"type":"string","description":"Operator to relate the metric with some value. It is only required if the value to filter by is set, or the variable field is not set. Valid values are: \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e, `notIn`, \u003cspan pulumi-lang-nodejs=\"`equals`\" pulumi-lang-dotnet=\"`Equals`\" pulumi-lang-go=\"`equals`\" pulumi-lang-python=\"`equals`\" pulumi-lang-yaml=\"`equals`\" pulumi-lang-java=\"`equals`\"\u003e`equals`\u003c/span\u003e, `notEquals`, \u003cspan pulumi-lang-nodejs=\"`contains`\" pulumi-lang-dotnet=\"`Contains`\" pulumi-lang-go=\"`contains`\" pulumi-lang-python=\"`contains`\" pulumi-lang-yaml=\"`contains`\" pulumi-lang-java=\"`contains`\"\u003e`contains`\u003c/span\u003e, `notContains` and `startsWith`.\n"},"metric":{"type":"string","description":"Metric to scope by, common examples are `host.hostName`, `kubernetes.namespace.name` or `kubernetes.cluster.name`, but you can use all the Sysdig-supported values shown in the UI. Note that kubernetes-related values only appear when Sysdig detects Kubernetes metadata.\n"},"values":{"type":"array","items":{"type":"string"},"description":"List of values to filter by, if comparator is set. If the comparator is not \u003cspan pulumi-lang-nodejs=\"`in`\" pulumi-lang-dotnet=\"`In`\" pulumi-lang-go=\"`in`\" pulumi-lang-python=\"`in`\" pulumi-lang-yaml=\"`in`\" pulumi-lang-java=\"`in`\"\u003e`in`\u003c/span\u003e or `notIn` the list must contain only 1 value.\n"},"variable":{"type":"string","description":"Assigns this metric to a value name and allows PromQL to reference it.\n"}},"type":"object","required":["metric"]},"sysdig:index/MonitorDashboardShare:MonitorDashboardShare":{"properties":{"member":{"$ref":"#/types/sysdig:index%2FMonitorDashboardShareMember:MonitorDashboardShareMember","description":"The team with which to share the dashboard.\n\nNested scheme for \u003cspan pulumi-lang-nodejs=\"`member`\" pulumi-lang-dotnet=\"`Member`\" pulumi-lang-go=\"`member`\" pulumi-lang-python=\"`member`\" pulumi-lang-yaml=\"`member`\" pulumi-lang-java=\"`member`\"\u003e`member`\u003c/span\u003e:\n"},"role":{"type":"string","description":"The role to grant to the team.\n"}},"type":"object","required":["member","role"]},"sysdig:index/MonitorDashboardShareMember:MonitorDashboardShareMember":{"properties":{"id":{"type":"number","description":"ID of member.\n"},"type":{"type":"string","description":"Type of member.\n"}},"type":"object","required":["id","type"]},"sysdig:index/MonitorDashboardTimeouts:MonitorDashboardTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorInhibitionRuleSourceMatcher:MonitorInhibitionRuleSourceMatcher":{"properties":{"labelName":{"type":"string","description":"Label to match.\n"},"operator":{"type":"string","description":"Match operator. It can be `EQUALS`, `NOT_EQUALS`, `REGEXP_MATCHES`, `NOT_REGEXP_MATCHES`.\n"},"value":{"type":"string","description":"Label value to match in case operator is of type equality, or a valid regular expression in case of operator is of type regex.\n"}},"type":"object","required":["labelName","operator","value"]},"sysdig:index/MonitorInhibitionRuleTargetMatcher:MonitorInhibitionRuleTargetMatcher":{"properties":{"labelName":{"type":"string","description":"Label to match.\n"},"operator":{"type":"string","description":"Match operator. It can be `EQUALS`, `NOT_EQUALS`, `REGEXP_MATCHES`, `NOT_REGEXP_MATCHES`.\n"},"value":{"type":"string","description":"Label value to match in case \u003cspan pulumi-lang-nodejs=\"`operator`\" pulumi-lang-dotnet=\"`Operator`\" pulumi-lang-go=\"`operator`\" pulumi-lang-python=\"`operator`\" pulumi-lang-yaml=\"`operator`\" pulumi-lang-java=\"`operator`\"\u003e`operator`\u003c/span\u003e is of type equality, or regular expression in case of \u003cspan pulumi-lang-nodejs=\"`operator`\" pulumi-lang-dotnet=\"`Operator`\" pulumi-lang-go=\"`operator`\" pulumi-lang-python=\"`operator`\" pulumi-lang-yaml=\"`operator`\" pulumi-lang-java=\"`operator`\"\u003e`operator`\u003c/span\u003e is of type regex.\n"}},"type":"object","required":["labelName","operator","value"]},"sysdig:index/MonitorInhibitionRuleTimeouts:MonitorInhibitionRuleTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelCustomWebhookTimeouts:MonitorNotificationChannelCustomWebhookTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelEmailTimeouts:MonitorNotificationChannelEmailTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelGoogleChatTimeouts:MonitorNotificationChannelGoogleChatTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelIbmEventNotificationTimeouts:MonitorNotificationChannelIbmEventNotificationTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelMsteamsTimeouts:MonitorNotificationChannelMsteamsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelOpsgenieTimeouts:MonitorNotificationChannelOpsgenieTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelPagerdutyTimeouts:MonitorNotificationChannelPagerdutyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelPrometheusAlertManagerTimeouts:MonitorNotificationChannelPrometheusAlertManagerTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelSlackTimeouts:MonitorNotificationChannelSlackTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelSnsTimeouts:MonitorNotificationChannelSnsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelTeamEmailTimeouts:MonitorNotificationChannelTeamEmailTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelVictoropsTimeouts:MonitorNotificationChannelVictoropsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorNotificationChannelWebhookTimeouts:MonitorNotificationChannelWebhookTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorSilenceRuleTimeouts:MonitorSilenceRuleTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorTeamEntrypoint:MonitorTeamEntrypoint":{"properties":{"selection":{"type":"string","description":"Sets up the defined Dashboard name as entrypoint.\nWarning: This field must only be added if the \u003cspan pulumi-lang-nodejs=\"`type`\" pulumi-lang-dotnet=\"`Type`\" pulumi-lang-go=\"`type`\" pulumi-lang-python=\"`type`\" pulumi-lang-yaml=\"`type`\" pulumi-lang-java=\"`type`\"\u003e`type`\u003c/span\u003e is `Dashboards`, and the value is the numeric id of the selected dashboard, or `DashboardTemplates`, and the value is the id (dotted name) of the selected dashboard template.\n"},"type":{"type":"string","description":"Main entrypoint for the team.\nValid options are: `Explore`, `Dashboards`, `Events`, `Alerts`, `Settings`, `DashboardTemplates`, `Advisor`.\n"}},"type":"object","required":["type"]},"sysdig:index/MonitorTeamTimeouts:MonitorTeamTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/MonitorTeamUserRole:MonitorTeamUserRole":{"properties":{"email":{"type":"string","description":"The email of the user in the group.\n"},"role":{"type":"string","description":"The role for the user in this group.\nValid roles are: `ROLE_TEAM_STANDARD`, `ROLE_TEAM_EDIT`, `ROLE_TEAM_READ`, `ROLE_TEAM_MANAGER` or CustomRole ID.\u003cbr/\u003e\nDefault: `ROLE_TEAM_STANDARD`.\u003cbr/\u003e\nNote: CustomRole ID can be referenced from \u003cspan pulumi-lang-nodejs=\"`sysdig.CustomRole`\" pulumi-lang-dotnet=\"`sysdig.CustomRole`\" pulumi-lang-go=\"`CustomRole`\" pulumi-lang-python=\"`CustomRole`\" pulumi-lang-yaml=\"`sysdig.CustomRole`\" pulumi-lang-java=\"`sysdig.CustomRole`\"\u003e`sysdig.CustomRole`\u003c/span\u003e resource or \u003cspan pulumi-lang-nodejs=\"`sysdig.CustomRole`\" pulumi-lang-dotnet=\"`sysdig.CustomRole`\" pulumi-lang-go=\"`CustomRole`\" pulumi-lang-python=\"`CustomRole`\" pulumi-lang-yaml=\"`sysdig.CustomRole`\" pulumi-lang-java=\"`sysdig.CustomRole`\"\u003e`sysdig.CustomRole`\u003c/span\u003e data source\n"}},"type":"object","required":["email"]},"sysdig:index/SecureAwsMlPolicyRule:SecureAwsMlPolicyRule":{"properties":{"anomalousConsoleLogin":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyRuleAnomalousConsoleLogin:SecureAwsMlPolicyRuleAnomalousConsoleLogin","description":"(Required) This attribute allows you to activate anomaly detection for console logins and adjust its settings.\n"},"description":{"type":"string","description":"(Required) Rule description.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"version":{"type":"number"}},"type":"object","required":["description"],"language":{"nodejs":{"requiredOutputs":["description","id","name","tags","version"]}}},"sysdig:index/SecureAwsMlPolicyRuleAnomalousConsoleLogin:SecureAwsMlPolicyRuleAnomalousConsoleLogin":{"properties":{"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"threshold":{"type":"number","description":"(Required) Trigger at or above confidence level. Valid values are: 1 (Default), 2 (High), 3 (Higher).\n"}},"type":"object","required":["threshold"]},"sysdig:index/SecureAwsMlPolicyTimeouts:SecureAwsMlPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureCloudAuthAccountComponent:SecureCloudAuthAccountComponent":{"properties":{"cloudConnectorMetadata":{"type":"string"},"cloudLogsMetadata":{"type":"string"},"cloudResponderMetadata":{"type":"string","description":"Configuration metadata for the Cloud Responder component (type `COMPONENT_CLOUD_RESPONDER`). Used with the Response Actions feature to specify Lambda functions and IAM roles for automated response capabilities.\n"},"cloudResponderRolesMetadata":{"type":"string","description":"Configuration metadata for the Cloud Responder Roles component (type `COMPONENT_CLOUD_RESPONDER_ROLES`). Defines the IAM roles that the cloud responder can assume when executing response actions.\n"},"cryptoKeyMetadata":{"type":"string"},"eventBridgeMetadata":{"type":"string"},"instance":{"type":"string"},"servicePrincipalMetadata":{"type":"string"},"trustedRoleMetadata":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"},"webhookDatasourceMetadata":{"type":"string"}},"type":"object","required":["instance","type"]},"sysdig:index/SecureCloudAuthAccountComponentTimeouts:SecureCloudAuthAccountComponentTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureCloudAuthAccountFeature:SecureCloudAuthAccountFeature":{"properties":{"monitorCloudMetrics":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureMonitorCloudMetric:SecureCloudAuthAccountFeatureMonitorCloudMetric"}},"secureAgentlessScannings":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureSecureAgentlessScanning:SecureCloudAuthAccountFeatureSecureAgentlessScanning"}},"secureConfigPostures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureSecureConfigPosture:SecureCloudAuthAccountFeatureSecureConfigPosture"}},"secureIdentityEntitlements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureSecureIdentityEntitlement:SecureCloudAuthAccountFeatureSecureIdentityEntitlement"}},"secureResponseActions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureSecureResponseAction:SecureCloudAuthAccountFeatureSecureResponseAction"}},"secureThreatDetections":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureSecureThreatDetection:SecureCloudAuthAccountFeatureSecureThreatDetection"}}},"type":"object"},"sysdig:index/SecureCloudAuthAccountFeatureMonitorCloudMetric:SecureCloudAuthAccountFeatureMonitorCloudMetric":{"properties":{"components":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"type":{"type":"string"}},"type":"object","required":["enabled"],"language":{"nodejs":{"requiredOutputs":["enabled","type"]}}},"sysdig:index/SecureCloudAuthAccountFeatureSecureAgentlessScanning:SecureCloudAuthAccountFeatureSecureAgentlessScanning":{"properties":{"components":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"type":{"type":"string"}},"type":"object","required":["enabled"],"language":{"nodejs":{"requiredOutputs":["enabled","type"]}}},"sysdig:index/SecureCloudAuthAccountFeatureSecureConfigPosture:SecureCloudAuthAccountFeatureSecureConfigPosture":{"properties":{"components":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"type":{"type":"string"}},"type":"object","required":["enabled"],"language":{"nodejs":{"requiredOutputs":["enabled","type"]}}},"sysdig:index/SecureCloudAuthAccountFeatureSecureIdentityEntitlement:SecureCloudAuthAccountFeatureSecureIdentityEntitlement":{"properties":{"components":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"type":{"type":"string"}},"type":"object","required":["enabled"],"language":{"nodejs":{"requiredOutputs":["enabled","type"]}}},"sysdig:index/SecureCloudAuthAccountFeatureSecureResponseAction:SecureCloudAuthAccountFeatureSecureResponseAction":{"properties":{"components":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"type":{"type":"string"}},"type":"object","required":["enabled"],"language":{"nodejs":{"requiredOutputs":["enabled","type"]}}},"sysdig:index/SecureCloudAuthAccountFeatureSecureThreatDetection:SecureCloudAuthAccountFeatureSecureThreatDetection":{"properties":{"components":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"type":{"type":"string"}},"type":"object","required":["enabled"],"language":{"nodejs":{"requiredOutputs":["enabled","type"]}}},"sysdig:index/SecureCloudAuthAccountFeatureTimeouts:SecureCloudAuthAccountFeatureTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureCloudAuthAccountTimeouts:SecureCloudAuthAccountTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureCustomPolicyAction:SecureCustomPolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyActionCapture:SecureCustomPolicyActionCapture"},"description":"Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"killProcess":{"type":"boolean","description":"Whether to kill the process that triggered the rule.\nIf this is not specified,\nno action will be applied at the process level.\n"}},"type":"object"},"sysdig:index/SecureCustomPolicyActionCapture:SecureCustomPolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n\n- - -\n"},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"secondsAfterEvent":{"type":"number","description":"Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["name","secondsAfterEvent","secondsBeforeEvent"]},"sysdig:index/SecureCustomPolicyRule:SecureCustomPolicyRule":{"properties":{"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"}},"type":"object","required":["name"]},"sysdig:index/SecureCustomPolicyTimeouts:SecureCustomPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureDriftPolicyAction:SecureDriftPolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyActionCapture:SecureDriftPolicyActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"preventDrift":{"type":"boolean","description":"(Optional) Prevent the execution of drifted binaries and specified prohibited binaries.\n"}},"type":"object"},"sysdig:index/SecureDriftPolicyActionCapture:SecureDriftPolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["name","secondsAfterEvent","secondsBeforeEvent"]},"sysdig:index/SecureDriftPolicyRule:SecureDriftPolicyRule":{"properties":{"description":{"type":"string","description":"(Required) The description of the drift rule.\n"},"enabled":{"type":"boolean","description":"(Required) Toggle to dynamically detect execution of drifted binaries. A drifted binary is any binary that was not part of the original image of the container. It is typically downloaded or compiled into a running container.\n"},"exceptions":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRuleExceptions:SecureDriftPolicyRuleExceptions","description":"(Optional) Specify comma separated list of exceptions.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"mountedVolumeDriftEnabled":{"type":"boolean","description":"(Optional) Treat all binaries from mounted volumes as drifted. Default value is false/disabled.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"processBasedExceptions":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRuleProcessBasedExceptions:SecureDriftPolicyRuleProcessBasedExceptions","description":"(Optional) List of processes that will be able to execute a drifted file\n"},"processBasedProhibitedBinaries":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRuleProcessBasedProhibitedBinaries:SecureDriftPolicyRuleProcessBasedProhibitedBinaries","description":"(Optional) List of processes that will be prohibited to execute a drifted file\n"},"prohibitedBinaries":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRuleProhibitedBinaries:SecureDriftPolicyRuleProhibitedBinaries","description":"(Optional) A prohibited binary can be a known harmful binary or one that facilitates discovery of your environment.\n"},"tags":{"type":"array","items":{"type":"string"}},"useRegex":{"type":"boolean","description":"(Optional) Pass exceptions and prohibited binaries as regex strings. Requires agent version 13.2.0 and above\n"},"version":{"type":"number"}},"type":"object","required":["description"],"language":{"nodejs":{"requiredOutputs":["description","id","name","tags","version"]}}},"sysdig:index/SecureDriftPolicyRuleExceptions:SecureDriftPolicyRuleExceptions":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items"],"language":{"nodejs":{"requiredOutputs":["items","matchItems"]}}},"sysdig:index/SecureDriftPolicyRuleProcessBasedExceptions:SecureDriftPolicyRuleProcessBasedExceptions":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items"],"language":{"nodejs":{"requiredOutputs":["items","matchItems"]}}},"sysdig:index/SecureDriftPolicyRuleProcessBasedProhibitedBinaries:SecureDriftPolicyRuleProcessBasedProhibitedBinaries":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items"],"language":{"nodejs":{"requiredOutputs":["items","matchItems"]}}},"sysdig:index/SecureDriftPolicyRuleProhibitedBinaries:SecureDriftPolicyRuleProhibitedBinaries":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items"],"language":{"nodejs":{"requiredOutputs":["items","matchItems"]}}},"sysdig:index/SecureDriftPolicyTimeouts:SecureDriftPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureListTimeouts:SecureListTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureMacroTimeouts:SecureMacroTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureMalwarePolicyAction:SecureMalwarePolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyActionCapture:SecureMalwarePolicyActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"preventMalware":{"type":"boolean","description":"(Optional) Prevent the execution of detected malware and binaries with known hashes.\n"}},"type":"object"},"sysdig:index/SecureMalwarePolicyActionCapture:SecureMalwarePolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["name","secondsAfterEvent","secondsBeforeEvent"]},"sysdig:index/SecureMalwarePolicyRule:SecureMalwarePolicyRule":{"properties":{"additionalHashes":{"type":"array","items":{"type":"string"},"description":"(Optional) List of additional hashes that should be matched.\n"},"description":{"type":"string","description":"(Required) The description of the malware rule.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"ignoreHashes":{"type":"array","items":{"type":"string"},"description":"(Optional) List of hashes that should be ignored.\n"},"ignorePaths":{"type":"array","items":{"type":"string"},"description":"(Optional) The list of file paths to be excluded from malware matching\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"useManagedHashes":{"type":"boolean","description":"(Required) Should Sysdig's managed hashes be used? The possible values are \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"useRegex":{"type":"boolean","description":"(Optional) Should use regex for\u003cspan pulumi-lang-nodejs=\" ignorePaths \" pulumi-lang-dotnet=\" IgnorePaths \" pulumi-lang-go=\" ignorePaths \" pulumi-lang-python=\" ignore_paths \" pulumi-lang-yaml=\" ignorePaths \" pulumi-lang-java=\" ignorePaths \"\u003e ignore_paths \u003c/span\u003ematching? The possible values are \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"useYaraRules":{"type":"boolean","description":"(Optional) Should use Sysdig's managed YARA rules to detect malware and malicious scripts? The possible values are \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"version":{"type":"number"}},"type":"object","required":["description"],"language":{"nodejs":{"requiredOutputs":["description","id","name","tags","version"]}}},"sysdig:index/SecureMalwarePolicyTimeouts:SecureMalwarePolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureManagedPolicyAction:SecureManagedPolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyActionCapture:SecureManagedPolicyActionCapture"},"description":"Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"killProcess":{"type":"boolean"}},"type":"object"},"sysdig:index/SecureManagedPolicyActionCapture:SecureManagedPolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n\n- - -\n"},"name":{"type":"string","description":"The name of the Secure managed policy. It must match the name of an existing managed policy.\n"},"secondsAfterEvent":{"type":"number","description":"Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["name","secondsAfterEvent","secondsBeforeEvent"]},"sysdig:index/SecureManagedPolicyTimeouts:SecureManagedPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureManagedRulesetAction:SecureManagedRulesetAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetActionCapture:SecureManagedRulesetActionCapture"},"description":"Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"killProcess":{"type":"boolean"}},"type":"object"},"sysdig:index/SecureManagedRulesetActionCapture:SecureManagedRulesetActionCapture":{"properties":{"bucketName":{"type":"string","description":"Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n\n- - -\n"},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"secondsAfterEvent":{"type":"number","description":"Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["name","secondsAfterEvent","secondsBeforeEvent"]},"sysdig:index/SecureManagedRulesetInheritedFrom:SecureManagedRulesetInheritedFrom":{"properties":{"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"}},"type":"object","required":["name"]},"sysdig:index/SecureManagedRulesetTimeouts:SecureManagedRulesetTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureMlPolicyRule:SecureMlPolicyRule":{"properties":{"cryptominingTrigger":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyRuleCryptominingTrigger:SecureMlPolicyRuleCryptominingTrigger","description":"(Required) Cryptomining detection: Detect unusual activity in the Activity Audit based on the set confidence level.\n"},"description":{"type":"string","description":"(Required) Rule description.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"version":{"type":"number"}},"type":"object","required":["description"],"language":{"nodejs":{"requiredOutputs":["description","id","name","tags","version"]}}},"sysdig:index/SecureMlPolicyRuleCryptominingTrigger:SecureMlPolicyRuleCryptominingTrigger":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"threshold":{"type":"number","description":"(Required) Trigger at or above confidence level. Accepted values are 3 (Highest), 2 (Higher), 1 (Default)\n"}},"type":"object","required":["threshold"]},"sysdig:index/SecureMlPolicyTimeouts:SecureMlPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelEmailTimeouts:SecureNotificationChannelEmailTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelMsteamsTimeouts:SecureNotificationChannelMsteamsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelOpsgenieTimeouts:SecureNotificationChannelOpsgenieTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelPagerdutyTimeouts:SecureNotificationChannelPagerdutyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelPrometheusAlertManagerTimeouts:SecureNotificationChannelPrometheusAlertManagerTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelSlackTimeouts:SecureNotificationChannelSlackTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelSnsTimeouts:SecureNotificationChannelSnsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelTeamEmailTimeouts:SecureNotificationChannelTeamEmailTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelVictoropsTimeouts:SecureNotificationChannelVictoropsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureNotificationChannelWebhookTimeouts:SecureNotificationChannelWebhookTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureOktaMlPolicyRule:SecureOktaMlPolicyRule":{"properties":{"anomalousConsoleLogin":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyRuleAnomalousConsoleLogin:SecureOktaMlPolicyRuleAnomalousConsoleLogin","description":"(Required) This attribute allows you to activate anomaly detection for logins and adjust its settings.\n"},"description":{"type":"string","description":"(Required) Rule description.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"version":{"type":"number"}},"type":"object","required":["description"],"language":{"nodejs":{"requiredOutputs":["description","id","name","tags","version"]}}},"sysdig:index/SecureOktaMlPolicyRuleAnomalousConsoleLogin:SecureOktaMlPolicyRuleAnomalousConsoleLogin":{"properties":{"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"threshold":{"type":"number","description":"(Required) Trigger at or above confidence level. Valid values are: 1 (Default), 2 (High), 3 (Higher).\n"}},"type":"object","required":["threshold"]},"sysdig:index/SecureOktaMlPolicyTimeouts:SecureOktaMlPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureOrganizationTimeouts:SecureOrganizationTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecurePostureAcceptRiskTimeouts:SecurePostureAcceptRiskTimeouts":{"properties":{"create":{"type":"string"}},"type":"object"},"sysdig:index/SecurePostureControlTimeouts:SecurePostureControlTimeouts":{"properties":{"create":{"type":"string"}},"type":"object"},"sysdig:index/SecurePosturePolicyGroup:SecurePosturePolicyGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroup:SecurePosturePolicyGroupGroup"},"description":"Group block defines list of groups attached to Policy\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupRequirement:SecurePosturePolicyGroupRequirement"}}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroup:SecurePosturePolicyGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroup:SecurePosturePolicyGroupGroupGroup"},"description":"Group block defines list of groups attached to Policy\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupRequirement:SecurePosturePolicyGroupGroupRequirement"}}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroup:SecurePosturePolicyGroupGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupGroup:SecurePosturePolicyGroupGroupGroupGroup"},"description":"Group block defines list of groups attached to Policy\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupRequirement:SecurePosturePolicyGroupGroupGroupRequirement"}}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroupGroup:SecurePosturePolicyGroupGroupGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupGroupGroup:SecurePosturePolicyGroupGroupGroupGroupGroup"},"description":"Group block defines list of groups attached to Policy\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupGroupRequirement:SecurePosturePolicyGroupGroupGroupGroupRequirement"}}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroupGroupGroup:SecurePosturePolicyGroupGroupGroupGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupGroupGroupRequirement:SecurePosturePolicyGroupGroupGroupGroupGroupRequirement"}}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroupGroupGroupRequirement:SecurePosturePolicyGroupGroupGroupGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl:SecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl:SecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["name"]},"sysdig:index/SecurePosturePolicyGroupGroupGroupGroupRequirement:SecurePosturePolicyGroupGroupGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupGroupRequirementControl:SecurePosturePolicyGroupGroupGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroupGroupRequirementControl:SecurePosturePolicyGroupGroupGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["name"]},"sysdig:index/SecurePosturePolicyGroupGroupGroupRequirement:SecurePosturePolicyGroupGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupGroupRequirementControl:SecurePosturePolicyGroupGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupGroupRequirementControl:SecurePosturePolicyGroupGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["name"]},"sysdig:index/SecurePosturePolicyGroupGroupRequirement:SecurePosturePolicyGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupGroupRequirementControl:SecurePosturePolicyGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupGroupRequirementControl:SecurePosturePolicyGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["name"]},"sysdig:index/SecurePosturePolicyGroupRequirement:SecurePosturePolicyGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroupRequirementControl:SecurePosturePolicyGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"id":{"type":"string"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["description","name"],"language":{"nodejs":{"requiredOutputs":["description","id","name"]}}},"sysdig:index/SecurePosturePolicyGroupRequirementControl:SecurePosturePolicyGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"}},"type":"object","required":["name"]},"sysdig:index/SecurePosturePolicyTarget:SecurePosturePolicyTarget":{"properties":{"maxVersion":{"type":"number"},"minVersion":{"type":"number"},"platform":{"type":"string"}},"type":"object"},"sysdig:index/SecurePosturePolicyTimeouts:SecurePosturePolicyTimeouts":{"properties":{"create":{"type":"string"}},"type":"object"},"sysdig:index/SecurePostureZoneScopes:SecurePostureZoneScopes":{"properties":{"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneScopesScope:SecurePostureZoneScopesScope"}}},"type":"object","required":["scopes"]},"sysdig:index/SecurePostureZoneScopesScope:SecurePostureZoneScopesScope":{"properties":{"rules":{"type":"string","description":"Query language expression for filtering results. Empty rules means no filtering.\n\nOperators:\n"},"targetType":{"type":"string","description":"The target type for the scope. Supported types:\n\n- AWS - \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e\n- GCP - \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e\n- Azure - \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n- Kubernetes - \u003cspan pulumi-lang-nodejs=\"`kubernetes`\" pulumi-lang-dotnet=\"`Kubernetes`\" pulumi-lang-go=\"`kubernetes`\" pulumi-lang-python=\"`kubernetes`\" pulumi-lang-yaml=\"`kubernetes`\" pulumi-lang-java=\"`kubernetes`\"\u003e`kubernetes`\u003c/span\u003e\n- Image - \u003cspan pulumi-lang-nodejs=\"`image`\" pulumi-lang-dotnet=\"`Image`\" pulumi-lang-go=\"`image`\" pulumi-lang-python=\"`image`\" pulumi-lang-yaml=\"`image`\" pulumi-lang-java=\"`image`\"\u003e`image`\u003c/span\u003e\n- Host - \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e\n- Git - \u003cspan pulumi-lang-nodejs=\"`git`\" pulumi-lang-dotnet=\"`Git`\" pulumi-lang-go=\"`git`\" pulumi-lang-python=\"`git`\" pulumi-lang-yaml=\"`git`\" pulumi-lang-java=\"`git`\"\u003e`git`\u003c/span\u003e\n"}},"type":"object","required":["targetType"]},"sysdig:index/SecurePostureZoneTimeouts:SecurePostureZoneTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleContainerTimeouts:SecureRuleContainerTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleFalcoException:SecureRuleFalcoException":{"properties":{"comps":{"type":"array","items":{"type":"string"},"description":"Contains comparison operators that align 1-1 with the items in the fields property.\n"},"fields":{"type":"array","items":{"type":"string"},"description":"Contains one or more fields that will extract a value from the syscall/k8s_audit events.\n"},"name":{"type":"string","description":"The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has `append = true`.\n"},"values":{"type":"string","description":"Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field\nand comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value\nof this field must be supplied in JSON format. You can use the default \u003cspan pulumi-lang-nodejs=\"`jsonencode`\" pulumi-lang-dotnet=\"`Jsonencode`\" pulumi-lang-go=\"`jsonencode`\" pulumi-lang-python=\"`jsonencode`\" pulumi-lang-yaml=\"`jsonencode`\" pulumi-lang-java=\"`jsonencode`\"\u003e`jsonencode`\u003c/span\u003e function to provide this value.\nSee the usage example on the top.\n"}},"type":"object","required":["name","values"]},"sysdig:index/SecureRuleFalcoTimeouts:SecureRuleFalcoTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleFilesystemReadOnly:SecureRuleFilesystemReadOnly":{"properties":{"matching":{"type":"boolean","description":"Defines if the path matches or not with the provided list. Default is true.\n"},"paths":{"type":"array","items":{"type":"string"},"description":"List of paths to match.\n"}},"type":"object","required":["paths"]},"sysdig:index/SecureRuleFilesystemReadWrite:SecureRuleFilesystemReadWrite":{"properties":{"matching":{"type":"boolean","description":"Defines if the path matches or not with the provided list. Default is true.\n"},"paths":{"type":"array","items":{"type":"string"},"description":"List of paths to match.\n"}},"type":"object","required":["paths"]},"sysdig:index/SecureRuleFilesystemTimeouts:SecureRuleFilesystemTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleNetworkTcp:SecureRuleNetworkTcp":{"properties":{"matching":{"type":"boolean"},"ports":{"type":"array","items":{"type":"number"}}},"type":"object","required":["ports"]},"sysdig:index/SecureRuleNetworkTimeouts:SecureRuleNetworkTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleNetworkUdp:SecureRuleNetworkUdp":{"properties":{"matching":{"type":"boolean"},"ports":{"type":"array","items":{"type":"number"}}},"type":"object","required":["ports"]},"sysdig:index/SecureRuleProcessTimeouts:SecureRuleProcessTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleStatefulException:SecureRuleStatefulException":{"properties":{"name":{"type":"string","description":"The name of the exception.\n"},"values":{"type":"string","description":"Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field\nand comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value\nof this field must be supplied in JSON format. You can use the default \u003cspan pulumi-lang-nodejs=\"`jsonencode`\" pulumi-lang-dotnet=\"`Jsonencode`\" pulumi-lang-go=\"`jsonencode`\" pulumi-lang-python=\"`jsonencode`\" pulumi-lang-yaml=\"`jsonencode`\" pulumi-lang-java=\"`jsonencode`\"\u003e`jsonencode`\u003c/span\u003e function to provide this value.\nSee the usage example on the top.\n"}},"type":"object","required":["name","values"]},"sysdig:index/SecureRuleStatefulTimeouts:SecureRuleStatefulTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureRuleSyscallTimeouts:SecureRuleSyscallTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureTeamTimeouts:SecureTeamTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureTeamUserRole:SecureTeamUserRole":{"properties":{"email":{"type":"string","description":"The email of the user in the group.\n"},"role":{"type":"string","description":"The role for the user in this group.\nValid roles are: `ROLE_TEAM_STANDARD`, `ROLE_TEAM_EDIT`, `ROLE_TEAM_READ`, `ROLE_TEAM_MANAGER` or CustomRole ID.\u003cbr/\u003e\nDefault: `ROLE_TEAM_STANDARD`.\u003cbr/\u003e\nNote: CustomRole ID can be referenced from \u003cspan pulumi-lang-nodejs=\"`sysdig.CustomRole`\" pulumi-lang-dotnet=\"`sysdig.CustomRole`\" pulumi-lang-go=\"`CustomRole`\" pulumi-lang-python=\"`CustomRole`\" pulumi-lang-yaml=\"`sysdig.CustomRole`\" pulumi-lang-java=\"`sysdig.CustomRole`\"\u003e`sysdig.CustomRole`\u003c/span\u003e resource or \u003cspan pulumi-lang-nodejs=\"`sysdig.CustomRole`\" pulumi-lang-dotnet=\"`sysdig.CustomRole`\" pulumi-lang-go=\"`CustomRole`\" pulumi-lang-python=\"`CustomRole`\" pulumi-lang-yaml=\"`sysdig.CustomRole`\" pulumi-lang-java=\"`sysdig.CustomRole`\"\u003e`sysdig.CustomRole`\u003c/span\u003e data source\n"}},"type":"object","required":["email"]},"sysdig:index/SecureVulnerabilityPolicyStage:SecureVulnerabilityPolicyStage":{"properties":{"configurations":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyStageConfiguration:SecureVulnerabilityPolicyStageConfiguration"},"description":"Configuration block for the stage. If no configuration is provided, it will apply to any workload in this stage.\n"},"name":{"type":"string","description":"The unique name of the vulnerability policy.\n"}},"type":"object","required":["name"]},"sysdig:index/SecureVulnerabilityPolicyStageConfiguration:SecureVulnerabilityPolicyStageConfiguration":{"properties":{"failureAction":{"type":"string","description":"Required for \u003cspan pulumi-lang-nodejs=\"`admissionControl`\" pulumi-lang-dotnet=\"`AdmissionControl`\" pulumi-lang-go=\"`admissionControl`\" pulumi-lang-python=\"`admission_control`\" pulumi-lang-yaml=\"`admissionControl`\" pulumi-lang-java=\"`admissionControl`\"\u003e`admission_control`\u003c/span\u003e stage only. Policy Failure Action. What should happen if the policy fails (aka: there's a rule vioation)\n"},"scope":{"type":"string","description":"Scope expression for this stage\n"},"unknownImageAction":{"type":"string","description":"Required for \u003cspan pulumi-lang-nodejs=\"`admissionControl`\" pulumi-lang-dotnet=\"`AdmissionControl`\" pulumi-lang-go=\"`admissionControl`\" pulumi-lang-python=\"`admission_control`\" pulumi-lang-yaml=\"`admissionControl`\" pulumi-lang-java=\"`admissionControl`\"\u003e`admission_control`\u003c/span\u003e stage only. Unknown Image Action. What should happen if the image is unknown.\n"}},"type":"object","required":["scope"]},"sysdig:index/SecureVulnerabilityPolicyTimeouts:SecureVulnerabilityPolicyTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureVulnerabilityRuleBundleRule:SecureVulnerabilityRuleBundleRule":{"properties":{"imageLabel":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRuleImageLabel:SecureVulnerabilityRuleBundleRuleImageLabel","description":"Defines label-based matching rules for image configuration.\n"},"severitiesAndThreats":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRuleSeveritiesAndThreats:SecureVulnerabilityRuleBundleRuleSeveritiesAndThreats","description":"Defines rules based on vulnerability severity and threat intelligence.\n"}},"type":"object"},"sysdig:index/SecureVulnerabilityRuleBundleRuleImageLabel:SecureVulnerabilityRuleBundleRuleImageLabel":{"properties":{"id":{"type":"string","description":"The internal identifier of the vulnerability rule bundle. This is the ID to be used in the `sysdig_secure_vulnerability_policy.bundles` field.\n"},"labelMustExist":{"type":"string","description":"The rule matches if an image contains a label with this key.\n"},"labelMustExistAndContainValues":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValue:SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValue"},"description":"A block specifying a label key and value that must exist in the image configuration.\n"},"labelMustNotExist":{"type":"string","description":"The rule matches if an image does not contain a label with this key.\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["id"]}}},"sysdig:index/SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValue:SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValue":{"properties":{"requiredLabel":{"type":"string","description":"The label key that must exist.\n"},"requiredValue":{"type":"string","description":"The expected value for the given label key.\n"}},"type":"object","required":["requiredLabel","requiredValue"]},"sysdig:index/SecureVulnerabilityRuleBundleRuleSeveritiesAndThreats:SecureVulnerabilityRuleBundleRuleSeveritiesAndThreats":{"properties":{"cisaKevAvailableSinceDays":{"type":"number","description":"Matches if the vulnerability has been in the CISA KEV catalog for at least this number of days.\n"},"cisaKevDueDateInDays":{"type":"number","description":"Matches if the CISA KEV remediation due date is within this number of days.\n"},"cisaKevInRansomwareCampaign":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, the vulnerability is part of a CISA KEV (Known Exploited Vulnerabilities) ransomware campaign.\n"},"cvssAtLeast":{"type":"number","description":"Matches if the vulnerability's CVSS score is at least this value (e.g., `7.5`).\n"},"disclosureDate":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsDisclosureDate:SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsDisclosureDate","description":"A block specifying that the vulnerability was disclosed within a specific date range.\n"},"disclosureOlderThanDays":{"type":"number","description":"Matches if the vulnerability was publicly disclosed more than this number of days ago.\n"},"epssPercentileAtLeastPercentage":{"type":"number","description":"Matches if the EPSS percentile is at least this percentage (0-100).\n\n\u003e **Note on mutually exclusive fields:**\n\u003e - Within a \u003cspan pulumi-lang-nodejs=\"`severitiesAndThreats`\" pulumi-lang-dotnet=\"`SeveritiesAndThreats`\" pulumi-lang-go=\"`severitiesAndThreats`\" pulumi-lang-python=\"`severities_and_threats`\" pulumi-lang-yaml=\"`severitiesAndThreats`\" pulumi-lang-java=\"`severitiesAndThreats`\"\u003e`severities_and_threats`\u003c/span\u003e block, only one of \u003cspan pulumi-lang-nodejs=\"`severityAtLeast`\" pulumi-lang-dotnet=\"`SeverityAtLeast`\" pulumi-lang-go=\"`severityAtLeast`\" pulumi-lang-python=\"`severity_at_least`\" pulumi-lang-yaml=\"`severityAtLeast`\" pulumi-lang-java=\"`severityAtLeast`\"\u003e`severity_at_least`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`severityEquals`\" pulumi-lang-dotnet=\"`SeverityEquals`\" pulumi-lang-go=\"`severityEquals`\" pulumi-lang-python=\"`severity_equals`\" pulumi-lang-yaml=\"`severityEquals`\" pulumi-lang-java=\"`severityEquals`\"\u003e`severity_equals`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`cvssAtLeast`\" pulumi-lang-dotnet=\"`CvssAtLeast`\" pulumi-lang-go=\"`cvssAtLeast`\" pulumi-lang-python=\"`cvss_at_least`\" pulumi-lang-yaml=\"`cvssAtLeast`\" pulumi-lang-java=\"`cvssAtLeast`\"\u003e`cvss_at_least`\u003c/span\u003e can be set.\n\u003e - \u003cspan pulumi-lang-nodejs=\"`disclosureOlderThanDays`\" pulumi-lang-dotnet=\"`DisclosureOlderThanDays`\" pulumi-lang-go=\"`disclosureOlderThanDays`\" pulumi-lang-python=\"`disclosure_older_than_days`\" pulumi-lang-yaml=\"`disclosureOlderThanDays`\" pulumi-lang-java=\"`disclosureOlderThanDays`\"\u003e`disclosure_older_than_days`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`disclosureDate`\" pulumi-lang-dotnet=\"`DisclosureDate`\" pulumi-lang-go=\"`disclosureDate`\" pulumi-lang-python=\"`disclosure_date`\" pulumi-lang-yaml=\"`disclosureDate`\" pulumi-lang-java=\"`disclosureDate`\"\u003e`disclosure_date`\u003c/span\u003e are mutually exclusive.\n\u003e - \u003cspan pulumi-lang-nodejs=\"`publicExploitAvailable`\" pulumi-lang-dotnet=\"`PublicExploitAvailable`\" pulumi-lang-go=\"`publicExploitAvailable`\" pulumi-lang-python=\"`public_exploit_available`\" pulumi-lang-yaml=\"`publicExploitAvailable`\" pulumi-lang-java=\"`publicExploitAvailable`\"\u003e`public_exploit_available`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`publicExploitAvailableSinceDays`\" pulumi-lang-dotnet=\"`PublicExploitAvailableSinceDays`\" pulumi-lang-go=\"`publicExploitAvailableSinceDays`\" pulumi-lang-python=\"`public_exploit_available_since_days`\" pulumi-lang-yaml=\"`publicExploitAvailableSinceDays`\" pulumi-lang-java=\"`publicExploitAvailableSinceDays`\"\u003e`public_exploit_available_since_days`\u003c/span\u003e are mutually exclusive.\n\u003e - \u003cspan pulumi-lang-nodejs=\"`fixAvailable`\" pulumi-lang-dotnet=\"`FixAvailable`\" pulumi-lang-go=\"`fixAvailable`\" pulumi-lang-python=\"`fix_available`\" pulumi-lang-yaml=\"`fixAvailable`\" pulumi-lang-java=\"`fixAvailable`\"\u003e`fix_available`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`fixAvailableSinceDays`\" pulumi-lang-dotnet=\"`FixAvailableSinceDays`\" pulumi-lang-go=\"`fixAvailableSinceDays`\" pulumi-lang-python=\"`fix_available_since_days`\" pulumi-lang-yaml=\"`fixAvailableSinceDays`\" pulumi-lang-java=\"`fixAvailableSinceDays`\"\u003e`fix_available_since_days`\u003c/span\u003e are mutually exclusive.\n"},"epssScoreAtLeastPercentage":{"type":"number","description":"Matches if the EPSS (Exploit Prediction Scoring System) score is at least this percentage (0-100).\n"},"exploitNetworkAttackVector":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, the exploit has a network attack vector.\n"},"exploitNoAdminPrivileges":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, the exploit does not require administrator privileges.\n"},"exploitNoUserInteraction":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, the exploit does not require user interaction.\n"},"fixAvailable":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, a fix is available for the vulnerability.\n"},"fixAvailableSinceDays":{"type":"number","description":"Matches if a fix has been available for at least this number of days.\n"},"id":{"type":"string","description":"The internal identifier of the vulnerability rule bundle. This is the ID to be used in the `sysdig_secure_vulnerability_policy.bundles` field.\n"},"inUse":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, the rule matches only if the vulnerable package is loaded in memory at runtime.\n"},"packageType":{"type":"string","description":"Matches if the vulnerability is in a package of this type. Valid values: \u003cspan pulumi-lang-nodejs=\"`os`\" pulumi-lang-dotnet=\"`Os`\" pulumi-lang-go=\"`os`\" pulumi-lang-python=\"`os`\" pulumi-lang-yaml=\"`os`\" pulumi-lang-java=\"`os`\"\u003e`os`\u003c/span\u003e, `nonOs`.\n"},"publicExploitAvailable":{"type":"boolean","description":"If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, a public exploit is known to exist for the vulnerability.\n"},"publicExploitAvailableSinceDays":{"type":"number","description":"Matches if a public exploit has been available for at least this number of days.\n"},"severityAtLeast":{"type":"string","description":"Matches if the vulnerability severity is at least this level. Valid values: \u003cspan pulumi-lang-nodejs=\"`critical`\" pulumi-lang-dotnet=\"`Critical`\" pulumi-lang-go=\"`critical`\" pulumi-lang-python=\"`critical`\" pulumi-lang-yaml=\"`critical`\" pulumi-lang-java=\"`critical`\"\u003e`critical`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`high`\" pulumi-lang-dotnet=\"`High`\" pulumi-lang-go=\"`high`\" pulumi-lang-python=\"`high`\" pulumi-lang-yaml=\"`high`\" pulumi-lang-java=\"`high`\"\u003e`high`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`medium`\" pulumi-lang-dotnet=\"`Medium`\" pulumi-lang-go=\"`medium`\" pulumi-lang-python=\"`medium`\" pulumi-lang-yaml=\"`medium`\" pulumi-lang-java=\"`medium`\"\u003e`medium`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`low`\" pulumi-lang-dotnet=\"`Low`\" pulumi-lang-go=\"`low`\" pulumi-lang-python=\"`low`\" pulumi-lang-yaml=\"`low`\" pulumi-lang-java=\"`low`\"\u003e`low`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`negligible`\" pulumi-lang-dotnet=\"`Negligible`\" pulumi-lang-go=\"`negligible`\" pulumi-lang-python=\"`negligible`\" pulumi-lang-yaml=\"`negligible`\" pulumi-lang-java=\"`negligible`\"\u003e`negligible`\u003c/span\u003e.\n"},"severityEquals":{"type":"string","description":"Matches if the vulnerability severity is exactly this level. Valid values: \u003cspan pulumi-lang-nodejs=\"`critical`\" pulumi-lang-dotnet=\"`Critical`\" pulumi-lang-go=\"`critical`\" pulumi-lang-python=\"`critical`\" pulumi-lang-yaml=\"`critical`\" pulumi-lang-java=\"`critical`\"\u003e`critical`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`high`\" pulumi-lang-dotnet=\"`High`\" pulumi-lang-go=\"`high`\" pulumi-lang-python=\"`high`\" pulumi-lang-yaml=\"`high`\" pulumi-lang-java=\"`high`\"\u003e`high`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`medium`\" pulumi-lang-dotnet=\"`Medium`\" pulumi-lang-go=\"`medium`\" pulumi-lang-python=\"`medium`\" pulumi-lang-yaml=\"`medium`\" pulumi-lang-java=\"`medium`\"\u003e`medium`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`low`\" pulumi-lang-dotnet=\"`Low`\" pulumi-lang-go=\"`low`\" pulumi-lang-python=\"`low`\" pulumi-lang-yaml=\"`low`\" pulumi-lang-java=\"`low`\"\u003e`low`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`negligible`\" pulumi-lang-dotnet=\"`Negligible`\" pulumi-lang-go=\"`negligible`\" pulumi-lang-python=\"`negligible`\" pulumi-lang-yaml=\"`negligible`\" pulumi-lang-java=\"`negligible`\"\u003e`negligible`\u003c/span\u003e.\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["id"]}}},"sysdig:index/SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsDisclosureDate:SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsDisclosureDate":{"properties":{"from":{"type":"string","description":"Start of the date range in `YYYY-MM-DD` format.\n"},"to":{"type":"string","description":"End of the date range in `YYYY-MM-DD` format.\n"}},"type":"object","required":["from","to"]},"sysdig:index/SecureVulnerabilityRuleBundleTimeouts:SecureVulnerabilityRuleBundleTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SecureZoneScope:SecureZoneScope":{"properties":{"id":{"type":"number","description":"(Computed) The ID of the Zone.\n"},"rules":{"type":"string","description":"Query language expression for filtering results. Empty rules means no filtering.\n\nOperators:\n"},"targetType":{"type":"string","description":"The target type for the scope. Supported types:\n\n- AWS - \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e\n- GCP - \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e\n- Azure - \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n- Kubernetes - \u003cspan pulumi-lang-nodejs=\"`kubernetes`\" pulumi-lang-dotnet=\"`Kubernetes`\" pulumi-lang-go=\"`kubernetes`\" pulumi-lang-python=\"`kubernetes`\" pulumi-lang-yaml=\"`kubernetes`\" pulumi-lang-java=\"`kubernetes`\"\u003e`kubernetes`\u003c/span\u003e\n- Image - \u003cspan pulumi-lang-nodejs=\"`image`\" pulumi-lang-dotnet=\"`Image`\" pulumi-lang-go=\"`image`\" pulumi-lang-python=\"`image`\" pulumi-lang-yaml=\"`image`\" pulumi-lang-java=\"`image`\"\u003e`image`\u003c/span\u003e\n- Host - \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e\n- Git - \u003cspan pulumi-lang-nodejs=\"`git`\" pulumi-lang-dotnet=\"`Git`\" pulumi-lang-go=\"`git`\" pulumi-lang-python=\"`git`\" pulumi-lang-yaml=\"`git`\" pulumi-lang-java=\"`git`\"\u003e`git`\u003c/span\u003e\n"}},"type":"object","required":["targetType"],"language":{"nodejs":{"requiredOutputs":["id","targetType"]}}},"sysdig:index/SsoGlobalSettingsTimeouts:SsoGlobalSettingsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SsoGroupMappingSettingsTimeouts:SsoGroupMappingSettingsTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SsoGroupMappingTeamMap:SsoGroupMappingTeamMap":{"properties":{"isForAllTeams":{"type":"boolean","description":"Whether the mapping applies to all teams.\n"},"teamIds":{"type":"array","items":{"type":"number"},"description":"List of team IDs. Required when \u003cspan pulumi-lang-nodejs=\"`isForAllTeams`\" pulumi-lang-dotnet=\"`IsForAllTeams`\" pulumi-lang-go=\"`isForAllTeams`\" pulumi-lang-python=\"`is_for_all_teams`\" pulumi-lang-yaml=\"`isForAllTeams`\" pulumi-lang-java=\"`isForAllTeams`\"\u003e`is_for_all_teams`\u003c/span\u003e is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["isForAllTeams"]},"sysdig:index/SsoGroupMappingTimeouts:SsoGroupMappingTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SsoOpenidMetadata:SsoOpenidMetadata":{"properties":{"authorizationEndpoint":{"type":"string","description":"The authorization endpoint URL.\n"},"endSessionEndpoint":{"type":"string","description":"The end session endpoint URL for logout.\n"},"issuer":{"type":"string","description":"The issuer identifier.\n"},"jwksUri":{"type":"string","description":"The JWKS URI for token verification.\n"},"tokenAuthMethod":{"type":"string","description":"The token authentication method. Valid values are `CLIENT_SECRET_BASIC` or `CLIENT_SECRET_POST`.\n"},"tokenEndpoint":{"type":"string","description":"The token endpoint URL.\n"},"userInfoEndpoint":{"type":"string","description":"The user info endpoint URL.\n"}},"type":"object","required":["authorizationEndpoint","issuer","jwksUri","tokenAuthMethod","tokenEndpoint"]},"sysdig:index/SsoOpenidTimeouts:SsoOpenidTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/SsoSamlTimeouts:SsoSamlTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/TeamServiceAccountTimeouts:TeamServiceAccountTimeouts":{"properties":{"create":{"type":"string"},"delete":{"type":"string"},"read":{"type":"string"},"update":{"type":"string"}},"type":"object"},"sysdig:index/UserTimeouts:UserTimeouts":{"properties":{"create":{"type":"string"}},"type":"object"},"sysdig:index/getAgentAccessKeyTimeouts:getAgentAccessKeyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getBuiltinRoleTimeouts:getBuiltinRoleTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getCurrentUserTimeouts:getCurrentUserTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getCustomRoleTimeouts:getCustomRoleTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getFargateWorkloadAgentLogConfiguration:getFargateWorkloadAgentLogConfiguration":{"properties":{"group":{"type":"string","description":"The name of the existing log group for instrumentation logs\n"},"region":{"type":"string","description":"The AWS region where the target log group resides\n"},"streamPrefix":{"type":"string","description":"Prefix for the instrumentation log stream\n"}},"type":"object","required":["group","region","streamPrefix"]},"sysdig:index/getMonitorCustomRolePermissionsTimeouts:getMonitorCustomRolePermissionsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelCustomWebhookTimeouts:getMonitorNotificationChannelCustomWebhookTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelEmailTimeouts:getMonitorNotificationChannelEmailTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelGoogleChatTimeouts:getMonitorNotificationChannelGoogleChatTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelIbmEventNotificationTimeouts:getMonitorNotificationChannelIbmEventNotificationTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelMsteamsTimeouts:getMonitorNotificationChannelMsteamsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelOpsgenieTimeouts:getMonitorNotificationChannelOpsgenieTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelPagerdutyTimeouts:getMonitorNotificationChannelPagerdutyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelPrometheusAlertManagerTimeouts:getMonitorNotificationChannelPrometheusAlertManagerTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelSlackTimeouts:getMonitorNotificationChannelSlackTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelSnsTimeouts:getMonitorNotificationChannelSnsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelTeamEmailTimeouts:getMonitorNotificationChannelTeamEmailTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelVictoropsTimeouts:getMonitorNotificationChannelVictoropsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorNotificationChannelWebhookTimeouts:getMonitorNotificationChannelWebhookTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getMonitorTeamEntrypoint:getMonitorTeamEntrypoint":{"properties":{"selection":{"type":"string"},"type":{"type":"string"}},"type":"object","required":["selection","type"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getMonitorTeamUserRole:getMonitorTeamUserRole":{"properties":{"email":{"type":"string"},"role":{"type":"string"}},"type":"object","required":["email","role"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getMonitorTeamsTeam:getMonitorTeamsTeam":{"properties":{"id":{"type":"number","description":"The ID of the monitor team.\n"},"name":{"type":"string","description":"The name of the monitor team.\n"}},"type":"object","required":["id","name"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureAgentlessScanningAssetsTimeouts:getSecureAgentlessScanningAssetsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureAwsMlPolicyRule:getSecureAwsMlPolicyRule":{"properties":{"anomalousConsoleLogins":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureAwsMlPolicyRuleAnomalousConsoleLogin:getSecureAwsMlPolicyRuleAnomalousConsoleLogin"},"description":"(Required) This attribute allows you to activate anomaly detection for console logins and adjust its settings.\n"},"description":{"type":"string","description":"(Required) Rule description.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"version":{"type":"number"}},"type":"object","required":["anomalousConsoleLogins","description","id","name","tags","version"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureAwsMlPolicyRuleAnomalousConsoleLogin:getSecureAwsMlPolicyRuleAnomalousConsoleLogin":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"threshold":{"type":"number","description":"(Required) Trigger at or above confidence level. Valid values are: 1 (Default), 2 (High), 3 (Higher).\n"}},"type":"object","required":["enabled","threshold"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureAwsMlPolicyTimeouts:getSecureAwsMlPolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureCloudIngestionAssetsTimeouts:getSecureCloudIngestionAssetsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureCustomPolicyAction:getSecureCustomPolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureCustomPolicyActionCapture:getSecureCustomPolicyActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"killProcess":{"type":"string","description":"(Optional) Whether to kill the process that triggered the rule.\nIf this is not specified,\nno action will be applied at the process level.\n"}},"type":"object","required":["container","killProcess"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureCustomPolicyActionCapture:getSecureCustomPolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure custom policy.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["bucketName","filter","folder","name","secondsAfterEvent","secondsBeforeEvent"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureCustomPolicyRule:getSecureCustomPolicyRule":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure custom policy.\n"}},"type":"object","required":["enabled","name"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureCustomPolicyTimeouts:getSecureCustomPolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureCustomRolePermissionsTimeouts:getSecureCustomRolePermissionsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureDriftPolicyAction:getSecureDriftPolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyActionCapture:getSecureDriftPolicyActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"preventDrift":{"type":"boolean","description":"(Optional) Prevent the execution of drifted binaries and specified prohibited binaries.\n"}},"type":"object","required":["captures","container","preventDrift"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyActionCapture:getSecureDriftPolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["bucketName","filter","folder","name","secondsAfterEvent","secondsBeforeEvent"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyRule:getSecureDriftPolicyRule":{"properties":{"description":{"type":"string","description":"(Required) The description of the drift rule.\n"},"enabled":{"type":"boolean","description":"(Required) Toggle to dynamically detect execution of drifted binaries. A drifted binary is any binary that was not part of the original image of the container. It is typically downloaded or compiled into a running container.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyRuleException:getSecureDriftPolicyRuleException"},"description":"(Optional) Specify comma separated list of exceptions.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"mountedVolumeDriftEnabled":{"type":"boolean","description":"(Optional) Treat all binaries from mounted volumes as drifted. Default value is false/disabled.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"processBasedExceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyRuleProcessBasedException:getSecureDriftPolicyRuleProcessBasedException"},"description":"(Optional) List of processes that will be able to execute a drifted file\n"},"processBasedProhibitedBinaries":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyRuleProcessBasedProhibitedBinary:getSecureDriftPolicyRuleProcessBasedProhibitedBinary"},"description":"(Optional) List of processes that will be prohibited to execute a drifted file\n"},"prohibitedBinaries":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyRuleProhibitedBinary:getSecureDriftPolicyRuleProhibitedBinary"},"description":"(Optional) A prohibited binary can be a known harmful binary or one that facilitates discovery of your environment.\n"},"tags":{"type":"array","items":{"type":"string"}},"useRegex":{"type":"boolean","description":"(Optional) Pass exceptions and prohibited binaries as regex strings. Requires agent version 13.2.0 and above\n"},"version":{"type":"number"}},"type":"object","required":["description","enabled","exceptions","id","mountedVolumeDriftEnabled","name","processBasedExceptions","processBasedProhibitedBinaries","prohibitedBinaries","tags","useRegex","version"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyRuleException:getSecureDriftPolicyRuleException":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items","matchItems"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyRuleProcessBasedException:getSecureDriftPolicyRuleProcessBasedException":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items","matchItems"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyRuleProcessBasedProhibitedBinary:getSecureDriftPolicyRuleProcessBasedProhibitedBinary":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items","matchItems"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyRuleProhibitedBinary:getSecureDriftPolicyRuleProhibitedBinary":{"properties":{"items":{"type":"array","items":{"type":"string"},"description":"(Required) Specify comma separated list of processes, e.g. `/usr/bin/rm, /usr/bin/curl`.\n"},"matchItems":{"type":"boolean"}},"type":"object","required":["items","matchItems"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureDriftPolicyTimeouts:getSecureDriftPolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureMalwarePolicyAction:getSecureMalwarePolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureMalwarePolicyActionCapture:getSecureMalwarePolicyActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"preventMalware":{"type":"boolean","description":"(Optional) Prevent the execution of detected malware and binaries with known hashes.\n"}},"type":"object","required":["captures","container","preventMalware"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureMalwarePolicyActionCapture:getSecureMalwarePolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["bucketName","filter","folder","name","secondsAfterEvent","secondsBeforeEvent"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureMalwarePolicyRule:getSecureMalwarePolicyRule":{"properties":{"additionalHashes":{"type":"array","items":{"type":"string"},"description":"(Optional) List of additional hashes that should be matched.\n"},"description":{"type":"string","description":"(Required) The description of the malware rule.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"ignoreHashes":{"type":"array","items":{"type":"string"},"description":"(Optional) List of hashes that should be ignored.\n"},"ignorePaths":{"type":"array","items":{"type":"string"},"description":"(Optional) The list of file paths to be excluded from malware matching\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"useManagedHashes":{"type":"boolean","description":"(Optional) Should Sysdig's managed hashes be used? The possible values are \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"useRegex":{"type":"boolean","description":"(Optional) Should use regex for\u003cspan pulumi-lang-nodejs=\" ignorePaths \" pulumi-lang-dotnet=\" IgnorePaths \" pulumi-lang-go=\" ignorePaths \" pulumi-lang-python=\" ignore_paths \" pulumi-lang-yaml=\" ignorePaths \" pulumi-lang-java=\" ignorePaths \"\u003e ignore_paths \u003c/span\u003ematching? The possible values are \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"useYaraRules":{"type":"boolean","description":"(Optional) Should use Sysdig's managed YARA rules to detect malware and malicious scripts? The possible values are \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"version":{"type":"number"}},"type":"object","required":["additionalHashes","description","id","ignoreHashes","ignorePaths","name","tags","useManagedHashes","useRegex","useYaraRules","version"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureMalwarePolicyTimeouts:getSecureMalwarePolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureManagedPolicyAction:getSecureManagedPolicyAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedPolicyActionCapture:getSecureManagedPolicyActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"killProcess":{"type":"string"}},"type":"object","required":["container","killProcess"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureManagedPolicyActionCapture:getSecureManagedPolicyActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["bucketName","filter","folder","name","secondsAfterEvent","secondsBeforeEvent"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureManagedPolicyRule:getSecureManagedPolicyRule":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"}},"type":"object","required":["enabled","name"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureManagedPolicyTimeouts:getSecureManagedPolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureManagedRulesetAction:getSecureManagedRulesetAction":{"properties":{"captures":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedRulesetActionCapture:getSecureManagedRulesetActionCapture"},"description":"(Optional) Captures with Sysdig the stream of system calls:\n"},"container":{"type":"string","description":"(Optional) The action applied to container when this Policy is\ntriggered. Can be *stop*, *pause* or *kill*. If this is not specified,\nno action will be applied at the container level.\n"},"killProcess":{"type":"string"}},"type":"object","required":["container","killProcess"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureManagedRulesetActionCapture:getSecureManagedRulesetActionCapture":{"properties":{"bucketName":{"type":"string","description":"(Optional) Custom bucket to store capture in, \nbucket should be onboarded in Integrations \u003e S3 Capture Storage. Default is to use Sysdig Secure Storage\n"},"filter":{"type":"string","description":"(Optional) Additional filter to apply to the capture. For example: `proc.name=cat`\n"},"folder":{"type":"string","description":"(Optional) Name of folder to store capture inside the bucket. \nBy default we will store the capture file at the root of the bucket\n"},"name":{"type":"string","description":"The name of the Secure managed ruleset.\n"},"secondsAfterEvent":{"type":"number","description":"(Required) Captures the system calls for the amount\nof seconds after the policy was triggered.\n"},"secondsBeforeEvent":{"type":"number","description":"(Required) Captures the system calls during the\namount of seconds before the policy was triggered.\n"}},"type":"object","required":["bucketName","filter","folder","name","secondsAfterEvent","secondsBeforeEvent"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureManagedRulesetRule:getSecureManagedRulesetRule":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed ruleset.\n"}},"type":"object","required":["enabled","name"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureManagedRulesetTimeouts:getSecureManagedRulesetTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureMlPolicyRule:getSecureMlPolicyRule":{"properties":{"cryptominingTriggers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureMlPolicyRuleCryptominingTrigger:getSecureMlPolicyRuleCryptominingTrigger"},"description":"(Required) Cryptomining detection: Detect unusual activity in the Activity Audit based on the set confidence level.\n"},"description":{"type":"string","description":"(Required) Rule description.\n"},"id":{"type":"number","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"tags":{"type":"array","items":{"type":"string"}},"version":{"type":"number"}},"type":"object","required":["cryptominingTriggers","description","id","name","tags","version"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureMlPolicyRuleCryptominingTrigger:getSecureMlPolicyRuleCryptominingTrigger":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"threshold":{"type":"number","description":"(Required) Trigger at or above confidence level. Accepted values are 3 (Highest), 2 (Higher), 1 (Default)\n"}},"type":"object","required":["enabled","threshold"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureMlPolicyTimeouts:getSecureMlPolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelEmailTimeouts:getSecureNotificationChannelEmailTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelMsteamsTimeouts:getSecureNotificationChannelMsteamsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelOpsgenieTimeouts:getSecureNotificationChannelOpsgenieTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelPagerdutyTimeouts:getSecureNotificationChannelPagerdutyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelPrometheusAlertManagerTimeouts:getSecureNotificationChannelPrometheusAlertManagerTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelSlackTimeouts:getSecureNotificationChannelSlackTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelSnsTimeouts:getSecureNotificationChannelSnsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelTeamEmailTimeouts:getSecureNotificationChannelTeamEmailTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelVictoropsTimeouts:getSecureNotificationChannelVictoropsTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureNotificationChannelWebhookTimeouts:getSecureNotificationChannelWebhookTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureOktaMlPolicyRule:getSecureOktaMlPolicyRule":{"properties":{"anomalousConsoleLogins":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureOktaMlPolicyRuleAnomalousConsoleLogin:getSecureOktaMlPolicyRuleAnomalousConsoleLogin"},"description":"Anomaly detection settings for logins.\n"},"description":{"type":"string","description":"Rule description.\n"},"id":{"type":"number","description":"The ID of the rule.\n"},"name":{"type":"string","description":"The name of the Secure Okta ML policy.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"Tags associated with the rule.\n"},"version":{"type":"number","description":"The version of the rule.\n"}},"type":"object","required":["anomalousConsoleLogins","description","id","name","tags","version"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureOktaMlPolicyRuleAnomalousConsoleLogin:getSecureOktaMlPolicyRuleAnomalousConsoleLogin":{"properties":{"enabled":{"type":"boolean","description":"Whether anomaly detection is enabled.\n"},"threshold":{"type":"number","description":"Confidence level threshold for triggering alerts. Valid values are: 1 (Default), 2 (High), 3 (Higher).\n"}},"type":"object","required":["enabled","threshold"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureOktaMlPolicyTimeouts:getSecureOktaMlPolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecurePosturePoliciesPolicy:getSecurePosturePoliciesPolicy":{"properties":{"authors":{"type":"string","description":"Policy authors, eg. `John Doe`\n"},"description":{"type":"string","description":"Policy description, eg. `CIS Docker Benchmark`\n"},"id":{"type":"number","description":"Zone ID\n"},"isActive":{"type":"boolean","description":"Policy is active flag\n"},"isCustom":{"type":"boolean","description":"Policy is custom flag\n"},"kind":{"type":"number","description":"Policy kind as int value, can be one of the following:\n- 0 - None\n- 1 - BestPractice\n- 2 - Compliance\n- 3 - Corporate\n"},"link":{"type":"string","description":"Policy link\n"},"maxKubeVersion":{"type":"number","description":"Policy maximum Kubernetes version, eg. `1.18`\n"},"minKubeVersion":{"type":"number","description":"Policy minimum Kubernetes version, eg. `1.16`\n"},"name":{"type":"string","description":"Zone Name, eg. `Entire Infrastructure`\n"},"platform":{"type":"string","description":"Policy platform, eg. `Kubernetes`\n"},"publishedDate":{"type":"string","description":"Policy published date, eg. \u003cspan pulumi-lang-nodejs=\"`1588617600000`\" pulumi-lang-dotnet=\"`1588617600000`\" pulumi-lang-go=\"`1588617600000`\" pulumi-lang-python=\"`1588617600000`\" pulumi-lang-yaml=\"`1588617600000`\" pulumi-lang-java=\"`1588617600000`\"\u003e`1588617600000`\u003c/span\u003e\n"},"type":{"type":"number","description":"Policy type as int value, can be one of the following:\n- 0 - UNKNOWN\n- 1 - KUBERNETES\n- 2 - DOCKER\n- 3 - LINUX\n- 4 - AWS\n- 5 - GCP\n- 6 - AZURE\n"},"version":{"type":"string","description":"Policy version, eg. `1.0.0`\n"},"zones":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePoliciesPolicyZone:getSecurePosturePoliciesPolicyZone"},"description":"List of policy zones\n"}},"type":"object","required":["authors","description","id","isActive","isCustom","kind","link","maxKubeVersion","minKubeVersion","name","platform","publishedDate","type","version","zones"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecurePosturePoliciesPolicyZone:getSecurePosturePoliciesPolicyZone":{"properties":{"id":{"type":"string","description":"Zone ID\n"},"name":{"type":"string","description":"Zone Name, eg. `Entire Infrastructure`\n"}},"type":"object","required":["id","name"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecurePosturePoliciesTimeouts:getSecurePosturePoliciesTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecurePosturePolicyGroup:getSecurePosturePolicyGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroup:getSecurePosturePolicyGroupGroup"}},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupRequirement:getSecurePosturePolicyGroupRequirement"}}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroup:getSecurePosturePolicyGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroup:getSecurePosturePolicyGroupGroupGroup"}},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupRequirement:getSecurePosturePolicyGroupGroupRequirement"}}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroup:getSecurePosturePolicyGroupGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupGroup:getSecurePosturePolicyGroupGroupGroupGroup"}},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupRequirement:getSecurePosturePolicyGroupGroupGroupRequirement"}}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroupGroup:getSecurePosturePolicyGroupGroupGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupGroupGroup:getSecurePosturePolicyGroupGroupGroupGroupGroup"}},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupGroupRequirement:getSecurePosturePolicyGroupGroupGroupGroupRequirement"}}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroupGroupGroup:getSecurePosturePolicyGroupGroupGroupGroupGroup":{"properties":{"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"},"requirements":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupGroupGroupRequirement:getSecurePosturePolicyGroupGroupGroupGroupGroupRequirement"}}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroupGroupGroupRequirement:getSecurePosturePolicyGroupGroupGroupGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupGroupGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["name"]},"sysdig:index/getSecurePosturePolicyGroupGroupGroupGroupRequirement:getSecurePosturePolicyGroupGroupGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["name"]},"sysdig:index/getSecurePosturePolicyGroupGroupGroupRequirement:getSecurePosturePolicyGroupGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["name"]},"sysdig:index/getSecurePosturePolicyGroupGroupRequirement:getSecurePosturePolicyGroupGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupGroupRequirementControl:getSecurePosturePolicyGroupGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["name"]},"sysdig:index/getSecurePosturePolicyGroupRequirement:getSecurePosturePolicyGroupRequirement":{"properties":{"controls":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroupRequirementControl:getSecurePosturePolicyGroupRequirementControl"}},"description":{"type":"string","description":"The description of the Posture Policy Requirement.\n"},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["description","id","name"],"language":{"nodejs":{"requiredInputs":["description","name"]}}},"sysdig:index/getSecurePosturePolicyGroupRequirementControl:getSecurePosturePolicyGroupRequirementControl":{"properties":{"enabled":{"type":"boolean","description":"The 'Control is enabled' flag indicates whether the control will affect the policy evaluation or not. By default, it is set to true\n"},"name":{"type":"string","description":"The name of the Posture Control.\n"}},"type":"object","required":["name"]},"sysdig:index/getSecurePosturePolicyTimeouts:getSecurePosturePolicyTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecurePostureZoneScope:getSecurePostureZoneScope":{"properties":{"rules":{"type":"string","description":"The rules associated with the scope.\n"},"targetType":{"type":"string","description":"The target type of the scope.\n"}},"type":"object","required":["rules","targetType"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleContainerTimeouts:getSecureRuleContainerTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleFalcoCountTimeouts:getSecureRuleFalcoCountTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleFalcoException:getSecureRuleFalcoException":{"properties":{"comps":{"type":"array","items":{"type":"string"},"description":"Contains comparison operators that align 1-1 with the items in the fields property.\n"},"fields":{"type":"array","items":{"type":"string"},"description":"Contains one or more fields that will extract a value from the syscall/k8s_audit events.\n"},"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"values":{"type":"string","description":"Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field\nand comparison operator.\n"}},"type":"object","required":["comps","fields","name","values"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleFalcoTimeouts:getSecureRuleFalcoTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleFilesystemReadOnly:getSecureRuleFilesystemReadOnly":{"properties":{"matching":{"type":"boolean"},"paths":{"type":"array","items":{"type":"string"}}},"type":"object","required":["matching","paths"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleFilesystemReadWrite:getSecureRuleFilesystemReadWrite":{"properties":{"matching":{"type":"boolean"},"paths":{"type":"array","items":{"type":"string"}}},"type":"object","required":["matching","paths"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleFilesystemTimeouts:getSecureRuleFilesystemTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleNetworkTcp:getSecureRuleNetworkTcp":{"properties":{"matching":{"type":"boolean"},"ports":{"type":"array","items":{"type":"number"}}},"type":"object","required":["matching","ports"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleNetworkTimeouts:getSecureRuleNetworkTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleNetworkUdp:getSecureRuleNetworkUdp":{"properties":{"matching":{"type":"boolean"},"ports":{"type":"array","items":{"type":"number"}}},"type":"object","required":["matching","ports"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleProcessTimeouts:getSecureRuleProcessTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleStatefulCountTimeouts:getSecureRuleStatefulCountTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleStatefulException:getSecureRuleStatefulException":{"properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"values":{"type":"string","description":"Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field\nand comparison operator.\n"}},"type":"object","required":["name","values"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureRuleStatefulTimeouts:getSecureRuleStatefulTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureRuleSyscallTimeouts:getSecureRuleSyscallTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureTeamUserRole:getSecureTeamUserRole":{"properties":{"email":{"type":"string"},"role":{"type":"string"}},"type":"object","required":["email","role"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureTeamsTeam:getSecureTeamsTeam":{"properties":{"id":{"type":"number","description":"The ID of the secure team.\n"},"name":{"type":"string","description":"The name of the secure team.\n"}},"type":"object","required":["id","name"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getSecureTenantExternalIdTimeouts:getSecureTenantExternalIdTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureTrustedAzureAppTimeouts:getSecureTrustedAzureAppTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureTrustedCloudIdentityTimeouts:getSecureTrustedCloudIdentityTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureTrustedOracleAppTimeouts:getSecureTrustedOracleAppTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"},"sysdig:index/getSecureZoneScope:getSecureZoneScope":{"properties":{"id":{"type":"number","description":"The ID of the Sysdig Secure Zone.\n"},"rules":{"type":"string"},"targetType":{"type":"string"}},"type":"object","required":["id","rules","targetType"],"language":{"nodejs":{"requiredInputs":[]}}},"sysdig:index/getUserTimeouts:getUserTimeouts":{"properties":{"read":{"type":"string"}},"type":"object"}},"provider":{"description":"The provider type for the sysdig package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","properties":{"ibmMonitorApiKey":{"type":"string"},"ibmMonitorIamUrl":{"type":"string"},"ibmMonitorInstanceId":{"type":"string"},"ibmSecureApiKey":{"type":"string"},"ibmSecureIamUrl":{"type":"string"},"ibmSecureInstanceId":{"type":"string"},"sysdigMonitorApiToken":{"type":"string","secret":true},"sysdigMonitorTeamName":{"type":"string"},"sysdigMonitorUrl":{"type":"string"},"sysdigSecureApiToken":{"type":"string","secret":true},"sysdigSecureTeamName":{"type":"string"},"sysdigSecureUrl":{"type":"string"}},"type":"object","inputProperties":{"extraHeaders":{"type":"object","additionalProperties":{"type":"string"}},"ibmMonitorApiKey":{"type":"string"},"ibmMonitorIamUrl":{"type":"string"},"ibmMonitorInstanceId":{"type":"string"},"ibmSecureApiKey":{"type":"string"},"ibmSecureIamUrl":{"type":"string"},"ibmSecureInstanceId":{"type":"string"},"sysdigMonitorApiToken":{"type":"string","secret":true},"sysdigMonitorInsecureTls":{"type":"boolean"},"sysdigMonitorTeamId":{"type":"number"},"sysdigMonitorTeamName":{"type":"string"},"sysdigMonitorUrl":{"type":"string"},"sysdigSecureApiToken":{"type":"string","secret":true},"sysdigSecureInsecureTls":{"type":"boolean"},"sysdigSecureSkipPolicyv2msg":{"type":"boolean"},"sysdigSecureTeamId":{"type":"number"},"sysdigSecureTeamName":{"type":"string"},"sysdigSecureUrl":{"type":"string"}},"methods":{"terraformConfig":"pulumi:providers:sysdig/terraformConfig"}},"resources":{"sysdig:index/agentAccessKey:AgentAccessKey":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst myAgentAccessKey = new sysdig.AgentAccessKey(\"my_agent_access_key\", {\n    limit: 11,\n    reservation: 1,\n    teamId: 50012099,\n    metadata: {\n        test: \"yes\",\n        environment: \"development\",\n        team: \"awesome_team\",\n    },\n    enabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nmy_agent_access_key = sysdig.AgentAccessKey(\"my_agent_access_key\",\n    limit=11,\n    reservation=1,\n    team_id=50012099,\n    metadata={\n        \"test\": \"yes\",\n        \"environment\": \"development\",\n        \"team\": \"awesome_team\",\n    },\n    enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myAgentAccessKey = new Sysdig.AgentAccessKey(\"my_agent_access_key\", new()\n    {\n        Limit = 11,\n        Reservation = 1,\n        TeamId = 50012099,\n        Metadata = \n        {\n            { \"test\", \"yes\" },\n            { \"environment\", \"development\" },\n            { \"team\", \"awesome_team\" },\n        },\n        Enabled = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewAgentAccessKey(ctx, \"my_agent_access_key\", \u0026sysdig.AgentAccessKeyArgs{\n\t\t\tLimit:       pulumi.Float64(11),\n\t\t\tReservation: pulumi.Float64(1),\n\t\t\tTeamId:      pulumi.Float64(50012099),\n\t\t\tMetadata: pulumi.StringMap{\n\t\t\t\t\"test\":        pulumi.String(\"yes\"),\n\t\t\t\t\"environment\": pulumi.String(\"development\"),\n\t\t\t\t\"team\":        pulumi.String(\"awesome_team\"),\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.AgentAccessKey;\nimport com.pulumi.sysdig.AgentAccessKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var myAgentAccessKey = new AgentAccessKey(\"myAgentAccessKey\", AgentAccessKeyArgs.builder()\n            .limit(11.0)\n            .reservation(1.0)\n            .teamId(50012099.0)\n            .metadata(Map.ofEntries(\n                Map.entry(\"test\", \"yes\"),\n                Map.entry(\"environment\", \"development\"),\n                Map.entry(\"team\", \"awesome_team\")\n            ))\n            .enabled(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  myAgentAccessKey:\n    type: sysdig:AgentAccessKey\n    name: my_agent_access_key\n    properties:\n      limit: 11\n      reservation: 1\n      teamId: 5.0012099e+07\n      metadata:\n        test: yes\n        environment: development\n        team: awesome_team\n      enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSysdig group mapping can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/agentAccessKey:AgentAccessKey my_agent_access_key \"631123\"\n```\n","properties":{"accessKey":{"type":"string","description":"The agent access key.\n","secret":true},"agentAccessKeyId":{"type":"string"},"dateCreated":{"type":"string","description":"Date when the agent key was created.\n"},"dateDisabled":{"type":"string","description":"Date when the agent key was last disabled.\n"},"enabled":{"type":"boolean","description":"Whether the agent access key is enabled or not. It is only used in update actions, an agent access keys can be deleted only if it's disabled.\n"},"limit":{"type":"number","description":"The limit of the agent access key.\n"},"metadata":{"type":"object","additionalProperties":{"type":"string"},"description":"The metadata of agent access key.\n"},"reservation":{"type":"number","description":"The reservation of the agent access key.\n"},"teamId":{"type":"number","description":"The team id of the agent access key.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FAgentAccessKeyTimeouts:AgentAccessKeyTimeouts"}},"type":"object","required":["accessKey","agentAccessKeyId","dateCreated","dateDisabled"],"inputProperties":{"agentAccessKeyId":{"type":"string"},"enabled":{"type":"boolean","description":"Whether the agent access key is enabled or not. It is only used in update actions, an agent access keys can be deleted only if it's disabled.\n"},"limit":{"type":"number","description":"The limit of the agent access key.\n"},"metadata":{"type":"object","additionalProperties":{"type":"string"},"description":"The metadata of agent access key.\n"},"reservation":{"type":"number","description":"The reservation of the agent access key.\n"},"teamId":{"type":"number","description":"The team id of the agent access key.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FAgentAccessKeyTimeouts:AgentAccessKeyTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering AgentAccessKey resources.\n","properties":{"accessKey":{"type":"string","description":"The agent access key.\n","secret":true},"agentAccessKeyId":{"type":"string"},"dateCreated":{"type":"string","description":"Date when the agent key was created.\n"},"dateDisabled":{"type":"string","description":"Date when the agent key was last disabled.\n"},"enabled":{"type":"boolean","description":"Whether the agent access key is enabled or not. It is only used in update actions, an agent access keys can be deleted only if it's disabled.\n"},"limit":{"type":"number","description":"The limit of the agent access key.\n"},"metadata":{"type":"object","additionalProperties":{"type":"string"},"description":"The metadata of agent access key.\n"},"reservation":{"type":"number","description":"The reservation of the agent access key.\n"},"teamId":{"type":"number","description":"The team id of the agent access key.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FAgentAccessKeyTimeouts:AgentAccessKeyTimeouts"}},"type":"object"}},"sysdig:index/customRole:CustomRole":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst my_custom_role = new sysdig.CustomRole(\"my-custom-role\", {\n    name: \"custom-role-name\",\n    description: \"test\",\n    permissions: {\n        monitorPermissions: [\"kubernetes-api-commands.read\"],\n        securePermissions: [\"scanning.read\"],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nmy_custom_role = sysdig.CustomRole(\"my-custom-role\",\n    name=\"custom-role-name\",\n    description=\"test\",\n    permissions={\n        \"monitor_permissions\": [\"kubernetes-api-commands.read\"],\n        \"secure_permissions\": [\"scanning.read\"],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var my_custom_role = new Sysdig.CustomRole(\"my-custom-role\", new()\n    {\n        Name = \"custom-role-name\",\n        Description = \"test\",\n        Permissions = new Sysdig.Inputs.CustomRolePermissionsArgs\n        {\n            MonitorPermissions = new[]\n            {\n                \"kubernetes-api-commands.read\",\n            },\n            SecurePermissions = new[]\n            {\n                \"scanning.read\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewCustomRole(ctx, \"my-custom-role\", \u0026sysdig.CustomRoleArgs{\n\t\t\tName:        pulumi.String(\"custom-role-name\"),\n\t\t\tDescription: pulumi.String(\"test\"),\n\t\t\tPermissions: \u0026sysdig.CustomRolePermissionsArgs{\n\t\t\t\tMonitorPermissions: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"kubernetes-api-commands.read\"),\n\t\t\t\t},\n\t\t\t\tSecurePermissions: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"scanning.read\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.CustomRole;\nimport com.pulumi.sysdig.CustomRoleArgs;\nimport com.pulumi.sysdig.inputs.CustomRolePermissionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var my_custom_role = new CustomRole(\"my-custom-role\", CustomRoleArgs.builder()\n            .name(\"custom-role-name\")\n            .description(\"test\")\n            .permissions(CustomRolePermissionsArgs.builder()\n                .monitorPermissions(\"kubernetes-api-commands.read\")\n                .securePermissions(\"scanning.read\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  my-custom-role:\n    type: sysdig:CustomRole\n    properties:\n      name: custom-role-name\n      description: test\n      permissions:\n        monitorPermissions:\n          - kubernetes-api-commands.read\n        securePermissions:\n          - scanning.read\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSysdig group mapping can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/customRole:CustomRole my_custom_role 50\n```\n","properties":{"customRoleId":{"type":"string"},"description":{"type":"string","description":"Additional long description.\n"},"name":{"type":"string","description":"The custom role name.\n"},"permissions":{"$ref":"#/types/sysdig:index%2FCustomRolePermissions:CustomRolePermissions","description":"Block to define monitor and secure permissions.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FCustomRoleTimeouts:CustomRoleTimeouts"}},"type":"object","required":["customRoleId","name","permissions"],"inputProperties":{"customRoleId":{"type":"string"},"description":{"type":"string","description":"Additional long description.\n"},"name":{"type":"string","description":"The custom role name.\n"},"permissions":{"$ref":"#/types/sysdig:index%2FCustomRolePermissions:CustomRolePermissions","description":"Block to define monitor and secure permissions.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FCustomRoleTimeouts:CustomRoleTimeouts"}},"requiredInputs":["permissions"],"stateInputs":{"description":"Input properties used for looking up and filtering CustomRole resources.\n","properties":{"customRoleId":{"type":"string"},"description":{"type":"string","description":"Additional long description.\n"},"name":{"type":"string","description":"The custom role name.\n"},"permissions":{"$ref":"#/types/sysdig:index%2FCustomRolePermissions:CustomRolePermissions","description":"Block to define monitor and secure permissions.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FCustomRoleTimeouts:CustomRoleTimeouts"}},"type":"object"}},"sysdig:index/groupMapping:GroupMapping":{"description":"## Example Usage\n\n### Regular users\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst myGroup = new sysdig.GroupMapping(\"my_group\", {\n    groupName: \"my-group\",\n    role: \"ROLE_TEAM_STANDARD\",\n    systemRole: \"ROLE_USER\",\n    teamMap: {\n        allTeams: false,\n        teamIds: [\n            myTeam.id,\n            myTeamSysdigMonitorTeam.id,\n        ],\n    },\n    weight: 10,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nmy_group = sysdig.GroupMapping(\"my_group\",\n    group_name=\"my-group\",\n    role=\"ROLE_TEAM_STANDARD\",\n    system_role=\"ROLE_USER\",\n    team_map={\n        \"all_teams\": False,\n        \"team_ids\": [\n            my_team[\"id\"],\n            my_team_sysdig_monitor_team[\"id\"],\n        ],\n    },\n    weight=10)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myGroup = new Sysdig.GroupMapping(\"my_group\", new()\n    {\n        GroupName = \"my-group\",\n        Role = \"ROLE_TEAM_STANDARD\",\n        SystemRole = \"ROLE_USER\",\n        TeamMap = new Sysdig.Inputs.GroupMappingTeamMapArgs\n        {\n            AllTeams = false,\n            TeamIds = new[]\n            {\n                myTeam.Id,\n                myTeamSysdigMonitorTeam.Id,\n            },\n        },\n        Weight = 10,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewGroupMapping(ctx, \"my_group\", \u0026sysdig.GroupMappingArgs{\n\t\t\tGroupName:  pulumi.String(\"my-group\"),\n\t\t\tRole:       pulumi.String(\"ROLE_TEAM_STANDARD\"),\n\t\t\tSystemRole: pulumi.String(\"ROLE_USER\"),\n\t\t\tTeamMap: \u0026sysdig.GroupMappingTeamMapArgs{\n\t\t\t\tAllTeams: pulumi.Bool(false),\n\t\t\t\tTeamIds: pulumi.Float64Array{\n\t\t\t\t\tmyTeam.Id,\n\t\t\t\t\tmyTeamSysdigMonitorTeam.Id,\n\t\t\t\t},\n\t\t\t},\n\t\t\tWeight: pulumi.Float64(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.GroupMapping;\nimport com.pulumi.sysdig.GroupMappingArgs;\nimport com.pulumi.sysdig.inputs.GroupMappingTeamMapArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var myGroup = new GroupMapping(\"myGroup\", GroupMappingArgs.builder()\n            .groupName(\"my-group\")\n            .role(\"ROLE_TEAM_STANDARD\")\n            .systemRole(\"ROLE_USER\")\n            .teamMap(GroupMappingTeamMapArgs.builder()\n                .allTeams(false)\n                .teamIds(                \n                    myTeam.id(),\n                    myTeamSysdigMonitorTeam.id())\n                .build())\n            .weight(10.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  myGroup:\n    type: sysdig:GroupMapping\n    name: my_group\n    properties:\n      groupName: my-group\n      role: ROLE_TEAM_STANDARD\n      systemRole: ROLE_USER\n      teamMap:\n        allTeams: false\n        teamIds:\n          - ${myTeam.id}\n          - ${myTeamSysdigMonitorTeam.id}\n      weight: 10\n```\n\u003c!--End PulumiCodeChooser --\u003e\nThis way, we define a group mapping named \"my-group\" for a user who will have a standard role in two teams.\n\n### Admin users\nIf the group members should assume the Sysdig administrator role the mapping should be created this way\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst admin = new sysdig.GroupMapping(\"admin\", {\n    groupName: \"admin\",\n    role: \"ROLE_TEAM_MANAGER\",\n    systemRole: \"ROLE_CUSTOMER\",\n    teamMap: {\n        allTeams: true,\n        teamIds: [],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nadmin = sysdig.GroupMapping(\"admin\",\n    group_name=\"admin\",\n    role=\"ROLE_TEAM_MANAGER\",\n    system_role=\"ROLE_CUSTOMER\",\n    team_map={\n        \"all_teams\": True,\n        \"team_ids\": [],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var admin = new Sysdig.GroupMapping(\"admin\", new()\n    {\n        GroupName = \"admin\",\n        Role = \"ROLE_TEAM_MANAGER\",\n        SystemRole = \"ROLE_CUSTOMER\",\n        TeamMap = new Sysdig.Inputs.GroupMappingTeamMapArgs\n        {\n            AllTeams = true,\n            TeamIds = new() { },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewGroupMapping(ctx, \"admin\", \u0026sysdig.GroupMappingArgs{\n\t\t\tGroupName:  pulumi.String(\"admin\"),\n\t\t\tRole:       pulumi.String(\"ROLE_TEAM_MANAGER\"),\n\t\t\tSystemRole: pulumi.String(\"ROLE_CUSTOMER\"),\n\t\t\tTeamMap: \u0026sysdig.GroupMappingTeamMapArgs{\n\t\t\t\tAllTeams: pulumi.Bool(true),\n\t\t\t\tTeamIds:  pulumi.Float64Array{},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.GroupMapping;\nimport com.pulumi.sysdig.GroupMappingArgs;\nimport com.pulumi.sysdig.inputs.GroupMappingTeamMapArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var admin = new GroupMapping(\"admin\", GroupMappingArgs.builder()\n            .groupName(\"admin\")\n            .role(\"ROLE_TEAM_MANAGER\")\n            .systemRole(\"ROLE_CUSTOMER\")\n            .teamMap(GroupMappingTeamMapArgs.builder()\n                .allTeams(true)\n                .teamIds()\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  admin:\n    type: sysdig:GroupMapping\n    properties:\n      groupName: admin\n      role: ROLE_TEAM_MANAGER\n      systemRole: ROLE_CUSTOMER\n      teamMap:\n        allTeams: true\n        teamIds: []\n```\n\u003c!--End PulumiCodeChooser --\u003e\nThe name doesn’t necessarily have to be “admin,” it’s just an example. The important aspects are the roles and the\u003cspan pulumi-lang-nodejs=\" teamMap\n\" pulumi-lang-dotnet=\" TeamMap\n\" pulumi-lang-go=\" teamMap\n\" pulumi-lang-python=\" team_map\n\" pulumi-lang-yaml=\" teamMap\n\" pulumi-lang-java=\" teamMap\n\"\u003e team_map\n\u003c/span\u003e\n\n## Import\n\nSysdig group mapping can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/groupMapping:GroupMapping my_group 24267\n```\n","properties":{"groupMappingId":{"type":"string"},"groupName":{"type":"string","description":"The group name to be mapped.\n"},"role":{"type":"string","description":"The role that is assigned to the users. It can be a standard role or a custom team role ID.\n"},"systemRole":{"type":"string","description":"The system role that is assigned to the users. The supported values are: \n* `ROLE_USER` for regular users (Default if not specified)\n* `ROLE_CUSTOMER` for admin users\n"},"teamMap":{"$ref":"#/types/sysdig:index%2FGroupMappingTeamMap:GroupMappingTeamMap","description":"Block to define team mapping.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FGroupMappingTimeouts:GroupMappingTimeouts"},"weight":{"type":"number","description":"The group mapping weight used to solve conflicts. Weight is a positive number, lower number has higher priority.\n"}},"type":"object","required":["groupMappingId","groupName","role","systemRole","teamMap"],"inputProperties":{"groupMappingId":{"type":"string"},"groupName":{"type":"string","description":"The group name to be mapped.\n"},"role":{"type":"string","description":"The role that is assigned to the users. It can be a standard role or a custom team role ID.\n"},"systemRole":{"type":"string","description":"The system role that is assigned to the users. The supported values are: \n* `ROLE_USER` for regular users (Default if not specified)\n* `ROLE_CUSTOMER` for admin users\n"},"teamMap":{"$ref":"#/types/sysdig:index%2FGroupMappingTeamMap:GroupMappingTeamMap","description":"Block to define team mapping.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FGroupMappingTimeouts:GroupMappingTimeouts"},"weight":{"type":"number","description":"The group mapping weight used to solve conflicts. Weight is a positive number, lower number has higher priority.\n"}},"requiredInputs":["groupName","role","teamMap"],"stateInputs":{"description":"Input properties used for looking up and filtering GroupMapping resources.\n","properties":{"groupMappingId":{"type":"string"},"groupName":{"type":"string","description":"The group name to be mapped.\n"},"role":{"type":"string","description":"The role that is assigned to the users. It can be a standard role or a custom team role ID.\n"},"systemRole":{"type":"string","description":"The system role that is assigned to the users. The supported values are: \n* `ROLE_USER` for regular users (Default if not specified)\n* `ROLE_CUSTOMER` for admin users\n"},"teamMap":{"$ref":"#/types/sysdig:index%2FGroupMappingTeamMap:GroupMappingTeamMap","description":"Block to define team mapping.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FGroupMappingTimeouts:GroupMappingTimeouts"},"weight":{"type":"number","description":"The group mapping weight used to solve conflicts. Weight is a positive number, lower number has higher priority.\n"}},"type":"object"}},"sysdig:index/groupMappingConfig:GroupMappingConfig":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst resolutionStrategies = new sysdig.GroupMappingConfig(\"resolution_strategies\", {\n    noMappingStrategy: \"UNAUTHORIZED\",\n    differentTeamSameRoleStrategy: \"UNAUTHORIZED\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nresolution_strategies = sysdig.GroupMappingConfig(\"resolution_strategies\",\n    no_mapping_strategy=\"UNAUTHORIZED\",\n    different_team_same_role_strategy=\"UNAUTHORIZED\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var resolutionStrategies = new Sysdig.GroupMappingConfig(\"resolution_strategies\", new()\n    {\n        NoMappingStrategy = \"UNAUTHORIZED\",\n        DifferentTeamSameRoleStrategy = \"UNAUTHORIZED\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewGroupMappingConfig(ctx, \"resolution_strategies\", \u0026sysdig.GroupMappingConfigArgs{\n\t\t\tNoMappingStrategy:             pulumi.String(\"UNAUTHORIZED\"),\n\t\t\tDifferentTeamSameRoleStrategy: pulumi.String(\"UNAUTHORIZED\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.GroupMappingConfig;\nimport com.pulumi.sysdig.GroupMappingConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var resolutionStrategies = new GroupMappingConfig(\"resolutionStrategies\", GroupMappingConfigArgs.builder()\n            .noMappingStrategy(\"UNAUTHORIZED\")\n            .differentTeamSameRoleStrategy(\"UNAUTHORIZED\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  resolutionStrategies:\n    type: sysdig:GroupMappingConfig\n    name: resolution_strategies\n    properties:\n      noMappingStrategy: UNAUTHORIZED\n      differentTeamSameRoleStrategy: UNAUTHORIZED\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSysdig group mapping config can be imported, e.g.\n\n```sh\n$ pulumi import sysdig:index/groupMappingConfig:GroupMappingConfig resolution_strategies conflicts_resolution_strategies\n```\n","properties":{"differentTeamSameRoleStrategy":{"type":"string","description":"Sets how the system behaves when conflicting group mapping information received. Possible values are: `UNAUTHORIZED`, `FIRST_MATCH`, `WEIGHTED`\n"},"groupMappingConfigId":{"type":"string"},"noMappingStrategy":{"type":"string","description":"Sets how the system behaves when no group mapping information received from the IdP or Group information received, but the user is not a member of any mapped group. Possible values are: `UNAUTHORIZED`, `DEFAULT_TEAM_DEFAULT_ROLE`\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FGroupMappingConfigTimeouts:GroupMappingConfigTimeouts"}},"type":"object","required":["differentTeamSameRoleStrategy","groupMappingConfigId","noMappingStrategy"],"inputProperties":{"differentTeamSameRoleStrategy":{"type":"string","description":"Sets how the system behaves when conflicting group mapping information received. Possible values are: `UNAUTHORIZED`, `FIRST_MATCH`, `WEIGHTED`\n"},"groupMappingConfigId":{"type":"string"},"noMappingStrategy":{"type":"string","description":"Sets how the system behaves when no group mapping information received from the IdP or Group information received, but the user is not a member of any mapped group. Possible values are: `UNAUTHORIZED`, `DEFAULT_TEAM_DEFAULT_ROLE`\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FGroupMappingConfigTimeouts:GroupMappingConfigTimeouts"}},"requiredInputs":["differentTeamSameRoleStrategy","noMappingStrategy"],"stateInputs":{"description":"Input properties used for looking up and filtering GroupMappingConfig resources.\n","properties":{"differentTeamSameRoleStrategy":{"type":"string","description":"Sets how the system behaves when conflicting group mapping information received. Possible values are: `UNAUTHORIZED`, `FIRST_MATCH`, `WEIGHTED`\n"},"groupMappingConfigId":{"type":"string"},"noMappingStrategy":{"type":"string","description":"Sets how the system behaves when no group mapping information received from the IdP or Group information received, but the user is not a member of any mapped group. Possible values are: `UNAUTHORIZED`, `DEFAULT_TEAM_DEFAULT_ROLE`\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FGroupMappingConfigTimeouts:GroupMappingConfigTimeouts"}},"type":"object"}},"sysdig:index/ipFilter:IpFilter":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.IpFilter(\"example\", {\n    ipRange: \"192.168.100.0/24\",\n    note: \"Office IP range\",\n    enabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.IpFilter(\"example\",\n    ip_range=\"192.168.100.0/24\",\n    note=\"Office IP range\",\n    enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.IpFilter(\"example\", new()\n    {\n        IpRange = \"192.168.100.0/24\",\n        Note = \"Office IP range\",\n        Enabled = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewIpFilter(ctx, \"example\", \u0026sysdig.IpFilterArgs{\n\t\t\tIpRange: pulumi.String(\"192.168.100.0/24\"),\n\t\t\tNote:    pulumi.String(\"Office IP range\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.IpFilter;\nimport com.pulumi.sysdig.IpFilterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IpFilter(\"example\", IpFilterArgs.builder()\n            .ipRange(\"192.168.100.0/24\")\n            .note(\"Office IP range\")\n            .enabled(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:IpFilter\n    properties:\n      ipRange: 192.168.100.0/24\n      note: Office IP range\n      enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\nThis example creates a filter for IP range 192.168.100.0/24, with a note indicating it's for an office IP range, and it's enabled.\n\n## Import\n\nSysdig IP filter can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/ipFilter:IpFilter example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"Specifies whether the IP range is enabled.\n"},"ipFilterId":{"type":"string","description":"The ID of the allowed IP range.\n"},"ipRange":{"type":"string","description":"The IP range to allow access to the Sysdig platform. Must be in CIDR notation.\n"},"note":{"type":"string","description":"A note describing the allowed IP range.\n"}},"type":"object","required":["enabled","ipFilterId","ipRange"],"inputProperties":{"enabled":{"type":"boolean","description":"Specifies whether the IP range is enabled.\n"},"ipFilterId":{"type":"string","description":"The ID of the allowed IP range.\n"},"ipRange":{"type":"string","description":"The IP range to allow access to the Sysdig platform. Must be in CIDR notation.\n"},"note":{"type":"string","description":"A note describing the allowed IP range.\n"}},"requiredInputs":["enabled","ipRange"],"stateInputs":{"description":"Input properties used for looking up and filtering IpFilter resources.\n","properties":{"enabled":{"type":"boolean","description":"Specifies whether the IP range is enabled.\n"},"ipFilterId":{"type":"string","description":"The ID of the allowed IP range.\n"},"ipRange":{"type":"string","description":"The IP range to allow access to the Sysdig platform. Must be in CIDR notation.\n"},"note":{"type":"string","description":"A note describing the allowed IP range.\n"}},"type":"object"}},"sysdig:index/ipFilteringSettings:IpFilteringSettings":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.IpFilteringSettings(\"example\", {ipFilteringEnabled: true});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.IpFilteringSettings(\"example\", ip_filtering_enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.IpFilteringSettings(\"example\", new()\n    {\n        IpFilteringEnabled = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewIpFilteringSettings(ctx, \"example\", \u0026sysdig.IpFilteringSettingsArgs{\n\t\t\tIpFilteringEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.IpFilteringSettings;\nimport com.pulumi.sysdig.IpFilteringSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IpFilteringSettings(\"example\", IpFilteringSettingsArgs.builder()\n            .ipFilteringEnabled(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:IpFilteringSettings\n    properties:\n      ipFilteringEnabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\nThis example enables the IP filtering feature.\n\n## Import\n\nSysdig IP filters settings can be imported, e.g.\n\n```sh\n$ pulumi import sysdig:index/ipFilteringSettings:IpFilteringSettings example ip_filtering_settings_id\n```\n","properties":{"ipFilteringEnabled":{"type":"boolean","description":"Specifies whether the IP filtering feature is enabled.\n"},"ipFilteringSettingsId":{"type":"string"}},"type":"object","required":["ipFilteringEnabled","ipFilteringSettingsId"],"inputProperties":{"ipFilteringEnabled":{"type":"boolean","description":"Specifies whether the IP filtering feature is enabled.\n"},"ipFilteringSettingsId":{"type":"string"}},"requiredInputs":["ipFilteringEnabled"],"stateInputs":{"description":"Input properties used for looking up and filtering IpFilteringSettings resources.\n","properties":{"ipFilteringEnabled":{"type":"boolean","description":"Specifies whether the IP filtering feature is enabled.\n"},"ipFilteringSettingsId":{"type":"string"}},"type":"object"}},"sysdig:index/monitorAlertV2Change:MonitorAlertV2Change":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2Change(\"sample\", {\n    name: \"high cpu used compared to previous periods\",\n    severity: \"high\",\n    metric: \"sysdig_container_cpu_used_percent\",\n    groupAggregation: \"avg\",\n    timeAggregation: \"avg\",\n    operator: \"\u003e\",\n    threshold: 75,\n    groupBies: [\"kube_pod_name\"],\n    scopes: [\n        {\n            label: \"kube_cluster_name\",\n            operator: \"in\",\n            values: [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            label: \"kube_deployment_name\",\n            operator: \"equals\",\n            values: [\"my_deployment\"],\n        },\n    ],\n    notificationChannels: [{\n        id: 1234,\n        renotifyEveryMinutes: 60,\n    }],\n    shorterTimeRangeSeconds: 300,\n    longerTimeRangeSeconds: 3600,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2Change(\"sample\",\n    name=\"high cpu used compared to previous periods\",\n    severity=\"high\",\n    metric=\"sysdig_container_cpu_used_percent\",\n    group_aggregation=\"avg\",\n    time_aggregation=\"avg\",\n    operator=\"\u003e\",\n    threshold=75,\n    group_bies=[\"kube_pod_name\"],\n    scopes=[\n        {\n            \"label\": \"kube_cluster_name\",\n            \"operator\": \"in\",\n            \"values\": [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            \"label\": \"kube_deployment_name\",\n            \"operator\": \"equals\",\n            \"values\": [\"my_deployment\"],\n        },\n    ],\n    notification_channels=[{\n        \"id\": 1234,\n        \"renotify_every_minutes\": 60,\n    }],\n    shorter_time_range_seconds=300,\n    longer_time_range_seconds=3600)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2Change(\"sample\", new()\n    {\n        Name = \"high cpu used compared to previous periods\",\n        Severity = \"high\",\n        Metric = \"sysdig_container_cpu_used_percent\",\n        GroupAggregation = \"avg\",\n        TimeAggregation = \"avg\",\n        Operator = \"\u003e\",\n        Threshold = 75,\n        GroupBies = new[]\n        {\n            \"kube_pod_name\",\n        },\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2ChangeScopeArgs\n            {\n                Label = \"kube_cluster_name\",\n                Operator = \"in\",\n                Values = new[]\n                {\n                    \"my_cluster_1\",\n                    \"my_cluster_2\",\n                },\n            },\n            new Sysdig.Inputs.MonitorAlertV2ChangeScopeArgs\n            {\n                Label = \"kube_deployment_name\",\n                Operator = \"equals\",\n                Values = new[]\n                {\n                    \"my_deployment\",\n                },\n            },\n        },\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2ChangeNotificationChannelArgs\n            {\n                Id = 1234,\n                RenotifyEveryMinutes = 60,\n            },\n        },\n        ShorterTimeRangeSeconds = 300,\n        LongerTimeRangeSeconds = 3600,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2Change(ctx, \"sample\", \u0026sysdig.MonitorAlertV2ChangeArgs{\n\t\t\tName:             pulumi.String(\"high cpu used compared to previous periods\"),\n\t\t\tSeverity:         pulumi.String(\"high\"),\n\t\t\tMetric:           pulumi.String(\"sysdig_container_cpu_used_percent\"),\n\t\t\tGroupAggregation: pulumi.String(\"avg\"),\n\t\t\tTimeAggregation:  pulumi.String(\"avg\"),\n\t\t\tOperator:         pulumi.String(\"\u003e\"),\n\t\t\tThreshold:        pulumi.Float64(75),\n\t\t\tGroupBies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kube_pod_name\"),\n\t\t\t},\n\t\t\tScopes: sysdig.MonitorAlertV2ChangeScopeArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2ChangeScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_cluster_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"in\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_cluster_1\"),\n\t\t\t\t\t\tpulumi.String(\"my_cluster_2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorAlertV2ChangeScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_deployment_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"equals\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_deployment\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2ChangeNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2ChangeNotificationChannelArgs{\n\t\t\t\t\tId:                   pulumi.Float64(1234),\n\t\t\t\t\tRenotifyEveryMinutes: pulumi.Float64(60),\n\t\t\t\t},\n\t\t\t},\n\t\t\tShorterTimeRangeSeconds: pulumi.Float64(300),\n\t\t\tLongerTimeRangeSeconds:  pulumi.Float64(3600),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2Change;\nimport com.pulumi.sysdig.MonitorAlertV2ChangeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2ChangeScopeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2ChangeNotificationChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2Change(\"sample\", MonitorAlertV2ChangeArgs.builder()\n            .name(\"high cpu used compared to previous periods\")\n            .severity(\"high\")\n            .metric(\"sysdig_container_cpu_used_percent\")\n            .groupAggregation(\"avg\")\n            .timeAggregation(\"avg\")\n            .operator(\"\u003e\")\n            .threshold(75.0)\n            .groupBies(\"kube_pod_name\")\n            .scopes(            \n                MonitorAlertV2ChangeScopeArgs.builder()\n                    .label(\"kube_cluster_name\")\n                    .operator(\"in\")\n                    .values(                    \n                        \"my_cluster_1\",\n                        \"my_cluster_2\")\n                    .build(),\n                MonitorAlertV2ChangeScopeArgs.builder()\n                    .label(\"kube_deployment_name\")\n                    .operator(\"equals\")\n                    .values(\"my_deployment\")\n                    .build())\n            .notificationChannels(MonitorAlertV2ChangeNotificationChannelArgs.builder()\n                .id(1234.0)\n                .renotifyEveryMinutes(60.0)\n                .build())\n            .shorterTimeRangeSeconds(300.0)\n            .longerTimeRangeSeconds(3600.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2Change\n    properties:\n      name: high cpu used compared to previous periods\n      severity: high\n      metric: sysdig_container_cpu_used_percent\n      groupAggregation: avg\n      timeAggregation: avg\n      operator: '\u003e'\n      threshold: 75\n      groupBies:\n        - kube_pod_name\n      scopes:\n        - label: kube_cluster_name\n          operator: in\n          values:\n            - my_cluster_1\n            - my_cluster_2\n        - label: kube_deployment_name\n          operator: equals\n          values:\n            - my_deployment\n      notificationChannels:\n        - id: 1234\n          renotifyEveryMinutes: 60\n      shorterTimeRangeSeconds: 300\n      longerTimeRangeSeconds: 3600\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPercentage of Change alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2Change:MonitorAlertV2Change example 12345\n```\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCapture:MonitorAlertV2ChangeCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCustomNotification:MonitorAlertV2ChangeCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeLink:MonitorAlertV2ChangeLink"}},"longerTimeRangeSeconds":{"type":"number"},"metric":{"type":"string"},"monitorAlertV2ChangeId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeNotificationChannel:MonitorAlertV2ChangeNotificationChannel"}},"operator":{"type":"string"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeScope:MonitorAlertV2ChangeScope"}},"severity":{"type":"string"},"shorterTimeRangeSeconds":{"type":"number"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeTimeouts:MonitorAlertV2ChangeTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object","required":["groupAggregation","longerTimeRangeSeconds","metric","monitorAlertV2ChangeId","name","operator","shorterTimeRangeSeconds","team","threshold","timeAggregation","version"],"inputProperties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCapture:MonitorAlertV2ChangeCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCustomNotification:MonitorAlertV2ChangeCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeLink:MonitorAlertV2ChangeLink"}},"longerTimeRangeSeconds":{"type":"number"},"metric":{"type":"string"},"monitorAlertV2ChangeId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeNotificationChannel:MonitorAlertV2ChangeNotificationChannel"}},"operator":{"type":"string"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeScope:MonitorAlertV2ChangeScope"}},"severity":{"type":"string"},"shorterTimeRangeSeconds":{"type":"number"},"threshold":{"type":"number"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeTimeouts:MonitorAlertV2ChangeTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"warningThreshold":{"type":"string"}},"requiredInputs":["groupAggregation","longerTimeRangeSeconds","metric","operator","shorterTimeRangeSeconds","threshold","timeAggregation"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2Change resources.\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCapture:MonitorAlertV2ChangeCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeCustomNotification:MonitorAlertV2ChangeCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeLink:MonitorAlertV2ChangeLink"}},"longerTimeRangeSeconds":{"type":"number"},"metric":{"type":"string"},"monitorAlertV2ChangeId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeNotificationChannel:MonitorAlertV2ChangeNotificationChannel"}},"operator":{"type":"string"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeScope:MonitorAlertV2ChangeScope"}},"severity":{"type":"string"},"shorterTimeRangeSeconds":{"type":"number"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2ChangeTimeouts:MonitorAlertV2ChangeTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object"}},"sysdig:index/monitorAlertV2Downtime:MonitorAlertV2Downtime":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2Downtime(\"sample\", {\n    name: \"process down\",\n    severity: \"high\",\n    metric: \"sysdig_program_up\",\n    threshold: 75,\n    groupBies: [\n        \"host_hostname\",\n        \"program_name\",\n    ],\n    scopes: [{\n        label: \"host_hostname\",\n        operator: \"in\",\n        values: [\n            \"my-cluster-1\",\n            \"my-server-2\",\n        ],\n    }],\n    notificationChannels: [{\n        id: 1234,\n    }],\n    rangeSeconds: 600,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2Downtime(\"sample\",\n    name=\"process down\",\n    severity=\"high\",\n    metric=\"sysdig_program_up\",\n    threshold=75,\n    group_bies=[\n        \"host_hostname\",\n        \"program_name\",\n    ],\n    scopes=[{\n        \"label\": \"host_hostname\",\n        \"operator\": \"in\",\n        \"values\": [\n            \"my-cluster-1\",\n            \"my-server-2\",\n        ],\n    }],\n    notification_channels=[{\n        \"id\": 1234,\n    }],\n    range_seconds=600)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2Downtime(\"sample\", new()\n    {\n        Name = \"process down\",\n        Severity = \"high\",\n        Metric = \"sysdig_program_up\",\n        Threshold = 75,\n        GroupBies = new[]\n        {\n            \"host_hostname\",\n            \"program_name\",\n        },\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2DowntimeScopeArgs\n            {\n                Label = \"host_hostname\",\n                Operator = \"in\",\n                Values = new[]\n                {\n                    \"my-cluster-1\",\n                    \"my-server-2\",\n                },\n            },\n        },\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2DowntimeNotificationChannelArgs\n            {\n                Id = 1234,\n            },\n        },\n        RangeSeconds = 600,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2Downtime(ctx, \"sample\", \u0026sysdig.MonitorAlertV2DowntimeArgs{\n\t\t\tName:      pulumi.String(\"process down\"),\n\t\t\tSeverity:  pulumi.String(\"high\"),\n\t\t\tMetric:    pulumi.String(\"sysdig_program_up\"),\n\t\t\tThreshold: pulumi.Float64(75),\n\t\t\tGroupBies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"host_hostname\"),\n\t\t\t\tpulumi.String(\"program_name\"),\n\t\t\t},\n\t\t\tScopes: sysdig.MonitorAlertV2DowntimeScopeArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2DowntimeScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"host_hostname\"),\n\t\t\t\t\tOperator: pulumi.String(\"in\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my-cluster-1\"),\n\t\t\t\t\t\tpulumi.String(\"my-server-2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2DowntimeNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2DowntimeNotificationChannelArgs{\n\t\t\t\t\tId: pulumi.Float64(1234),\n\t\t\t\t},\n\t\t\t},\n\t\t\tRangeSeconds: pulumi.Float64(600),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2Downtime;\nimport com.pulumi.sysdig.MonitorAlertV2DowntimeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2DowntimeScopeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2DowntimeNotificationChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2Downtime(\"sample\", MonitorAlertV2DowntimeArgs.builder()\n            .name(\"process down\")\n            .severity(\"high\")\n            .metric(\"sysdig_program_up\")\n            .threshold(75.0)\n            .groupBies(            \n                \"host_hostname\",\n                \"program_name\")\n            .scopes(MonitorAlertV2DowntimeScopeArgs.builder()\n                .label(\"host_hostname\")\n                .operator(\"in\")\n                .values(                \n                    \"my-cluster-1\",\n                    \"my-server-2\")\n                .build())\n            .notificationChannels(MonitorAlertV2DowntimeNotificationChannelArgs.builder()\n                .id(1234.0)\n                .build())\n            .rangeSeconds(600.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2Downtime\n    properties:\n      name: process down\n      severity: high\n      metric: sysdig_program_up\n      threshold: 75\n      groupBies:\n        - host_hostname\n        - program_name\n      scopes:\n        - label: host_hostname\n          operator: in\n          values:\n            - my-cluster-1\n            - my-server-2\n      notificationChannels:\n        - id: 1234\n      rangeSeconds: 600\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nDowntime alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2Downtime:MonitorAlertV2Downtime example 12345\n```\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCapture:MonitorAlertV2DowntimeCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCustomNotification:MonitorAlertV2DowntimeCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeLink:MonitorAlertV2DowntimeLink"}},"metric":{"type":"string"},"monitorAlertV2DowntimeId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeNotificationChannel:MonitorAlertV2DowntimeNotificationChannel"}},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeScope:MonitorAlertV2DowntimeScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeTimeouts:MonitorAlertV2DowntimeTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"}},"type":"object","required":["metric","monitorAlertV2DowntimeId","name","rangeSeconds","team","version"],"inputProperties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCapture:MonitorAlertV2DowntimeCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCustomNotification:MonitorAlertV2DowntimeCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeLink:MonitorAlertV2DowntimeLink"}},"metric":{"type":"string"},"monitorAlertV2DowntimeId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeNotificationChannel:MonitorAlertV2DowntimeNotificationChannel"}},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeScope:MonitorAlertV2DowntimeScope"}},"severity":{"type":"string"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeTimeouts:MonitorAlertV2DowntimeTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"}},"requiredInputs":["metric"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2Downtime resources.\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCapture:MonitorAlertV2DowntimeCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeCustomNotification:MonitorAlertV2DowntimeCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeLink:MonitorAlertV2DowntimeLink"}},"metric":{"type":"string"},"monitorAlertV2DowntimeId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeNotificationChannel:MonitorAlertV2DowntimeNotificationChannel"}},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeScope:MonitorAlertV2DowntimeScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2DowntimeTimeouts:MonitorAlertV2DowntimeTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"}},"type":"object"}},"sysdig:index/monitorAlertV2Event:MonitorAlertV2Event":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2Event(\"sample\", {\n    name: \"[Kubernetes] Failed to pull image\",\n    description: \"A Kubernetes pod failed to pull an image from the registry\",\n    severity: \"high\",\n    filter: \"Failed to pull image\",\n    sources: [\"kubernetes\"],\n    operator: \"\u003e\",\n    threshold: 0,\n    groupBies: [\"kube_pod_name\"],\n    scopes: [\n        {\n            label: \"kube_cluster_name\",\n            operator: \"in\",\n            values: [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            label: \"kube_deployment_name\",\n            operator: \"equals\",\n            values: [\"my_deployment\"],\n        },\n    ],\n    notificationChannels: [{\n        id: 1234,\n        renotifyEveryMinutes: 60,\n    }],\n    rangeSeconds: 60,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2Event(\"sample\",\n    name=\"[Kubernetes] Failed to pull image\",\n    description=\"A Kubernetes pod failed to pull an image from the registry\",\n    severity=\"high\",\n    filter=\"Failed to pull image\",\n    sources=[\"kubernetes\"],\n    operator=\"\u003e\",\n    threshold=0,\n    group_bies=[\"kube_pod_name\"],\n    scopes=[\n        {\n            \"label\": \"kube_cluster_name\",\n            \"operator\": \"in\",\n            \"values\": [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            \"label\": \"kube_deployment_name\",\n            \"operator\": \"equals\",\n            \"values\": [\"my_deployment\"],\n        },\n    ],\n    notification_channels=[{\n        \"id\": 1234,\n        \"renotify_every_minutes\": 60,\n    }],\n    range_seconds=60)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2Event(\"sample\", new()\n    {\n        Name = \"[Kubernetes] Failed to pull image\",\n        Description = \"A Kubernetes pod failed to pull an image from the registry\",\n        Severity = \"high\",\n        Filter = \"Failed to pull image\",\n        Sources = new[]\n        {\n            \"kubernetes\",\n        },\n        Operator = \"\u003e\",\n        Threshold = 0,\n        GroupBies = new[]\n        {\n            \"kube_pod_name\",\n        },\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2EventScopeArgs\n            {\n                Label = \"kube_cluster_name\",\n                Operator = \"in\",\n                Values = new[]\n                {\n                    \"my_cluster_1\",\n                    \"my_cluster_2\",\n                },\n            },\n            new Sysdig.Inputs.MonitorAlertV2EventScopeArgs\n            {\n                Label = \"kube_deployment_name\",\n                Operator = \"equals\",\n                Values = new[]\n                {\n                    \"my_deployment\",\n                },\n            },\n        },\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2EventNotificationChannelArgs\n            {\n                Id = 1234,\n                RenotifyEveryMinutes = 60,\n            },\n        },\n        RangeSeconds = 60,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2Event(ctx, \"sample\", \u0026sysdig.MonitorAlertV2EventArgs{\n\t\t\tName:        pulumi.String(\"[Kubernetes] Failed to pull image\"),\n\t\t\tDescription: pulumi.String(\"A Kubernetes pod failed to pull an image from the registry\"),\n\t\t\tSeverity:    pulumi.String(\"high\"),\n\t\t\tFilter:      pulumi.String(\"Failed to pull image\"),\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kubernetes\"),\n\t\t\t},\n\t\t\tOperator:  pulumi.String(\"\u003e\"),\n\t\t\tThreshold: pulumi.Float64(0),\n\t\t\tGroupBies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kube_pod_name\"),\n\t\t\t},\n\t\t\tScopes: sysdig.MonitorAlertV2EventScopeArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2EventScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_cluster_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"in\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_cluster_1\"),\n\t\t\t\t\t\tpulumi.String(\"my_cluster_2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorAlertV2EventScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_deployment_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"equals\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_deployment\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2EventNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2EventNotificationChannelArgs{\n\t\t\t\t\tId:                   pulumi.Float64(1234),\n\t\t\t\t\tRenotifyEveryMinutes: pulumi.Float64(60),\n\t\t\t\t},\n\t\t\t},\n\t\t\tRangeSeconds: pulumi.Float64(60),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2Event;\nimport com.pulumi.sysdig.MonitorAlertV2EventArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2EventScopeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2EventNotificationChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2Event(\"sample\", MonitorAlertV2EventArgs.builder()\n            .name(\"[Kubernetes] Failed to pull image\")\n            .description(\"A Kubernetes pod failed to pull an image from the registry\")\n            .severity(\"high\")\n            .filter(\"Failed to pull image\")\n            .sources(\"kubernetes\")\n            .operator(\"\u003e\")\n            .threshold(0.0)\n            .groupBies(\"kube_pod_name\")\n            .scopes(            \n                MonitorAlertV2EventScopeArgs.builder()\n                    .label(\"kube_cluster_name\")\n                    .operator(\"in\")\n                    .values(                    \n                        \"my_cluster_1\",\n                        \"my_cluster_2\")\n                    .build(),\n                MonitorAlertV2EventScopeArgs.builder()\n                    .label(\"kube_deployment_name\")\n                    .operator(\"equals\")\n                    .values(\"my_deployment\")\n                    .build())\n            .notificationChannels(MonitorAlertV2EventNotificationChannelArgs.builder()\n                .id(1234.0)\n                .renotifyEveryMinutes(60.0)\n                .build())\n            .rangeSeconds(60.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2Event\n    properties:\n      name: '[Kubernetes] Failed to pull image'\n      description: A Kubernetes pod failed to pull an image from the registry\n      severity: high\n      filter: Failed to pull image\n      sources:\n        - kubernetes\n      operator: '\u003e'\n      threshold: 0\n      groupBies:\n        - kube_pod_name\n      scopes:\n        - label: kube_cluster_name\n          operator: in\n          values:\n            - my_cluster_1\n            - my_cluster_2\n        - label: kube_deployment_name\n          operator: equals\n          values:\n            - my_deployment\n      notificationChannels:\n        - id: 1234\n          renotifyEveryMinutes: 60\n      rangeSeconds: 60\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nEvent alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2Event:MonitorAlertV2Event example 12345\n```\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCapture:MonitorAlertV2EventCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCustomNotification:MonitorAlertV2EventCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"filter":{"type":"string"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventLink:MonitorAlertV2EventLink"}},"monitorAlertV2EventId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventNotificationChannel:MonitorAlertV2EventNotificationChannel"}},"operator":{"type":"string"},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventScope:MonitorAlertV2EventScope"}},"severity":{"type":"string"},"sources":{"type":"array","items":{"type":"string"}},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventTimeouts:MonitorAlertV2EventTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object","required":["filter","monitorAlertV2EventId","name","operator","rangeSeconds","team","threshold","version"],"inputProperties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCapture:MonitorAlertV2EventCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCustomNotification:MonitorAlertV2EventCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"filter":{"type":"string"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventLink:MonitorAlertV2EventLink"}},"monitorAlertV2EventId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventNotificationChannel:MonitorAlertV2EventNotificationChannel"}},"operator":{"type":"string"},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventScope:MonitorAlertV2EventScope"}},"severity":{"type":"string"},"sources":{"type":"array","items":{"type":"string"}},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventTimeouts:MonitorAlertV2EventTimeouts"},"warningThreshold":{"type":"string"}},"requiredInputs":["filter","operator","threshold"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2Event resources.\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCapture:MonitorAlertV2EventCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventCustomNotification:MonitorAlertV2EventCustomNotification"},"description":{"type":"string"},"enabled":{"type":"boolean"},"filter":{"type":"string"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventLink:MonitorAlertV2EventLink"}},"monitorAlertV2EventId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventNotificationChannel:MonitorAlertV2EventNotificationChannel"}},"operator":{"type":"string"},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventScope:MonitorAlertV2EventScope"}},"severity":{"type":"string"},"sources":{"type":"array","items":{"type":"string"}},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2EventTimeouts:MonitorAlertV2EventTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object"}},"sysdig:index/monitorAlertV2FormBasedPrometheus:MonitorAlertV2FormBasedPrometheus":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2FormBasedPrometheus(\"sample\", {\n    name: \"Elasticsearch JVM heap usage\",\n    description: \"Elasticsearch JVM heap used over attention threshold\",\n    severity: \"high\",\n    query: \"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100\",\n    operator: \"\u003e\",\n    threshold: 80,\n    notificationChannels: [{\n        id: 1234,\n        renotifyEveryMinutes: 5,\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2FormBasedPrometheus(\"sample\",\n    name=\"Elasticsearch JVM heap usage\",\n    description=\"Elasticsearch JVM heap used over attention threshold\",\n    severity=\"high\",\n    query=\"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100\",\n    operator=\"\u003e\",\n    threshold=80,\n    notification_channels=[{\n        \"id\": 1234,\n        \"renotify_every_minutes\": 5,\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2FormBasedPrometheus(\"sample\", new()\n    {\n        Name = \"Elasticsearch JVM heap usage\",\n        Description = \"Elasticsearch JVM heap used over attention threshold\",\n        Severity = \"high\",\n        Query = \"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100\",\n        Operator = \"\u003e\",\n        Threshold = 80,\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2FormBasedPrometheusNotificationChannelArgs\n            {\n                Id = 1234,\n                RenotifyEveryMinutes = 5,\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2FormBasedPrometheus(ctx, \"sample\", \u0026sysdig.MonitorAlertV2FormBasedPrometheusArgs{\n\t\t\tName:        pulumi.String(\"Elasticsearch JVM heap usage\"),\n\t\t\tDescription: pulumi.String(\"Elasticsearch JVM heap used over attention threshold\"),\n\t\t\tSeverity:    pulumi.String(\"high\"),\n\t\t\tQuery:       pulumi.String(\"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100\"),\n\t\t\tOperator:    pulumi.String(\"\u003e\"),\n\t\t\tThreshold:   pulumi.Float64(80),\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2FormBasedPrometheusNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2FormBasedPrometheusNotificationChannelArgs{\n\t\t\t\t\tId:                   pulumi.Float64(1234),\n\t\t\t\t\tRenotifyEveryMinutes: pulumi.Float64(5),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2FormBasedPrometheus;\nimport com.pulumi.sysdig.MonitorAlertV2FormBasedPrometheusArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2FormBasedPrometheusNotificationChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2FormBasedPrometheus(\"sample\", MonitorAlertV2FormBasedPrometheusArgs.builder()\n            .name(\"Elasticsearch JVM heap usage\")\n            .description(\"Elasticsearch JVM heap used over attention threshold\")\n            .severity(\"high\")\n            .query(\"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100\")\n            .operator(\"\u003e\")\n            .threshold(80.0)\n            .notificationChannels(MonitorAlertV2FormBasedPrometheusNotificationChannelArgs.builder()\n                .id(1234.0)\n                .renotifyEveryMinutes(5.0)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2FormBasedPrometheus\n    properties:\n      name: Elasticsearch JVM heap usage\n      description: Elasticsearch JVM heap used over attention threshold\n      severity: high\n      query: (elasticsearch_jvm_memory_used_bytes{area=\"heap\"} / elasticsearch_jvm_memory_max_bytes{area=\"heap\"}) * 100\n      operator: '\u003e'\n      threshold: 80\n      notificationChannels:\n        - id: 1234\n          renotifyEveryMinutes: 5\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThreshold Prometheus alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2FormBasedPrometheus:MonitorAlertV2FormBasedPrometheus example 12345\n```\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCapture:MonitorAlertV2FormBasedPrometheusCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCustomNotification:MonitorAlertV2FormBasedPrometheusCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusLink:MonitorAlertV2FormBasedPrometheusLink"}},"monitorAlertV2FormBasedPrometheusId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusNotificationChannel:MonitorAlertV2FormBasedPrometheusNotificationChannel"}},"operator":{"type":"string"},"query":{"type":"string"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusScope:MonitorAlertV2FormBasedPrometheusScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusTimeouts:MonitorAlertV2FormBasedPrometheusTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object","required":["monitorAlertV2FormBasedPrometheusId","name","operator","query","team","threshold","version"],"inputProperties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCapture:MonitorAlertV2FormBasedPrometheusCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCustomNotification:MonitorAlertV2FormBasedPrometheusCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusLink:MonitorAlertV2FormBasedPrometheusLink"}},"monitorAlertV2FormBasedPrometheusId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusNotificationChannel:MonitorAlertV2FormBasedPrometheusNotificationChannel"}},"operator":{"type":"string"},"query":{"type":"string"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusScope:MonitorAlertV2FormBasedPrometheusScope"}},"severity":{"type":"string"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusTimeouts:MonitorAlertV2FormBasedPrometheusTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"warningThreshold":{"type":"string"}},"requiredInputs":["operator","query","threshold"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2FormBasedPrometheus resources.\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCapture:MonitorAlertV2FormBasedPrometheusCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusCustomNotification:MonitorAlertV2FormBasedPrometheusCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusLink:MonitorAlertV2FormBasedPrometheusLink"}},"monitorAlertV2FormBasedPrometheusId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusNotificationChannel:MonitorAlertV2FormBasedPrometheusNotificationChannel"}},"operator":{"type":"string"},"query":{"type":"string"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusScope:MonitorAlertV2FormBasedPrometheusScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2FormBasedPrometheusTimeouts:MonitorAlertV2FormBasedPrometheusTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object"}},"sysdig:index/monitorAlertV2GroupOutlier:MonitorAlertV2GroupOutlier":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2GroupOutlier(\"sample\", {\n    name: \"cpu usage outliers\",\n    severity: \"high\",\n    metric: \"sysdig_container_cpu_used_percent\",\n    algorithm: \"MAD\",\n    madThreshold: 10.1,\n    madTolerance: 5.5,\n    groupAggregation: \"avg\",\n    groupBies: [\n        \"kube_pod_name\",\n        \"container_name\",\n    ],\n    timeAggregation: \"avg\",\n    scopes: [\n        {\n            label: \"kube_cluster_name\",\n            operator: \"in\",\n            values: [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            label: \"kube_deployment_name\",\n            operator: \"equals\",\n            values: [\"my_deployment\"],\n        },\n    ],\n    notificationChannels: [{\n        id: 1234,\n        renotifyEveryMinutes: 60,\n    }],\n    observationWindowMinutes: 15,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2GroupOutlier(\"sample\",\n    name=\"cpu usage outliers\",\n    severity=\"high\",\n    metric=\"sysdig_container_cpu_used_percent\",\n    algorithm=\"MAD\",\n    mad_threshold=10.1,\n    mad_tolerance=5.5,\n    group_aggregation=\"avg\",\n    group_bies=[\n        \"kube_pod_name\",\n        \"container_name\",\n    ],\n    time_aggregation=\"avg\",\n    scopes=[\n        {\n            \"label\": \"kube_cluster_name\",\n            \"operator\": \"in\",\n            \"values\": [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            \"label\": \"kube_deployment_name\",\n            \"operator\": \"equals\",\n            \"values\": [\"my_deployment\"],\n        },\n    ],\n    notification_channels=[{\n        \"id\": 1234,\n        \"renotify_every_minutes\": 60,\n    }],\n    observation_window_minutes=15)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2GroupOutlier(\"sample\", new()\n    {\n        Name = \"cpu usage outliers\",\n        Severity = \"high\",\n        Metric = \"sysdig_container_cpu_used_percent\",\n        Algorithm = \"MAD\",\n        MadThreshold = 10.1,\n        MadTolerance = 5.5,\n        GroupAggregation = \"avg\",\n        GroupBies = new[]\n        {\n            \"kube_pod_name\",\n            \"container_name\",\n        },\n        TimeAggregation = \"avg\",\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2GroupOutlierScopeArgs\n            {\n                Label = \"kube_cluster_name\",\n                Operator = \"in\",\n                Values = new[]\n                {\n                    \"my_cluster_1\",\n                    \"my_cluster_2\",\n                },\n            },\n            new Sysdig.Inputs.MonitorAlertV2GroupOutlierScopeArgs\n            {\n                Label = \"kube_deployment_name\",\n                Operator = \"equals\",\n                Values = new[]\n                {\n                    \"my_deployment\",\n                },\n            },\n        },\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2GroupOutlierNotificationChannelArgs\n            {\n                Id = 1234,\n                RenotifyEveryMinutes = 60,\n            },\n        },\n        ObservationWindowMinutes = 15,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2GroupOutlier(ctx, \"sample\", \u0026sysdig.MonitorAlertV2GroupOutlierArgs{\n\t\t\tName:             pulumi.String(\"cpu usage outliers\"),\n\t\t\tSeverity:         pulumi.String(\"high\"),\n\t\t\tMetric:           pulumi.String(\"sysdig_container_cpu_used_percent\"),\n\t\t\tAlgorithm:        pulumi.String(\"MAD\"),\n\t\t\tMadThreshold:     pulumi.Float64(10.1),\n\t\t\tMadTolerance:     pulumi.Float64(5.5),\n\t\t\tGroupAggregation: pulumi.String(\"avg\"),\n\t\t\tGroupBies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kube_pod_name\"),\n\t\t\t\tpulumi.String(\"container_name\"),\n\t\t\t},\n\t\t\tTimeAggregation: pulumi.String(\"avg\"),\n\t\t\tScopes: sysdig.MonitorAlertV2GroupOutlierScopeArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2GroupOutlierScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_cluster_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"in\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_cluster_1\"),\n\t\t\t\t\t\tpulumi.String(\"my_cluster_2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorAlertV2GroupOutlierScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_deployment_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"equals\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_deployment\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2GroupOutlierNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2GroupOutlierNotificationChannelArgs{\n\t\t\t\t\tId:                   pulumi.Float64(1234),\n\t\t\t\t\tRenotifyEveryMinutes: pulumi.Float64(60),\n\t\t\t\t},\n\t\t\t},\n\t\t\tObservationWindowMinutes: pulumi.Float64(15),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2GroupOutlier;\nimport com.pulumi.sysdig.MonitorAlertV2GroupOutlierArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2GroupOutlierScopeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2GroupOutlierNotificationChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2GroupOutlier(\"sample\", MonitorAlertV2GroupOutlierArgs.builder()\n            .name(\"cpu usage outliers\")\n            .severity(\"high\")\n            .metric(\"sysdig_container_cpu_used_percent\")\n            .algorithm(\"MAD\")\n            .madThreshold(10.1)\n            .madTolerance(5.5)\n            .groupAggregation(\"avg\")\n            .groupBies(            \n                \"kube_pod_name\",\n                \"container_name\")\n            .timeAggregation(\"avg\")\n            .scopes(            \n                MonitorAlertV2GroupOutlierScopeArgs.builder()\n                    .label(\"kube_cluster_name\")\n                    .operator(\"in\")\n                    .values(                    \n                        \"my_cluster_1\",\n                        \"my_cluster_2\")\n                    .build(),\n                MonitorAlertV2GroupOutlierScopeArgs.builder()\n                    .label(\"kube_deployment_name\")\n                    .operator(\"equals\")\n                    .values(\"my_deployment\")\n                    .build())\n            .notificationChannels(MonitorAlertV2GroupOutlierNotificationChannelArgs.builder()\n                .id(1234.0)\n                .renotifyEveryMinutes(60.0)\n                .build())\n            .observationWindowMinutes(15.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2GroupOutlier\n    properties:\n      name: cpu usage outliers\n      severity: high\n      metric: sysdig_container_cpu_used_percent\n      algorithm: MAD\n      madThreshold: 10.1\n      madTolerance: 5.5\n      groupAggregation: avg\n      groupBies:\n        - kube_pod_name\n        - container_name\n      timeAggregation: avg\n      scopes:\n        - label: kube_cluster_name\n          operator: in\n          values:\n            - my_cluster_1\n            - my_cluster_2\n        - label: kube_deployment_name\n          operator: equals\n          values:\n            - my_deployment\n      notificationChannels:\n        - id: 1234\n          renotifyEveryMinutes: 60\n      observationWindowMinutes: 15\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nGroup Outlier alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2GroupOutlier:MonitorAlertV2GroupOutlier example 12345\n```\n","properties":{"algorithm":{"type":"string"},"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCapture:MonitorAlertV2GroupOutlierCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCustomNotification:MonitorAlertV2GroupOutlierCustomNotification"},"dbscanTolerance":{"type":"number"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierLink:MonitorAlertV2GroupOutlierLink"}},"madThreshold":{"type":"number"},"madTolerance":{"type":"number"},"metric":{"type":"string"},"monitorAlertV2GroupOutlierId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierNotificationChannel:MonitorAlertV2GroupOutlierNotificationChannel"}},"observationWindowMinutes":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierScope:MonitorAlertV2GroupOutlierScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierTimeouts:MonitorAlertV2GroupOutlierTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"}},"type":"object","required":["algorithm","groupAggregation","groupBies","metric","monitorAlertV2GroupOutlierId","name","observationWindowMinutes","team","timeAggregation","version"],"inputProperties":{"algorithm":{"type":"string"},"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCapture:MonitorAlertV2GroupOutlierCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCustomNotification:MonitorAlertV2GroupOutlierCustomNotification"},"dbscanTolerance":{"type":"number"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierLink:MonitorAlertV2GroupOutlierLink"}},"madThreshold":{"type":"number"},"madTolerance":{"type":"number"},"metric":{"type":"string"},"monitorAlertV2GroupOutlierId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierNotificationChannel:MonitorAlertV2GroupOutlierNotificationChannel"}},"observationWindowMinutes":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierScope:MonitorAlertV2GroupOutlierScope"}},"severity":{"type":"string"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierTimeouts:MonitorAlertV2GroupOutlierTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"}},"requiredInputs":["algorithm","groupAggregation","groupBies","metric","observationWindowMinutes","timeAggregation"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2GroupOutlier resources.\n","properties":{"algorithm":{"type":"string"},"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCapture:MonitorAlertV2GroupOutlierCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierCustomNotification:MonitorAlertV2GroupOutlierCustomNotification"},"dbscanTolerance":{"type":"number"},"description":{"type":"string"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierLink:MonitorAlertV2GroupOutlierLink"}},"madThreshold":{"type":"number"},"madTolerance":{"type":"number"},"metric":{"type":"string"},"monitorAlertV2GroupOutlierId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierNotificationChannel:MonitorAlertV2GroupOutlierNotificationChannel"}},"observationWindowMinutes":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierScope:MonitorAlertV2GroupOutlierScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2GroupOutlierTimeouts:MonitorAlertV2GroupOutlierTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"}},"type":"object"}},"sysdig:index/monitorAlertV2Metric:MonitorAlertV2Metric":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2Metric(\"sample\", {\n    name: \"high cpu used\",\n    severity: \"high\",\n    metric: \"sysdig_container_cpu_used_percent\",\n    groupAggregation: \"avg\",\n    timeAggregation: \"avg\",\n    operator: \"\u003e\",\n    threshold: 75,\n    groupBies: [\"kube_pod_name\"],\n    scopes: [\n        {\n            label: \"kube_cluster_name\",\n            operator: \"in\",\n            values: [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            label: \"kube_deployment_name\",\n            operator: \"equals\",\n            values: [\"my_deployment\"],\n        },\n    ],\n    notificationChannels: [{\n        id: 1234,\n        renotifyEveryMinutes: 60,\n    }],\n    rangeSeconds: 60,\n    customNotification: {\n        subject: \"{{__alert_name__}} for pod {{kube_pod_name}}\",\n        prepend: \"Attention!!\",\n        append: \"Please investigate the issue. Escalate to the on-call team if needed.\",\n        additionalFields: [\n            {\n                name: \"pod\",\n                value: \"{{kube_pod_name}}\",\n            },\n            {\n                name: \"cluster\",\n                value: \"{{kube_cluster_name}}\",\n            },\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2Metric(\"sample\",\n    name=\"high cpu used\",\n    severity=\"high\",\n    metric=\"sysdig_container_cpu_used_percent\",\n    group_aggregation=\"avg\",\n    time_aggregation=\"avg\",\n    operator=\"\u003e\",\n    threshold=75,\n    group_bies=[\"kube_pod_name\"],\n    scopes=[\n        {\n            \"label\": \"kube_cluster_name\",\n            \"operator\": \"in\",\n            \"values\": [\n                \"my_cluster_1\",\n                \"my_cluster_2\",\n            ],\n        },\n        {\n            \"label\": \"kube_deployment_name\",\n            \"operator\": \"equals\",\n            \"values\": [\"my_deployment\"],\n        },\n    ],\n    notification_channels=[{\n        \"id\": 1234,\n        \"renotify_every_minutes\": 60,\n    }],\n    range_seconds=60,\n    custom_notification={\n        \"subject\": \"{{__alert_name__}} for pod {{kube_pod_name}}\",\n        \"prepend\": \"Attention!!\",\n        \"append\": \"Please investigate the issue. Escalate to the on-call team if needed.\",\n        \"additional_fields\": [\n            {\n                \"name\": \"pod\",\n                \"value\": \"{{kube_pod_name}}\",\n            },\n            {\n                \"name\": \"cluster\",\n                \"value\": \"{{kube_cluster_name}}\",\n            },\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2Metric(\"sample\", new()\n    {\n        Name = \"high cpu used\",\n        Severity = \"high\",\n        Metric = \"sysdig_container_cpu_used_percent\",\n        GroupAggregation = \"avg\",\n        TimeAggregation = \"avg\",\n        Operator = \"\u003e\",\n        Threshold = 75,\n        GroupBies = new[]\n        {\n            \"kube_pod_name\",\n        },\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2MetricScopeArgs\n            {\n                Label = \"kube_cluster_name\",\n                Operator = \"in\",\n                Values = new[]\n                {\n                    \"my_cluster_1\",\n                    \"my_cluster_2\",\n                },\n            },\n            new Sysdig.Inputs.MonitorAlertV2MetricScopeArgs\n            {\n                Label = \"kube_deployment_name\",\n                Operator = \"equals\",\n                Values = new[]\n                {\n                    \"my_deployment\",\n                },\n            },\n        },\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2MetricNotificationChannelArgs\n            {\n                Id = 1234,\n                RenotifyEveryMinutes = 60,\n            },\n        },\n        RangeSeconds = 60,\n        CustomNotification = new Sysdig.Inputs.MonitorAlertV2MetricCustomNotificationArgs\n        {\n            Subject = \"{{__alert_name__}} for pod {{kube_pod_name}}\",\n            Prepend = \"Attention!!\",\n            Append = \"Please investigate the issue. Escalate to the on-call team if needed.\",\n            AdditionalFields = new[]\n            {\n                new Sysdig.Inputs.MonitorAlertV2MetricCustomNotificationAdditionalFieldArgs\n                {\n                    Name = \"pod\",\n                    Value = \"{{kube_pod_name}}\",\n                },\n                new Sysdig.Inputs.MonitorAlertV2MetricCustomNotificationAdditionalFieldArgs\n                {\n                    Name = \"cluster\",\n                    Value = \"{{kube_cluster_name}}\",\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2Metric(ctx, \"sample\", \u0026sysdig.MonitorAlertV2MetricArgs{\n\t\t\tName:             pulumi.String(\"high cpu used\"),\n\t\t\tSeverity:         pulumi.String(\"high\"),\n\t\t\tMetric:           pulumi.String(\"sysdig_container_cpu_used_percent\"),\n\t\t\tGroupAggregation: pulumi.String(\"avg\"),\n\t\t\tTimeAggregation:  pulumi.String(\"avg\"),\n\t\t\tOperator:         pulumi.String(\"\u003e\"),\n\t\t\tThreshold:        pulumi.Float64(75),\n\t\t\tGroupBies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kube_pod_name\"),\n\t\t\t},\n\t\t\tScopes: sysdig.MonitorAlertV2MetricScopeArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2MetricScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_cluster_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"in\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_cluster_1\"),\n\t\t\t\t\t\tpulumi.String(\"my_cluster_2\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorAlertV2MetricScopeArgs{\n\t\t\t\t\tLabel:    pulumi.String(\"kube_deployment_name\"),\n\t\t\t\t\tOperator: pulumi.String(\"equals\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"my_deployment\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2MetricNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2MetricNotificationChannelArgs{\n\t\t\t\t\tId:                   pulumi.Float64(1234),\n\t\t\t\t\tRenotifyEveryMinutes: pulumi.Float64(60),\n\t\t\t\t},\n\t\t\t},\n\t\t\tRangeSeconds: pulumi.Float64(60),\n\t\t\tCustomNotification: \u0026sysdig.MonitorAlertV2MetricCustomNotificationArgs{\n\t\t\t\tSubject: pulumi.String(\"{{__alert_name__}} for pod {{kube_pod_name}}\"),\n\t\t\t\tPrepend: pulumi.String(\"Attention!!\"),\n\t\t\t\tAppend:  pulumi.String(\"Please investigate the issue. Escalate to the on-call team if needed.\"),\n\t\t\t\tAdditionalFields: sysdig.MonitorAlertV2MetricCustomNotificationAdditionalFieldArray{\n\t\t\t\t\t\u0026sysdig.MonitorAlertV2MetricCustomNotificationAdditionalFieldArgs{\n\t\t\t\t\t\tName:  pulumi.String(\"pod\"),\n\t\t\t\t\t\tValue: pulumi.String(\"{{kube_pod_name}}\"),\n\t\t\t\t\t},\n\t\t\t\t\t\u0026sysdig.MonitorAlertV2MetricCustomNotificationAdditionalFieldArgs{\n\t\t\t\t\t\tName:  pulumi.String(\"cluster\"),\n\t\t\t\t\t\tValue: pulumi.String(\"{{kube_cluster_name}}\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2Metric;\nimport com.pulumi.sysdig.MonitorAlertV2MetricArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2MetricScopeArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2MetricNotificationChannelArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2MetricCustomNotificationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2Metric(\"sample\", MonitorAlertV2MetricArgs.builder()\n            .name(\"high cpu used\")\n            .severity(\"high\")\n            .metric(\"sysdig_container_cpu_used_percent\")\n            .groupAggregation(\"avg\")\n            .timeAggregation(\"avg\")\n            .operator(\"\u003e\")\n            .threshold(75.0)\n            .groupBies(\"kube_pod_name\")\n            .scopes(            \n                MonitorAlertV2MetricScopeArgs.builder()\n                    .label(\"kube_cluster_name\")\n                    .operator(\"in\")\n                    .values(                    \n                        \"my_cluster_1\",\n                        \"my_cluster_2\")\n                    .build(),\n                MonitorAlertV2MetricScopeArgs.builder()\n                    .label(\"kube_deployment_name\")\n                    .operator(\"equals\")\n                    .values(\"my_deployment\")\n                    .build())\n            .notificationChannels(MonitorAlertV2MetricNotificationChannelArgs.builder()\n                .id(1234.0)\n                .renotifyEveryMinutes(60.0)\n                .build())\n            .rangeSeconds(60.0)\n            .customNotification(MonitorAlertV2MetricCustomNotificationArgs.builder()\n                .subject(\"{{__alert_name__}} for pod {{kube_pod_name}}\")\n                .prepend(\"Attention!!\")\n                .append(\"Please investigate the issue. Escalate to the on-call team if needed.\")\n                .additionalFields(                \n                    MonitorAlertV2MetricCustomNotificationAdditionalFieldArgs.builder()\n                        .name(\"pod\")\n                        .value(\"{{kube_pod_name}}\")\n                        .build(),\n                    MonitorAlertV2MetricCustomNotificationAdditionalFieldArgs.builder()\n                        .name(\"cluster\")\n                        .value(\"{{kube_cluster_name}}\")\n                        .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2Metric\n    properties:\n      name: high cpu used\n      severity: high\n      metric: sysdig_container_cpu_used_percent\n      groupAggregation: avg\n      timeAggregation: avg\n      operator: '\u003e'\n      threshold: 75\n      groupBies:\n        - kube_pod_name\n      scopes:\n        - label: kube_cluster_name\n          operator: in\n          values:\n            - my_cluster_1\n            - my_cluster_2\n        - label: kube_deployment_name\n          operator: equals\n          values:\n            - my_deployment\n      notificationChannels:\n        - id: 1234\n          renotifyEveryMinutes: 60\n      rangeSeconds: 60\n      customNotification:\n        subject: '{{__alert_name__}} for pod {{kube_pod_name}}'\n        prepend: Attention!!\n        append: Please investigate the issue. Escalate to the on-call team if needed.\n        additionalFields:\n          - name: pod\n            value: '{{kube_pod_name}}'\n          - name: cluster\n            value: '{{kube_cluster_name}}'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMetric Threshold alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2Metric:MonitorAlertV2Metric example 12345\n```\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCapture:MonitorAlertV2MetricCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCustomNotification:MonitorAlertV2MetricCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricLink:MonitorAlertV2MetricLink"}},"metric":{"type":"string"},"monitorAlertV2MetricId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricNotificationChannel:MonitorAlertV2MetricNotificationChannel"}},"operator":{"type":"string"},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricScope:MonitorAlertV2MetricScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricTimeouts:MonitorAlertV2MetricTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object","required":["groupAggregation","metric","monitorAlertV2MetricId","name","operator","rangeSeconds","team","threshold","timeAggregation","version"],"inputProperties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCapture:MonitorAlertV2MetricCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCustomNotification:MonitorAlertV2MetricCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricLink:MonitorAlertV2MetricLink"}},"metric":{"type":"string"},"monitorAlertV2MetricId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricNotificationChannel:MonitorAlertV2MetricNotificationChannel"}},"operator":{"type":"string"},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricScope:MonitorAlertV2MetricScope"}},"severity":{"type":"string"},"threshold":{"type":"number"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricTimeouts:MonitorAlertV2MetricTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"warningThreshold":{"type":"string"}},"requiredInputs":["groupAggregation","metric","operator","threshold","timeAggregation"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2Metric resources.\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCapture:MonitorAlertV2MetricCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricCustomNotification:MonitorAlertV2MetricCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"groupAggregation":{"type":"string"},"groupBies":{"type":"array","items":{"type":"string"}},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricLink:MonitorAlertV2MetricLink"}},"metric":{"type":"string"},"monitorAlertV2MetricId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"noDataBehaviour":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricNotificationChannel:MonitorAlertV2MetricNotificationChannel"}},"operator":{"type":"string"},"rangeSeconds":{"type":"number"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricScope:MonitorAlertV2MetricScope"}},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"threshold":{"type":"number"},"timeAggregation":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2MetricTimeouts:MonitorAlertV2MetricTimeouts"},"unreportedAlertNotificationsRetentionSeconds":{"type":"number"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"},"warningThreshold":{"type":"string"}},"type":"object"}},"sysdig:index/monitorAlertV2Prometheus:MonitorAlertV2Prometheus":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorAlertV2Prometheus(\"sample\", {\n    name: \"Elasticsearch JVM heap usage\",\n    description: \"Elasticsearch JVM heap used over attention threshold\",\n    severity: \"high\",\n    query: \"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100 \u003e 80\",\n    durationSeconds: 600,\n    notificationChannels: [{\n        id: 1234,\n        renotifyEveryMinutes: 5,\n    }],\n    labels: {\n        application: \"app1\",\n        maturity: \"high\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorAlertV2Prometheus(\"sample\",\n    name=\"Elasticsearch JVM heap usage\",\n    description=\"Elasticsearch JVM heap used over attention threshold\",\n    severity=\"high\",\n    query=\"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100 \u003e 80\",\n    duration_seconds=600,\n    notification_channels=[{\n        \"id\": 1234,\n        \"renotify_every_minutes\": 5,\n    }],\n    labels={\n        \"application\": \"app1\",\n        \"maturity\": \"high\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorAlertV2Prometheus(\"sample\", new()\n    {\n        Name = \"Elasticsearch JVM heap usage\",\n        Description = \"Elasticsearch JVM heap used over attention threshold\",\n        Severity = \"high\",\n        Query = \"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100 \u003e 80\",\n        DurationSeconds = 600,\n        NotificationChannels = new[]\n        {\n            new Sysdig.Inputs.MonitorAlertV2PrometheusNotificationChannelArgs\n            {\n                Id = 1234,\n                RenotifyEveryMinutes = 5,\n            },\n        },\n        Labels = \n        {\n            { \"application\", \"app1\" },\n            { \"maturity\", \"high\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorAlertV2Prometheus(ctx, \"sample\", \u0026sysdig.MonitorAlertV2PrometheusArgs{\n\t\t\tName:            pulumi.String(\"Elasticsearch JVM heap usage\"),\n\t\t\tDescription:     pulumi.String(\"Elasticsearch JVM heap used over attention threshold\"),\n\t\t\tSeverity:        pulumi.String(\"high\"),\n\t\t\tQuery:           pulumi.String(\"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100 \u003e 80\"),\n\t\t\tDurationSeconds: pulumi.Float64(600),\n\t\t\tNotificationChannels: sysdig.MonitorAlertV2PrometheusNotificationChannelArray{\n\t\t\t\t\u0026sysdig.MonitorAlertV2PrometheusNotificationChannelArgs{\n\t\t\t\t\tId:                   pulumi.Float64(1234),\n\t\t\t\t\tRenotifyEveryMinutes: pulumi.Float64(5),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLabels: pulumi.StringMap{\n\t\t\t\t\"application\": pulumi.String(\"app1\"),\n\t\t\t\t\"maturity\":    pulumi.String(\"high\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorAlertV2Prometheus;\nimport com.pulumi.sysdig.MonitorAlertV2PrometheusArgs;\nimport com.pulumi.sysdig.inputs.MonitorAlertV2PrometheusNotificationChannelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorAlertV2Prometheus(\"sample\", MonitorAlertV2PrometheusArgs.builder()\n            .name(\"Elasticsearch JVM heap usage\")\n            .description(\"Elasticsearch JVM heap used over attention threshold\")\n            .severity(\"high\")\n            .query(\"(elasticsearch_jvm_memory_used_bytes{area=\\\"heap\\\"} / elasticsearch_jvm_memory_max_bytes{area=\\\"heap\\\"}) * 100 \u003e 80\")\n            .durationSeconds(600.0)\n            .notificationChannels(MonitorAlertV2PrometheusNotificationChannelArgs.builder()\n                .id(1234.0)\n                .renotifyEveryMinutes(5.0)\n                .build())\n            .labels(Map.ofEntries(\n                Map.entry(\"application\", \"app1\"),\n                Map.entry(\"maturity\", \"high\")\n            ))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorAlertV2Prometheus\n    properties:\n      name: Elasticsearch JVM heap usage\n      description: Elasticsearch JVM heap used over attention threshold\n      severity: high\n      query: (elasticsearch_jvm_memory_used_bytes{area=\"heap\"} / elasticsearch_jvm_memory_max_bytes{area=\"heap\"}) * 100 \u003e 80\n      durationSeconds: 600\n      notificationChannels:\n        - id: 1234\n          renotifyEveryMinutes: 5\n      labels:\n        application: app1\n        maturity: high\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPrometheus alerts can be imported using the alert ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorAlertV2Prometheus:MonitorAlertV2Prometheus example 12345\n```\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCapture:MonitorAlertV2PrometheusCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCustomNotification:MonitorAlertV2PrometheusCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"keepFiringForMinutes":{"type":"number"},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusLink:MonitorAlertV2PrometheusLink"}},"monitorAlertV2PrometheusId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusNotificationChannel:MonitorAlertV2PrometheusNotificationChannel"}},"query":{"type":"string"},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusTimeouts:MonitorAlertV2PrometheusTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"}},"type":"object","required":["durationSeconds","monitorAlertV2PrometheusId","name","query","team","version"],"inputProperties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCapture:MonitorAlertV2PrometheusCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCustomNotification:MonitorAlertV2PrometheusCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"keepFiringForMinutes":{"type":"number"},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusLink:MonitorAlertV2PrometheusLink"}},"monitorAlertV2PrometheusId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusNotificationChannel:MonitorAlertV2PrometheusNotificationChannel"}},"query":{"type":"string"},"severity":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusTimeouts:MonitorAlertV2PrometheusTimeouts"}},"requiredInputs":["query"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorAlertV2Prometheus resources.\n","properties":{"capture":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCapture:MonitorAlertV2PrometheusCapture"},"customNotification":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusCustomNotification:MonitorAlertV2PrometheusCustomNotification"},"description":{"type":"string"},"durationSeconds":{"type":"number"},"enabled":{"type":"boolean"},"group":{"type":"string"},"keepFiringForMinutes":{"type":"number"},"labels":{"type":"object","additionalProperties":{"type":"string"}},"links":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusLink:MonitorAlertV2PrometheusLink"}},"monitorAlertV2PrometheusId":{"type":"string","description":"ID of the alert created.\n"},"name":{"type":"string"},"notificationChannels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusNotificationChannel:MonitorAlertV2PrometheusNotificationChannel"}},"query":{"type":"string"},"severity":{"type":"string"},"team":{"type":"number","description":"Team ID that owns the alert.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorAlertV2PrometheusTimeouts:MonitorAlertV2PrometheusTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Monitor.\n"}},"type":"object"}},"sysdig:index/monitorCloudAccount:MonitorCloudAccount":{"description":"## Example Usage\n\n","properties":{"accessKeyId":{"type":"string","description":"The ID for the access key that has the permissions into the Cloud Account. It must be provided along \u003cspan pulumi-lang-nodejs=\"`secretKey`\" pulumi-lang-dotnet=\"`SecretKey`\" pulumi-lang-go=\"`secretKey`\" pulumi-lang-python=\"`secret_key`\" pulumi-lang-yaml=\"`secretKey`\" pulumi-lang-java=\"`secretKey`\"\u003e`secret_key`\u003c/span\u003e when this auth mode is used.\n","secret":true},"accountId":{"type":"string","description":"The GCP project id for the project that will be monitored . (Optional For AWS) This identified the target Account ID. If provided, a\u003cspan pulumi-lang-nodejs=\" roleName \" pulumi-lang-dotnet=\" RoleName \" pulumi-lang-go=\" roleName \" pulumi-lang-python=\" role_name \" pulumi-lang-yaml=\" roleName \" pulumi-lang-java=\" roleName \"\u003e role_name \u003c/span\u003emust be set.\n","secret":true},"additionalOptions":{"type":"string","description":"The private key generated when creating a new GCP service account key. Must be in JSON format and base64 encoded.\n","secret":true},"cloudProvider":{"type":"string","description":"Cloud platform that will be monitored. Only `GCP` and `AWS` are currently supported.\n"},"config":{"type":"object","additionalProperties":{"type":"string"},"description":"Configuration parameters for Athena connection into the Sysdig Cloud Account.\n"},"integrationType":{"type":"string","description":"Type of cloud integration. Only `API` and `Metrics Streams` are currently supported (`Metrics Streams` only for `AWS`).\n"},"monitorCloudAccountId":{"type":"string"},"roleName":{"type":"string","description":"The role name used for delegation over the customer resources towards the Sysdig AWS account. Only for AWS when the authentication mode is role delegation instead of secret key.\n"},"secretKey":{"type":"string","description":"The the secret key for a AWS connection. It must be provided along \u003cspan pulumi-lang-nodejs=\"`accessKeyId`\" pulumi-lang-dotnet=\"`AccessKeyId`\" pulumi-lang-go=\"`accessKeyId`\" pulumi-lang-python=\"`access_key_id`\" pulumi-lang-yaml=\"`accessKeyId`\" pulumi-lang-java=\"`accessKeyId`\"\u003e`access_key_id`\u003c/span\u003e when this auth mode is used.\n","secret":true},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorCloudAccountTimeouts:MonitorCloudAccountTimeouts"}},"type":"object","required":["accountId","cloudProvider","integrationType","monitorCloudAccountId"],"inputProperties":{"accessKeyId":{"type":"string","description":"The ID for the access key that has the permissions into the Cloud Account. It must be provided along \u003cspan pulumi-lang-nodejs=\"`secretKey`\" pulumi-lang-dotnet=\"`SecretKey`\" pulumi-lang-go=\"`secretKey`\" pulumi-lang-python=\"`secret_key`\" pulumi-lang-yaml=\"`secretKey`\" pulumi-lang-java=\"`secretKey`\"\u003e`secret_key`\u003c/span\u003e when this auth mode is used.\n","secret":true},"accountId":{"type":"string","description":"The GCP project id for the project that will be monitored . (Optional For AWS) This identified the target Account ID. If provided, a\u003cspan pulumi-lang-nodejs=\" roleName \" pulumi-lang-dotnet=\" RoleName \" pulumi-lang-go=\" roleName \" pulumi-lang-python=\" role_name \" pulumi-lang-yaml=\" roleName \" pulumi-lang-java=\" roleName \"\u003e role_name \u003c/span\u003emust be set.\n","secret":true},"additionalOptions":{"type":"string","description":"The private key generated when creating a new GCP service account key. Must be in JSON format and base64 encoded.\n","secret":true},"cloudProvider":{"type":"string","description":"Cloud platform that will be monitored. Only `GCP` and `AWS` are currently supported.\n"},"config":{"type":"object","additionalProperties":{"type":"string"},"description":"Configuration parameters for Athena connection into the Sysdig Cloud Account.\n"},"integrationType":{"type":"string","description":"Type of cloud integration. Only `API` and `Metrics Streams` are currently supported (`Metrics Streams` only for `AWS`).\n"},"monitorCloudAccountId":{"type":"string"},"roleName":{"type":"string","description":"The role name used for delegation over the customer resources towards the Sysdig AWS account. Only for AWS when the authentication mode is role delegation instead of secret key.\n"},"secretKey":{"type":"string","description":"The the secret key for a AWS connection. It must be provided along \u003cspan pulumi-lang-nodejs=\"`accessKeyId`\" pulumi-lang-dotnet=\"`AccessKeyId`\" pulumi-lang-go=\"`accessKeyId`\" pulumi-lang-python=\"`access_key_id`\" pulumi-lang-yaml=\"`accessKeyId`\" pulumi-lang-java=\"`accessKeyId`\"\u003e`access_key_id`\u003c/span\u003e when this auth mode is used.\n","secret":true},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorCloudAccountTimeouts:MonitorCloudAccountTimeouts"}},"requiredInputs":["accountId","cloudProvider","integrationType"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorCloudAccount resources.\n","properties":{"accessKeyId":{"type":"string","description":"The ID for the access key that has the permissions into the Cloud Account. It must be provided along \u003cspan pulumi-lang-nodejs=\"`secretKey`\" pulumi-lang-dotnet=\"`SecretKey`\" pulumi-lang-go=\"`secretKey`\" pulumi-lang-python=\"`secret_key`\" pulumi-lang-yaml=\"`secretKey`\" pulumi-lang-java=\"`secretKey`\"\u003e`secret_key`\u003c/span\u003e when this auth mode is used.\n","secret":true},"accountId":{"type":"string","description":"The GCP project id for the project that will be monitored . (Optional For AWS) This identified the target Account ID. If provided, a\u003cspan pulumi-lang-nodejs=\" roleName \" pulumi-lang-dotnet=\" RoleName \" pulumi-lang-go=\" roleName \" pulumi-lang-python=\" role_name \" pulumi-lang-yaml=\" roleName \" pulumi-lang-java=\" roleName \"\u003e role_name \u003c/span\u003emust be set.\n","secret":true},"additionalOptions":{"type":"string","description":"The private key generated when creating a new GCP service account key. Must be in JSON format and base64 encoded.\n","secret":true},"cloudProvider":{"type":"string","description":"Cloud platform that will be monitored. Only `GCP` and `AWS` are currently supported.\n"},"config":{"type":"object","additionalProperties":{"type":"string"},"description":"Configuration parameters for Athena connection into the Sysdig Cloud Account.\n"},"integrationType":{"type":"string","description":"Type of cloud integration. Only `API` and `Metrics Streams` are currently supported (`Metrics Streams` only for `AWS`).\n"},"monitorCloudAccountId":{"type":"string"},"roleName":{"type":"string","description":"The role name used for delegation over the customer resources towards the Sysdig AWS account. Only for AWS when the authentication mode is role delegation instead of secret key.\n"},"secretKey":{"type":"string","description":"The the secret key for a AWS connection. It must be provided along \u003cspan pulumi-lang-nodejs=\"`accessKeyId`\" pulumi-lang-dotnet=\"`AccessKeyId`\" pulumi-lang-go=\"`accessKeyId`\" pulumi-lang-python=\"`access_key_id`\" pulumi-lang-yaml=\"`accessKeyId`\" pulumi-lang-java=\"`accessKeyId`\"\u003e`access_key_id`\u003c/span\u003e when this auth mode is used.\n","secret":true},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorCloudAccountTimeouts:MonitorCloudAccountTimeouts"}},"type":"object"}},"sysdig:index/monitorDashboard:MonitorDashboard":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst dashboard = new sysdig.MonitorDashboard(\"dashboard\", {\n    name: \"Example Dashboard\",\n    description: \"Example Dashboard description\",\n    scopes: [\n        {\n            metric: \"kubernetes.cluster.name\",\n            comparator: \"in\",\n            values: [\n                \"prod\",\n                \"dev\",\n            ],\n            variable: \"cluster_name\",\n        },\n        {\n            metric: \"host.hostName\",\n            variable: \"hostname\",\n        },\n    ],\n    panels: [\n        {\n            posX: 0,\n            posY: 0,\n            width: 12,\n            height: 6,\n            type: \"timechart\",\n            name: \"Example panel\",\n            description: \"Description\",\n            legend: {\n                enabled: true,\n                layout: \"table\",\n                position: \"bottom\",\n                showCurrent: true,\n            },\n            queries: [\n                {\n                    promql: \"avg_over_time(sysdig_host_cpu_used_percent{host_name=$hostname}[$__interval])\",\n                    unit: \"percent\",\n                    format: {\n                        decimals: 0,\n                        displayFormat: \"auto\",\n                        inputFormat: \"0-100\",\n                        nullValueDisplayMode: \"nullGap\",\n                        yAxis: \"auto\",\n                    },\n                },\n                {\n                    promql: \"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\",\n                    unit: \"number\",\n                    displayInfos: [{\n                        displayName: \"ct_name\",\n                        timeSeriesDisplayNameTemplate: \"{{container_name}}\",\n                        type: \"lines\",\n                    }],\n                    format: {\n                        decimals: 0,\n                        displayFormat: \"auto\",\n                        inputFormat: \"1\",\n                        nullValueDisplayMode: \"nullGap\",\n                        yAxis: \"auto\",\n                    },\n                },\n            ],\n        },\n        {\n            posX: 12,\n            posY: 0,\n            width: 12,\n            height: 6,\n            type: \"number\",\n            name: \"example panel - 2\",\n            description: \"description of panel 2\",\n            queries: [{\n                promql: \"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\",\n                unit: \"time\",\n                format: {\n                    decimals: 0,\n                    displayFormat: \"auto\",\n                    inputFormat: \"ns\",\n                    nullValueDisplayMode: \"nullGap\",\n                    yAxis: \"auto\",\n                },\n            }],\n        },\n        {\n            posX: 12,\n            posY: 12,\n            width: 12,\n            height: 6,\n            type: \"text\",\n            name: \"example panel - 2\",\n            content: \"description of panel 2\",\n            visibleTitle: true,\n            autosizeText: true,\n            transparentBackground: true,\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ndashboard = sysdig.MonitorDashboard(\"dashboard\",\n    name=\"Example Dashboard\",\n    description=\"Example Dashboard description\",\n    scopes=[\n        {\n            \"metric\": \"kubernetes.cluster.name\",\n            \"comparator\": \"in\",\n            \"values\": [\n                \"prod\",\n                \"dev\",\n            ],\n            \"variable\": \"cluster_name\",\n        },\n        {\n            \"metric\": \"host.hostName\",\n            \"variable\": \"hostname\",\n        },\n    ],\n    panels=[\n        {\n            \"pos_x\": 0,\n            \"pos_y\": 0,\n            \"width\": 12,\n            \"height\": 6,\n            \"type\": \"timechart\",\n            \"name\": \"Example panel\",\n            \"description\": \"Description\",\n            \"legend\": {\n                \"enabled\": True,\n                \"layout\": \"table\",\n                \"position\": \"bottom\",\n                \"show_current\": True,\n            },\n            \"queries\": [\n                {\n                    \"promql\": \"avg_over_time(sysdig_host_cpu_used_percent{host_name=$hostname}[$__interval])\",\n                    \"unit\": \"percent\",\n                    \"format\": {\n                        \"decimals\": 0,\n                        \"display_format\": \"auto\",\n                        \"input_format\": \"0-100\",\n                        \"null_value_display_mode\": \"nullGap\",\n                        \"y_axis\": \"auto\",\n                    },\n                },\n                {\n                    \"promql\": \"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\",\n                    \"unit\": \"number\",\n                    \"display_infos\": [{\n                        \"display_name\": \"ct_name\",\n                        \"time_series_display_name_template\": \"{{container_name}}\",\n                        \"type\": \"lines\",\n                    }],\n                    \"format\": {\n                        \"decimals\": 0,\n                        \"display_format\": \"auto\",\n                        \"input_format\": \"1\",\n                        \"null_value_display_mode\": \"nullGap\",\n                        \"y_axis\": \"auto\",\n                    },\n                },\n            ],\n        },\n        {\n            \"pos_x\": 12,\n            \"pos_y\": 0,\n            \"width\": 12,\n            \"height\": 6,\n            \"type\": \"number\",\n            \"name\": \"example panel - 2\",\n            \"description\": \"description of panel 2\",\n            \"queries\": [{\n                \"promql\": \"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\",\n                \"unit\": \"time\",\n                \"format\": {\n                    \"decimals\": 0,\n                    \"display_format\": \"auto\",\n                    \"input_format\": \"ns\",\n                    \"null_value_display_mode\": \"nullGap\",\n                    \"y_axis\": \"auto\",\n                },\n            }],\n        },\n        {\n            \"pos_x\": 12,\n            \"pos_y\": 12,\n            \"width\": 12,\n            \"height\": 6,\n            \"type\": \"text\",\n            \"name\": \"example panel - 2\",\n            \"content\": \"description of panel 2\",\n            \"visible_title\": True,\n            \"autosize_text\": True,\n            \"transparent_background\": True,\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dashboard = new Sysdig.MonitorDashboard(\"dashboard\", new()\n    {\n        Name = \"Example Dashboard\",\n        Description = \"Example Dashboard description\",\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.MonitorDashboardScopeArgs\n            {\n                Metric = \"kubernetes.cluster.name\",\n                Comparator = \"in\",\n                Values = new[]\n                {\n                    \"prod\",\n                    \"dev\",\n                },\n                Variable = \"cluster_name\",\n            },\n            new Sysdig.Inputs.MonitorDashboardScopeArgs\n            {\n                Metric = \"host.hostName\",\n                Variable = \"hostname\",\n            },\n        },\n        Panels = new[]\n        {\n            new Sysdig.Inputs.MonitorDashboardPanelArgs\n            {\n                PosX = 0,\n                PosY = 0,\n                Width = 12,\n                Height = 6,\n                Type = \"timechart\",\n                Name = \"Example panel\",\n                Description = \"Description\",\n                Legend = new Sysdig.Inputs.MonitorDashboardPanelLegendArgs\n                {\n                    Enabled = true,\n                    Layout = \"table\",\n                    Position = \"bottom\",\n                    ShowCurrent = true,\n                },\n                Queries = new[]\n                {\n                    new Sysdig.Inputs.MonitorDashboardPanelQueryArgs\n                    {\n                        Promql = \"avg_over_time(sysdig_host_cpu_used_percent{host_name=$hostname}[$__interval])\",\n                        Unit = \"percent\",\n                        Format = new Sysdig.Inputs.MonitorDashboardPanelQueryFormatArgs\n                        {\n                            Decimals = 0,\n                            DisplayFormat = \"auto\",\n                            InputFormat = \"0-100\",\n                            NullValueDisplayMode = \"nullGap\",\n                            YAxis = \"auto\",\n                        },\n                    },\n                    new Sysdig.Inputs.MonitorDashboardPanelQueryArgs\n                    {\n                        Promql = \"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\",\n                        Unit = \"number\",\n                        DisplayInfos = new[]\n                        {\n                            new Sysdig.Inputs.MonitorDashboardPanelQueryDisplayInfoArgs\n                            {\n                                DisplayName = \"ct_name\",\n                                TimeSeriesDisplayNameTemplate = \"{{container_name}}\",\n                                Type = \"lines\",\n                            },\n                        },\n                        Format = new Sysdig.Inputs.MonitorDashboardPanelQueryFormatArgs\n                        {\n                            Decimals = 0,\n                            DisplayFormat = \"auto\",\n                            InputFormat = \"1\",\n                            NullValueDisplayMode = \"nullGap\",\n                            YAxis = \"auto\",\n                        },\n                    },\n                },\n            },\n            new Sysdig.Inputs.MonitorDashboardPanelArgs\n            {\n                PosX = 12,\n                PosY = 0,\n                Width = 12,\n                Height = 6,\n                Type = \"number\",\n                Name = \"example panel - 2\",\n                Description = \"description of panel 2\",\n                Queries = new[]\n                {\n                    new Sysdig.Inputs.MonitorDashboardPanelQueryArgs\n                    {\n                        Promql = \"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\",\n                        Unit = \"time\",\n                        Format = new Sysdig.Inputs.MonitorDashboardPanelQueryFormatArgs\n                        {\n                            Decimals = 0,\n                            DisplayFormat = \"auto\",\n                            InputFormat = \"ns\",\n                            NullValueDisplayMode = \"nullGap\",\n                            YAxis = \"auto\",\n                        },\n                    },\n                },\n            },\n            new Sysdig.Inputs.MonitorDashboardPanelArgs\n            {\n                PosX = 12,\n                PosY = 12,\n                Width = 12,\n                Height = 6,\n                Type = \"text\",\n                Name = \"example panel - 2\",\n                Content = \"description of panel 2\",\n                VisibleTitle = true,\n                AutosizeText = true,\n                TransparentBackground = true,\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorDashboard(ctx, \"dashboard\", \u0026sysdig.MonitorDashboardArgs{\n\t\t\tName:        pulumi.String(\"Example Dashboard\"),\n\t\t\tDescription: pulumi.String(\"Example Dashboard description\"),\n\t\t\tScopes: sysdig.MonitorDashboardScopeArray{\n\t\t\t\t\u0026sysdig.MonitorDashboardScopeArgs{\n\t\t\t\t\tMetric:     pulumi.String(\"kubernetes.cluster.name\"),\n\t\t\t\t\tComparator: pulumi.String(\"in\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"prod\"),\n\t\t\t\t\t\tpulumi.String(\"dev\"),\n\t\t\t\t\t},\n\t\t\t\t\tVariable: pulumi.String(\"cluster_name\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorDashboardScopeArgs{\n\t\t\t\t\tMetric:   pulumi.String(\"host.hostName\"),\n\t\t\t\t\tVariable: pulumi.String(\"hostname\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tPanels: sysdig.MonitorDashboardPanelArray{\n\t\t\t\t\u0026sysdig.MonitorDashboardPanelArgs{\n\t\t\t\t\tPosX:        pulumi.Float64(0),\n\t\t\t\t\tPosY:        pulumi.Float64(0),\n\t\t\t\t\tWidth:       pulumi.Float64(12),\n\t\t\t\t\tHeight:      pulumi.Float64(6),\n\t\t\t\t\tType:        pulumi.String(\"timechart\"),\n\t\t\t\t\tName:        pulumi.String(\"Example panel\"),\n\t\t\t\t\tDescription: pulumi.String(\"Description\"),\n\t\t\t\t\tLegend: \u0026sysdig.MonitorDashboardPanelLegendArgs{\n\t\t\t\t\t\tEnabled:     pulumi.Bool(true),\n\t\t\t\t\t\tLayout:      pulumi.String(\"table\"),\n\t\t\t\t\t\tPosition:    pulumi.String(\"bottom\"),\n\t\t\t\t\t\tShowCurrent: pulumi.Bool(true),\n\t\t\t\t\t},\n\t\t\t\t\tQueries: sysdig.MonitorDashboardPanelQueryArray{\n\t\t\t\t\t\t\u0026sysdig.MonitorDashboardPanelQueryArgs{\n\t\t\t\t\t\t\tPromql: pulumi.String(\"avg_over_time(sysdig_host_cpu_used_percent{host_name=$hostname}[$__interval])\"),\n\t\t\t\t\t\t\tUnit:   pulumi.String(\"percent\"),\n\t\t\t\t\t\t\tFormat: \u0026sysdig.MonitorDashboardPanelQueryFormatArgs{\n\t\t\t\t\t\t\t\tDecimals:             pulumi.Float64(0),\n\t\t\t\t\t\t\t\tDisplayFormat:        pulumi.String(\"auto\"),\n\t\t\t\t\t\t\t\tInputFormat:          pulumi.String(\"0-100\"),\n\t\t\t\t\t\t\t\tNullValueDisplayMode: pulumi.String(\"nullGap\"),\n\t\t\t\t\t\t\t\tYAxis:                pulumi.String(\"auto\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\u0026sysdig.MonitorDashboardPanelQueryArgs{\n\t\t\t\t\t\t\tPromql: pulumi.String(\"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\"),\n\t\t\t\t\t\t\tUnit:   pulumi.String(\"number\"),\n\t\t\t\t\t\t\tDisplayInfos: sysdig.MonitorDashboardPanelQueryDisplayInfoArray{\n\t\t\t\t\t\t\t\t\u0026sysdig.MonitorDashboardPanelQueryDisplayInfoArgs{\n\t\t\t\t\t\t\t\t\tDisplayName:                   pulumi.String(\"ct_name\"),\n\t\t\t\t\t\t\t\t\tTimeSeriesDisplayNameTemplate: pulumi.String(\"{{container_name}}\"),\n\t\t\t\t\t\t\t\t\tType:                          pulumi.String(\"lines\"),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tFormat: \u0026sysdig.MonitorDashboardPanelQueryFormatArgs{\n\t\t\t\t\t\t\t\tDecimals:             pulumi.Float64(0),\n\t\t\t\t\t\t\t\tDisplayFormat:        pulumi.String(\"auto\"),\n\t\t\t\t\t\t\t\tInputFormat:          pulumi.String(\"1\"),\n\t\t\t\t\t\t\t\tNullValueDisplayMode: pulumi.String(\"nullGap\"),\n\t\t\t\t\t\t\t\tYAxis:                pulumi.String(\"auto\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorDashboardPanelArgs{\n\t\t\t\t\tPosX:        pulumi.Float64(12),\n\t\t\t\t\tPosY:        pulumi.Float64(0),\n\t\t\t\t\tWidth:       pulumi.Float64(12),\n\t\t\t\t\tHeight:      pulumi.Float64(6),\n\t\t\t\t\tType:        pulumi.String(\"number\"),\n\t\t\t\t\tName:        pulumi.String(\"example panel - 2\"),\n\t\t\t\t\tDescription: pulumi.String(\"description of panel 2\"),\n\t\t\t\t\tQueries: sysdig.MonitorDashboardPanelQueryArray{\n\t\t\t\t\t\t\u0026sysdig.MonitorDashboardPanelQueryArgs{\n\t\t\t\t\t\t\tPromql: pulumi.String(\"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\"),\n\t\t\t\t\t\t\tUnit:   pulumi.String(\"time\"),\n\t\t\t\t\t\t\tFormat: \u0026sysdig.MonitorDashboardPanelQueryFormatArgs{\n\t\t\t\t\t\t\t\tDecimals:             pulumi.Float64(0),\n\t\t\t\t\t\t\t\tDisplayFormat:        pulumi.String(\"auto\"),\n\t\t\t\t\t\t\t\tInputFormat:          pulumi.String(\"ns\"),\n\t\t\t\t\t\t\t\tNullValueDisplayMode: pulumi.String(\"nullGap\"),\n\t\t\t\t\t\t\t\tYAxis:                pulumi.String(\"auto\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorDashboardPanelArgs{\n\t\t\t\t\tPosX:                  pulumi.Float64(12),\n\t\t\t\t\tPosY:                  pulumi.Float64(12),\n\t\t\t\t\tWidth:                 pulumi.Float64(12),\n\t\t\t\t\tHeight:                pulumi.Float64(6),\n\t\t\t\t\tType:                  pulumi.String(\"text\"),\n\t\t\t\t\tName:                  pulumi.String(\"example panel - 2\"),\n\t\t\t\t\tContent:               pulumi.String(\"description of panel 2\"),\n\t\t\t\t\tVisibleTitle:          pulumi.Bool(true),\n\t\t\t\t\tAutosizeText:          pulumi.Bool(true),\n\t\t\t\t\tTransparentBackground: pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorDashboard;\nimport com.pulumi.sysdig.MonitorDashboardArgs;\nimport com.pulumi.sysdig.inputs.MonitorDashboardScopeArgs;\nimport com.pulumi.sysdig.inputs.MonitorDashboardPanelArgs;\nimport com.pulumi.sysdig.inputs.MonitorDashboardPanelLegendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var dashboard = new MonitorDashboard(\"dashboard\", MonitorDashboardArgs.builder()\n            .name(\"Example Dashboard\")\n            .description(\"Example Dashboard description\")\n            .scopes(            \n                MonitorDashboardScopeArgs.builder()\n                    .metric(\"kubernetes.cluster.name\")\n                    .comparator(\"in\")\n                    .values(                    \n                        \"prod\",\n                        \"dev\")\n                    .variable(\"cluster_name\")\n                    .build(),\n                MonitorDashboardScopeArgs.builder()\n                    .metric(\"host.hostName\")\n                    .variable(\"hostname\")\n                    .build())\n            .panels(            \n                MonitorDashboardPanelArgs.builder()\n                    .posX(0.0)\n                    .posY(0.0)\n                    .width(12.0)\n                    .height(6.0)\n                    .type(\"timechart\")\n                    .name(\"Example panel\")\n                    .description(\"Description\")\n                    .legend(MonitorDashboardPanelLegendArgs.builder()\n                        .enabled(true)\n                        .layout(\"table\")\n                        .position(\"bottom\")\n                        .showCurrent(true)\n                        .build())\n                    .queries(                    \n                        MonitorDashboardPanelQueryArgs.builder()\n                            .promql(\"avg_over_time(sysdig_host_cpu_used_percent{host_name=$hostname}[$__interval])\")\n                            .unit(\"percent\")\n                            .format(MonitorDashboardPanelQueryFormatArgs.builder()\n                                .decimals(0.0)\n                                .displayFormat(\"auto\")\n                                .inputFormat(\"0-100\")\n                                .nullValueDisplayMode(\"nullGap\")\n                                .yAxis(\"auto\")\n                                .build())\n                            .build(),\n                        MonitorDashboardPanelQueryArgs.builder()\n                            .promql(\"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\")\n                            .unit(\"number\")\n                            .displayInfos(MonitorDashboardPanelQueryDisplayInfoArgs.builder()\n                                .displayName(\"ct_name\")\n                                .timeSeriesDisplayNameTemplate(\"{{container_name}}\")\n                                .type(\"lines\")\n                                .build())\n                            .format(MonitorDashboardPanelQueryFormatArgs.builder()\n                                .decimals(0.0)\n                                .displayFormat(\"auto\")\n                                .inputFormat(\"1\")\n                                .nullValueDisplayMode(\"nullGap\")\n                                .yAxis(\"auto\")\n                                .build())\n                            .build())\n                    .build(),\n                MonitorDashboardPanelArgs.builder()\n                    .posX(12.0)\n                    .posY(0.0)\n                    .width(12.0)\n                    .height(6.0)\n                    .type(\"number\")\n                    .name(\"example panel - 2\")\n                    .description(\"description of panel 2\")\n                    .queries(MonitorDashboardPanelQueryArgs.builder()\n                        .promql(\"avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\")\n                        .unit(\"time\")\n                        .format(MonitorDashboardPanelQueryFormatArgs.builder()\n                            .decimals(0.0)\n                            .displayFormat(\"auto\")\n                            .inputFormat(\"ns\")\n                            .nullValueDisplayMode(\"nullGap\")\n                            .yAxis(\"auto\")\n                            .build())\n                        .build())\n                    .build(),\n                MonitorDashboardPanelArgs.builder()\n                    .posX(12.0)\n                    .posY(12.0)\n                    .width(12.0)\n                    .height(6.0)\n                    .type(\"text\")\n                    .name(\"example panel - 2\")\n                    .content(\"description of panel 2\")\n                    .visibleTitle(true)\n                    .autosizeText(true)\n                    .transparentBackground(true)\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  dashboard:\n    type: sysdig:MonitorDashboard\n    properties:\n      name: Example Dashboard\n      description: Example Dashboard description\n      scopes:\n        - metric: kubernetes.cluster.name\n          comparator: in\n          values:\n            - prod\n            - dev\n          variable: cluster_name\n        - metric: host.hostName\n          variable: hostname\n      panels:\n        - posX: 0\n          posY: 0\n          width: 12\n          height: 6\n          type: timechart\n          name: Example panel\n          description: Description\n          legend:\n            enabled: true\n            layout: table\n            position: bottom\n            showCurrent: true\n          queries:\n            - promql: avg_over_time(sysdig_host_cpu_used_percent{host_name=$hostname}[$__interval])\n              unit: percent\n              format:\n                decimals: 0\n                displayFormat: auto\n                inputFormat: 0-100\n                nullValueDisplayMode: nullGap\n                yAxis: auto\n            - promql: avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\n              unit: number\n              displayInfos:\n                - displayName: ct_name\n                  timeSeriesDisplayNameTemplate: '{{container_name}}'\n                  type: lines\n              format:\n                decimals: 0\n                displayFormat: auto\n                inputFormat: '1'\n                nullValueDisplayMode: nullGap\n                yAxis: auto\n        - posX: 12\n          posY: 0\n          width: 12\n          height: 6\n          type: number\n          name: example panel - 2\n          description: description of panel 2\n          queries:\n            - promql: avg(avg_over_time(sysdig_host_cpu_used_percent[$__interval]))\n              unit: time\n              format:\n                decimals: 0\n                displayFormat: auto\n                inputFormat: ns\n                nullValueDisplayMode: nullGap\n                yAxis: auto\n        - posX: 12\n          posY: 12\n          width: 12\n          height: 6\n          type: text\n          name: example panel - 2\n          content: description of panel 2\n          visibleTitle: true\n          autosizeText: true\n          transparentBackground: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMonitor dashboards can be imported using the dashboard ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorDashboard:MonitorDashboard example 12345\n```\nOnly dashboards that contain supported panels can be imported. Currently supported panel types are:\n- PromQL timecharts\n- PromQL numbers\n- Text\n\nOnly dashboards that contain supported query types can be imported. Currently supported query types:\n- Percent\n- Data\n- Data rate\n- Number\n- Number rate\n- Time\n\n","properties":{"description":{"type":"string","description":"Description of the dashboard.\n"},"minInterval":{"type":"string"},"monitorDashboardId":{"type":"string"},"name":{"type":"string","description":"The name of the Dashboard.\n"},"panels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanel:MonitorDashboardPanel"},"description":"At least 1 panel is required to define a Dashboard.\n"},"public":{"type":"boolean","description":"Define if the dashboard can be accessible without requiring the user to be logged in.\n"},"publicToken":{"type":"string","description":"(Computed) Token defined when the dashboard is set Public.\n"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardScope:MonitorDashboardScope"},"description":"Define the scope of the dashboard and variables for these metrics.\n"},"shares":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardShare:MonitorDashboardShare"},"description":"Define sharing options for this dashboard.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorDashboardTimeouts:MonitorDashboardTimeouts"},"version":{"type":"number","description":"(Computed)  The current version of the Dashboard.\n"}},"type":"object","required":["monitorDashboardId","name","panels","publicToken","version"],"inputProperties":{"description":{"type":"string","description":"Description of the dashboard.\n"},"minInterval":{"type":"string"},"monitorDashboardId":{"type":"string"},"name":{"type":"string","description":"The name of the Dashboard.\n"},"panels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanel:MonitorDashboardPanel"},"description":"At least 1 panel is required to define a Dashboard.\n"},"public":{"type":"boolean","description":"Define if the dashboard can be accessible without requiring the user to be logged in.\n"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardScope:MonitorDashboardScope"},"description":"Define the scope of the dashboard and variables for these metrics.\n"},"shares":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardShare:MonitorDashboardShare"},"description":"Define sharing options for this dashboard.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorDashboardTimeouts:MonitorDashboardTimeouts"}},"requiredInputs":["panels"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorDashboard resources.\n","properties":{"description":{"type":"string","description":"Description of the dashboard.\n"},"minInterval":{"type":"string"},"monitorDashboardId":{"type":"string"},"name":{"type":"string","description":"The name of the Dashboard.\n"},"panels":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardPanel:MonitorDashboardPanel"},"description":"At least 1 panel is required to define a Dashboard.\n"},"public":{"type":"boolean","description":"Define if the dashboard can be accessible without requiring the user to be logged in.\n"},"publicToken":{"type":"string","description":"(Computed) Token defined when the dashboard is set Public.\n"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardScope:MonitorDashboardScope"},"description":"Define the scope of the dashboard and variables for these metrics.\n"},"shares":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorDashboardShare:MonitorDashboardShare"},"description":"Define sharing options for this dashboard.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorDashboardTimeouts:MonitorDashboardTimeouts"},"version":{"type":"number","description":"(Computed)  The current version of the Dashboard.\n"}},"type":"object"}},"sysdig:index/monitorInhibitionRule:MonitorInhibitionRule":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorInhibitionRule(\"sample\", {\n    name: \"Example Inhibition Rule\",\n    description: \"Example description\",\n    enabled: true,\n    sourceMatchers: [\n        {\n            labelName: \"alertname\",\n            operator: \"EQUALS\",\n            value: \"networkAlert\",\n        },\n        {\n            labelName: \"device_type\",\n            operator: \"EQUALS\",\n            value: \"firewall\",\n        },\n    ],\n    targetMatchers: [{\n        labelName: \"device_type\",\n        operator: \"REGEXP_MATCHES\",\n        value: \".*server.*\",\n    }],\n    equals: [\"kube_cluster_name\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorInhibitionRule(\"sample\",\n    name=\"Example Inhibition Rule\",\n    description=\"Example description\",\n    enabled=True,\n    source_matchers=[\n        {\n            \"label_name\": \"alertname\",\n            \"operator\": \"EQUALS\",\n            \"value\": \"networkAlert\",\n        },\n        {\n            \"label_name\": \"device_type\",\n            \"operator\": \"EQUALS\",\n            \"value\": \"firewall\",\n        },\n    ],\n    target_matchers=[{\n        \"label_name\": \"device_type\",\n        \"operator\": \"REGEXP_MATCHES\",\n        \"value\": \".*server.*\",\n    }],\n    equals=[\"kube_cluster_name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorInhibitionRule(\"sample\", new()\n    {\n        Name = \"Example Inhibition Rule\",\n        Description = \"Example description\",\n        Enabled = true,\n        SourceMatchers = new[]\n        {\n            new Sysdig.Inputs.MonitorInhibitionRuleSourceMatcherArgs\n            {\n                LabelName = \"alertname\",\n                Operator = \"EQUALS\",\n                Value = \"networkAlert\",\n            },\n            new Sysdig.Inputs.MonitorInhibitionRuleSourceMatcherArgs\n            {\n                LabelName = \"device_type\",\n                Operator = \"EQUALS\",\n                Value = \"firewall\",\n            },\n        },\n        TargetMatchers = new[]\n        {\n            new Sysdig.Inputs.MonitorInhibitionRuleTargetMatcherArgs\n            {\n                LabelName = \"device_type\",\n                Operator = \"REGEXP_MATCHES\",\n                Value = \".*server.*\",\n            },\n        },\n        Equals = new[]\n        {\n            \"kube_cluster_name\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorInhibitionRule(ctx, \"sample\", \u0026sysdig.MonitorInhibitionRuleArgs{\n\t\t\tName:        pulumi.String(\"Example Inhibition Rule\"),\n\t\t\tDescription: pulumi.String(\"Example description\"),\n\t\t\tEnabled:     pulumi.Bool(true),\n\t\t\tSourceMatchers: sysdig.MonitorInhibitionRuleSourceMatcherArray{\n\t\t\t\t\u0026sysdig.MonitorInhibitionRuleSourceMatcherArgs{\n\t\t\t\t\tLabelName: pulumi.String(\"alertname\"),\n\t\t\t\t\tOperator:  pulumi.String(\"EQUALS\"),\n\t\t\t\t\tValue:     pulumi.String(\"networkAlert\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorInhibitionRuleSourceMatcherArgs{\n\t\t\t\t\tLabelName: pulumi.String(\"device_type\"),\n\t\t\t\t\tOperator:  pulumi.String(\"EQUALS\"),\n\t\t\t\t\tValue:     pulumi.String(\"firewall\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tTargetMatchers: sysdig.MonitorInhibitionRuleTargetMatcherArray{\n\t\t\t\t\u0026sysdig.MonitorInhibitionRuleTargetMatcherArgs{\n\t\t\t\t\tLabelName: pulumi.String(\"device_type\"),\n\t\t\t\t\tOperator:  pulumi.String(\"REGEXP_MATCHES\"),\n\t\t\t\t\tValue:     pulumi.String(\".*server.*\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEquals: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kube_cluster_name\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorInhibitionRule;\nimport com.pulumi.sysdig.MonitorInhibitionRuleArgs;\nimport com.pulumi.sysdig.inputs.MonitorInhibitionRuleSourceMatcherArgs;\nimport com.pulumi.sysdig.inputs.MonitorInhibitionRuleTargetMatcherArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorInhibitionRule(\"sample\", MonitorInhibitionRuleArgs.builder()\n            .name(\"Example Inhibition Rule\")\n            .description(\"Example description\")\n            .enabled(true)\n            .sourceMatchers(            \n                MonitorInhibitionRuleSourceMatcherArgs.builder()\n                    .labelName(\"alertname\")\n                    .operator(\"EQUALS\")\n                    .value(\"networkAlert\")\n                    .build(),\n                MonitorInhibitionRuleSourceMatcherArgs.builder()\n                    .labelName(\"device_type\")\n                    .operator(\"EQUALS\")\n                    .value(\"firewall\")\n                    .build())\n            .targetMatchers(MonitorInhibitionRuleTargetMatcherArgs.builder()\n                .labelName(\"device_type\")\n                .operator(\"REGEXP_MATCHES\")\n                .value(\".*server.*\")\n                .build())\n            .equals(\"kube_cluster_name\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorInhibitionRule\n    properties:\n      name: Example Inhibition Rule\n      description: Example description\n      enabled: true\n      sourceMatchers:\n        - labelName: alertname\n          operator: EQUALS\n          value: networkAlert\n        - labelName: device_type\n          operator: EQUALS\n          value: firewall\n      targetMatchers:\n        - labelName: device_type\n          operator: REGEXP_MATCHES\n          value: .*server.*\n      equals:\n        - kube_cluster_name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nInhibition Rules for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorInhibitionRule:MonitorInhibitionRule example 12345\n```\n","properties":{"description":{"type":"string","description":"The description of the Inhibition Rule.\n"},"enabled":{"type":"boolean","description":"Whether to enable the Inhibition Rule. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"equals":{"type":"array","items":{"type":"string"},"description":"List of label names that must have identical values in both the source and target alert occurrences for the inhibition rule to apply.\n"},"monitorInhibitionRuleId":{"type":"string","description":"(Computed) The ID of the Inhibition Rule.\n"},"name":{"type":"string","description":"The name of the Inhibition Rule. If provided, it must be unique.\n"},"sourceMatchers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleSourceMatcher:MonitorInhibitionRuleSourceMatcher"}},"targetMatchers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleTargetMatcher:MonitorInhibitionRuleTargetMatcher"}},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleTimeouts:MonitorInhibitionRuleTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Inhibition Rule.\n"}},"type":"object","required":["monitorInhibitionRuleId","name","sourceMatchers","targetMatchers","version"],"inputProperties":{"description":{"type":"string","description":"The description of the Inhibition Rule.\n"},"enabled":{"type":"boolean","description":"Whether to enable the Inhibition Rule. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"equals":{"type":"array","items":{"type":"string"},"description":"List of label names that must have identical values in both the source and target alert occurrences for the inhibition rule to apply.\n"},"monitorInhibitionRuleId":{"type":"string","description":"(Computed) The ID of the Inhibition Rule.\n"},"name":{"type":"string","description":"The name of the Inhibition Rule. If provided, it must be unique.\n"},"sourceMatchers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleSourceMatcher:MonitorInhibitionRuleSourceMatcher"}},"targetMatchers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleTargetMatcher:MonitorInhibitionRuleTargetMatcher"}},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleTimeouts:MonitorInhibitionRuleTimeouts"}},"requiredInputs":["sourceMatchers","targetMatchers"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorInhibitionRule resources.\n","properties":{"description":{"type":"string","description":"The description of the Inhibition Rule.\n"},"enabled":{"type":"boolean","description":"Whether to enable the Inhibition Rule. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"equals":{"type":"array","items":{"type":"string"},"description":"List of label names that must have identical values in both the source and target alert occurrences for the inhibition rule to apply.\n"},"monitorInhibitionRuleId":{"type":"string","description":"(Computed) The ID of the Inhibition Rule.\n"},"name":{"type":"string","description":"The name of the Inhibition Rule. If provided, it must be unique.\n"},"sourceMatchers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleSourceMatcher:MonitorInhibitionRuleSourceMatcher"}},"targetMatchers":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleTargetMatcher:MonitorInhibitionRuleTargetMatcher"}},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorInhibitionRuleTimeouts:MonitorInhibitionRuleTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Inhibition Rule.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelCustomWebhook:MonitorNotificationChannelCustomWebhook":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_custom_webhook = new sysdig.MonitorNotificationChannelCustomWebhook(\"sample-custom-webhook\", {\n    name: \"Example Channel - Custom Webhook\",\n    enabled: true,\n    url: \"http://localhost:8080\",\n    httpMethod: \"POST\",\n    template: `{\n  \"code\": \"incident\",\n  \"alert\": \"{{@alert_name}}\"\n}`,\n    additionalHeaders: {\n        \"custom-Header\": \"TestHeader\",\n    },\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_custom_webhook = sysdig.MonitorNotificationChannelCustomWebhook(\"sample-custom-webhook\",\n    name=\"Example Channel - Custom Webhook\",\n    enabled=True,\n    url=\"http://localhost:8080\",\n    http_method=\"POST\",\n    template=\"\"\"{\n  \"code\": \"incident\",\n  \"alert\": \"{{@alert_name}}\"\n}\"\"\",\n    additional_headers={\n        \"custom-Header\": \"TestHeader\",\n    },\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_custom_webhook = new Sysdig.MonitorNotificationChannelCustomWebhook(\"sample-custom-webhook\", new()\n    {\n        Name = \"Example Channel - Custom Webhook\",\n        Enabled = true,\n        Url = \"http://localhost:8080\",\n        HttpMethod = \"POST\",\n        Template = @\"{\n  \"\"code\"\": \"\"incident\"\",\n  \"\"alert\"\": \"\"{{@alert_name}}\"\"\n}\",\n        AdditionalHeaders = \n        {\n            { \"custom-Header\", \"TestHeader\" },\n        },\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelCustomWebhook(ctx, \"sample-custom-webhook\", \u0026sysdig.MonitorNotificationChannelCustomWebhookArgs{\n\t\t\tName:       pulumi.String(\"Example Channel - Custom Webhook\"),\n\t\t\tEnabled:    pulumi.Bool(true),\n\t\t\tUrl:        pulumi.String(\"http://localhost:8080\"),\n\t\t\tHttpMethod: pulumi.String(\"POST\"),\n\t\t\tTemplate:   pulumi.String(\"{\\n  \\\"code\\\": \\\"incident\\\",\\n  \\\"alert\\\": \\\"{{@alert_name}}\\\"\\n}\"),\n\t\t\tAdditionalHeaders: pulumi.StringMap{\n\t\t\t\t\"custom-Header\": pulumi.String(\"TestHeader\"),\n\t\t\t},\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelCustomWebhook;\nimport com.pulumi.sysdig.MonitorNotificationChannelCustomWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_custom_webhook = new MonitorNotificationChannelCustomWebhook(\"sample-custom-webhook\", MonitorNotificationChannelCustomWebhookArgs.builder()\n            .name(\"Example Channel - Custom Webhook\")\n            .enabled(true)\n            .url(\"http://localhost:8080\")\n            .httpMethod(\"POST\")\n            .template(\"\"\"\n{\n  \"code\": \"incident\",\n  \"alert\": \"{{@alert_name}}\"\n}            \"\"\")\n            .additionalHeaders(Map.of(\"custom-Header\", \"TestHeader\"))\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-custom-webhook:\n    type: sysdig:MonitorNotificationChannelCustomWebhook\n    properties:\n      name: Example Channel - Custom Webhook\n      enabled: true\n      url: http://localhost:8080\n      httpMethod: POST\n      template: |-\n        {\n          \"code\": \"incident\",\n          \"alert\": \"{{@alert_name}}\"\n        }\n      additionalHeaders:\n        custom-Header: TestHeader\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nCustom Webhook notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelCustomWebhook:MonitorNotificationChannelCustomWebhook example 12345\n```\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"httpMethod":{"type":"string","description":"Http method of the request to be sent. Possible values: `POST`, `PUT`, `PATCH`, `DELETE`.\n"},"monitorNotificationChannelCustomWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"template":{"type":"string","description":"JSON payload template to be sent in body.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelCustomWebhookTimeouts:MonitorNotificationChannelCustomWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["httpMethod","monitorNotificationChannelCustomWebhookId","name","template","url","version"],"inputProperties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"httpMethod":{"type":"string","description":"Http method of the request to be sent. Possible values: `POST`, `PUT`, `PATCH`, `DELETE`.\n"},"monitorNotificationChannelCustomWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"template":{"type":"string","description":"JSON payload template to be sent in body.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelCustomWebhookTimeouts:MonitorNotificationChannelCustomWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"}},"requiredInputs":["httpMethod","template","url"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelCustomWebhook resources.\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"httpMethod":{"type":"string","description":"Http method of the request to be sent. Possible values: `POST`, `PUT`, `PATCH`, `DELETE`.\n"},"monitorNotificationChannelCustomWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"template":{"type":"string","description":"JSON payload template to be sent in body.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelCustomWebhookTimeouts:MonitorNotificationChannelCustomWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelEmail:MonitorNotificationChannelEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sampleEmail = new sysdig.MonitorNotificationChannelEmail(\"sample_email\", {\n    name: \"Example Channel - Email\",\n    recipients: [\n        \"foo@localhost.com\",\n        \"bar@localhost.com\",\n    ],\n    enabled: true,\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_email = sysdig.MonitorNotificationChannelEmail(\"sample_email\",\n    name=\"Example Channel - Email\",\n    recipients=[\n        \"foo@localhost.com\",\n        \"bar@localhost.com\",\n    ],\n    enabled=True,\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sampleEmail = new Sysdig.MonitorNotificationChannelEmail(\"sample_email\", new()\n    {\n        Name = \"Example Channel - Email\",\n        Recipients = new[]\n        {\n            \"foo@localhost.com\",\n            \"bar@localhost.com\",\n        },\n        Enabled = true,\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelEmail(ctx, \"sample_email\", \u0026sysdig.MonitorNotificationChannelEmailArgs{\n\t\t\tName: pulumi.String(\"Example Channel - Email\"),\n\t\t\tRecipients: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo@localhost.com\"),\n\t\t\t\tpulumi.String(\"bar@localhost.com\"),\n\t\t\t},\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelEmail;\nimport com.pulumi.sysdig.MonitorNotificationChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sampleEmail = new MonitorNotificationChannelEmail(\"sampleEmail\", MonitorNotificationChannelEmailArgs.builder()\n            .name(\"Example Channel - Email\")\n            .recipients(            \n                \"foo@localhost.com\",\n                \"bar@localhost.com\")\n            .enabled(true)\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sampleEmail:\n    type: sysdig:MonitorNotificationChannelEmail\n    name: sample_email\n    properties:\n      name: Example Channel - Email\n      recipients:\n        - foo@localhost.com\n        - bar@localhost.com\n      enabled: true\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nEmail notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelEmail:MonitorNotificationChannelEmail example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"recipients":{"type":"array","items":{"type":"string"},"description":"List of recipients that will receive\nthe message.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelEmailTimeouts:MonitorNotificationChannelEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelEmailId","name","recipients","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"recipients":{"type":"array","items":{"type":"string"},"description":"List of recipients that will receive\nthe message.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelEmailTimeouts:MonitorNotificationChannelEmailTimeouts"}},"requiredInputs":["recipients"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelEmail resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"recipients":{"type":"array","items":{"type":"string"},"description":"List of recipients that will receive\nthe message.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelEmailTimeouts:MonitorNotificationChannelEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelGoogleChat:MonitorNotificationChannelGoogleChat":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_gchat = new sysdig.MonitorNotificationChannelGoogleChat(\"sample-gchat\", {\n    name: \"Example Channel - google chat\",\n    enabled: true,\n    url: \"https://chat.googleapis.com/v1/spaces/XXXXXX/messages?key=XXXXXXXXXXXXXXXXX\",\n    shareWithCurrentTeam: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_gchat = sysdig.MonitorNotificationChannelGoogleChat(\"sample-gchat\",\n    name=\"Example Channel - google chat\",\n    enabled=True,\n    url=\"https://chat.googleapis.com/v1/spaces/XXXXXX/messages?key=XXXXXXXXXXXXXXXXX\",\n    share_with_current_team=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_gchat = new Sysdig.MonitorNotificationChannelGoogleChat(\"sample-gchat\", new()\n    {\n        Name = \"Example Channel - google chat\",\n        Enabled = true,\n        Url = \"https://chat.googleapis.com/v1/spaces/XXXXXX/messages?key=XXXXXXXXXXXXXXXXX\",\n        ShareWithCurrentTeam = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelGoogleChat(ctx, \"sample-gchat\", \u0026sysdig.MonitorNotificationChannelGoogleChatArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - google chat\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tUrl:                  pulumi.String(\"https://chat.googleapis.com/v1/spaces/XXXXXX/messages?key=XXXXXXXXXXXXXXXXX\"),\n\t\t\tShareWithCurrentTeam: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelGoogleChat;\nimport com.pulumi.sysdig.MonitorNotificationChannelGoogleChatArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_gchat = new MonitorNotificationChannelGoogleChat(\"sample-gchat\", MonitorNotificationChannelGoogleChatArgs.builder()\n            .name(\"Example Channel - google chat\")\n            .enabled(true)\n            .url(\"https://chat.googleapis.com/v1/spaces/XXXXXX/messages?key=XXXXXXXXXXXXXXXXX\")\n            .shareWithCurrentTeam(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-gchat:\n    type: sysdig:MonitorNotificationChannelGoogleChat\n    properties:\n      name: Example Channel - google chat\n      enabled: true\n      url: https://chat.googleapis.com/v1/spaces/XXXXXX/messages?key=XXXXXXXXXXXXXXXXX\n      shareWithCurrentTeam: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nGoogle Chat notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelGoogleChat:MonitorNotificationChannelGoogleChat example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelGoogleChatId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelGoogleChatTimeouts:MonitorNotificationChannelGoogleChatTimeouts"},"url":{"type":"string","description":"URL of the Google Chat webhook.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelGoogleChatId","name","url","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelGoogleChatId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelGoogleChatTimeouts:MonitorNotificationChannelGoogleChatTimeouts"},"url":{"type":"string","description":"URL of the Google Chat webhook.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelGoogleChat resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelGoogleChatId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelGoogleChatTimeouts:MonitorNotificationChannelGoogleChatTimeouts"},"url":{"type":"string","description":"URL of the Google Chat webhook.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelIbmEventNotification:MonitorNotificationChannelIbmEventNotification":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\n// IBM event notification registering in the same account\nconst sample = new sysdig.MonitorNotificationChannelIbmEventNotification(\"sample\", {\n    name: \"Example Channel - IBM Event Notification\",\n    enabled: true,\n    instanceId: \"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n    shareWithCurrentTeam: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\n# IBM event notification registering in the same account\nsample = sysdig.MonitorNotificationChannelIbmEventNotification(\"sample\",\n    name=\"Example Channel - IBM Event Notification\",\n    enabled=True,\n    instance_id=\"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n    share_with_current_team=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    // IBM event notification registering in the same account\n    var sample = new Sysdig.MonitorNotificationChannelIbmEventNotification(\"sample\", new()\n    {\n        Name = \"Example Channel - IBM Event Notification\",\n        Enabled = true,\n        InstanceId = \"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n        ShareWithCurrentTeam = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// IBM event notification registering in the same account\n\t\t_, err := sysdig.NewMonitorNotificationChannelIbmEventNotification(ctx, \"sample\", \u0026sysdig.MonitorNotificationChannelIbmEventNotificationArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - IBM Event Notification\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tInstanceId:           pulumi.String(\"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\"),\n\t\t\tShareWithCurrentTeam: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelIbmEventNotification;\nimport com.pulumi.sysdig.MonitorNotificationChannelIbmEventNotificationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        // IBM event notification registering in the same account\n        var sample = new MonitorNotificationChannelIbmEventNotification(\"sample\", MonitorNotificationChannelIbmEventNotificationArgs.builder()\n            .name(\"Example Channel - IBM Event Notification\")\n            .enabled(true)\n            .instanceId(\"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\")\n            .shareWithCurrentTeam(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  # IBM event notification registering in the same account\n  sample:\n    type: sysdig:MonitorNotificationChannelIbmEventNotification\n    properties:\n      name: Example Channel - IBM Event Notification\n      enabled: true\n      instanceId: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\n      shareWithCurrentTeam: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\n// IBM event notification registering in different account\nconst sample = new sysdig.MonitorNotificationChannelIbmEventNotification(\"sample\", {\n    name: \"Example Channel - IBM Event Notification\",\n    enabled: true,\n    instanceId: \"crn:v1:bluemix:public:event-notifications:global:a/59bcbfa6ea2f006b4ed7094c1a08dcdd:1a0ec336-f391-4091-a6fb-5e084a4c56f4::\",\n    shareWithCurrentTeam: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\n# IBM event notification registering in different account\nsample = sysdig.MonitorNotificationChannelIbmEventNotification(\"sample\",\n    name=\"Example Channel - IBM Event Notification\",\n    enabled=True,\n    instance_id=\"crn:v1:bluemix:public:event-notifications:global:a/59bcbfa6ea2f006b4ed7094c1a08dcdd:1a0ec336-f391-4091-a6fb-5e084a4c56f4::\",\n    share_with_current_team=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    // IBM event notification registering in different account\n    var sample = new Sysdig.MonitorNotificationChannelIbmEventNotification(\"sample\", new()\n    {\n        Name = \"Example Channel - IBM Event Notification\",\n        Enabled = true,\n        InstanceId = \"crn:v1:bluemix:public:event-notifications:global:a/59bcbfa6ea2f006b4ed7094c1a08dcdd:1a0ec336-f391-4091-a6fb-5e084a4c56f4::\",\n        ShareWithCurrentTeam = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// IBM event notification registering in different account\n\t\t_, err := sysdig.NewMonitorNotificationChannelIbmEventNotification(ctx, \"sample\", \u0026sysdig.MonitorNotificationChannelIbmEventNotificationArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - IBM Event Notification\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tInstanceId:           pulumi.String(\"crn:v1:bluemix:public:event-notifications:global:a/59bcbfa6ea2f006b4ed7094c1a08dcdd:1a0ec336-f391-4091-a6fb-5e084a4c56f4::\"),\n\t\t\tShareWithCurrentTeam: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelIbmEventNotification;\nimport com.pulumi.sysdig.MonitorNotificationChannelIbmEventNotificationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        // IBM event notification registering in different account\n        var sample = new MonitorNotificationChannelIbmEventNotification(\"sample\", MonitorNotificationChannelIbmEventNotificationArgs.builder()\n            .name(\"Example Channel - IBM Event Notification\")\n            .enabled(true)\n            .instanceId(\"crn:v1:bluemix:public:event-notifications:global:a/59bcbfa6ea2f006b4ed7094c1a08dcdd:1a0ec336-f391-4091-a6fb-5e084a4c56f4::\")\n            .shareWithCurrentTeam(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  # IBM event notification registering in different account\n  sample:\n    type: sysdig:MonitorNotificationChannelIbmEventNotification\n    properties:\n      name: Example Channel - IBM Event Notification\n      enabled: true\n      instanceId: 'crn:v1:bluemix:public:event-notifications:global:a/59bcbfa6ea2f006b4ed7094c1a08dcdd:1a0ec336-f391-4091-a6fb-5e084a4c56f4::'\n      shareWithCurrentTeam: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nIBM Event Notification notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelIbmEventNotification:MonitorNotificationChannelIbmEventNotification example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"instanceId":{"type":"string","description":"id of the Event Notifications Instance. Id value can be either an instance id or CRN. If the event notification instance is within the same account, use the actual instance id. If it is in a different account, then use the Event Notifications Instance's [CRN](https://cloud.ibm.com/docs/account?topic=account-crn).\n"},"monitorNotificationChannelIbmEventNotificationId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelIbmEventNotificationTimeouts:MonitorNotificationChannelIbmEventNotificationTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["instanceId","monitorNotificationChannelIbmEventNotificationId","name","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"instanceId":{"type":"string","description":"id of the Event Notifications Instance. Id value can be either an instance id or CRN. If the event notification instance is within the same account, use the actual instance id. If it is in a different account, then use the Event Notifications Instance's [CRN](https://cloud.ibm.com/docs/account?topic=account-crn).\n"},"monitorNotificationChannelIbmEventNotificationId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelIbmEventNotificationTimeouts:MonitorNotificationChannelIbmEventNotificationTimeouts"}},"requiredInputs":["instanceId"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelIbmEventNotification resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"instanceId":{"type":"string","description":"id of the Event Notifications Instance. Id value can be either an instance id or CRN. If the event notification instance is within the same account, use the actual instance id. If it is in a different account, then use the Event Notifications Instance's [CRN](https://cloud.ibm.com/docs/account?topic=account-crn).\n"},"monitorNotificationChannelIbmEventNotificationId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelIbmEventNotificationTimeouts:MonitorNotificationChannelIbmEventNotificationTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelMsteams:MonitorNotificationChannelMsteams":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_msteams = new sysdig.MonitorNotificationChannelMsteams(\"sample-msteams\", {\n    name: \"Example Channel - MS Teams\",\n    enabled: true,\n    url: \"https://xxxxx.webhook.office.com/xxxxxxxxx\",\n    shareWithCurrentTeam: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_msteams = sysdig.MonitorNotificationChannelMsteams(\"sample-msteams\",\n    name=\"Example Channel - MS Teams\",\n    enabled=True,\n    url=\"https://xxxxx.webhook.office.com/xxxxxxxxx\",\n    share_with_current_team=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_msteams = new Sysdig.MonitorNotificationChannelMsteams(\"sample-msteams\", new()\n    {\n        Name = \"Example Channel - MS Teams\",\n        Enabled = true,\n        Url = \"https://xxxxx.webhook.office.com/xxxxxxxxx\",\n        ShareWithCurrentTeam = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelMsteams(ctx, \"sample-msteams\", \u0026sysdig.MonitorNotificationChannelMsteamsArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - MS Teams\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tUrl:                  pulumi.String(\"https://xxxxx.webhook.office.com/xxxxxxxxx\"),\n\t\t\tShareWithCurrentTeam: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelMsteams;\nimport com.pulumi.sysdig.MonitorNotificationChannelMsteamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_msteams = new MonitorNotificationChannelMsteams(\"sample-msteams\", MonitorNotificationChannelMsteamsArgs.builder()\n            .name(\"Example Channel - MS Teams\")\n            .enabled(true)\n            .url(\"https://xxxxx.webhook.office.com/xxxxxxxxx\")\n            .shareWithCurrentTeam(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-msteams:\n    type: sysdig:MonitorNotificationChannelMsteams\n    properties:\n      name: Example Channel - MS Teams\n      enabled: true\n      url: https://xxxxx.webhook.office.com/xxxxxxxxx\n      shareWithCurrentTeam: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMS Teams notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelMsteams:MonitorNotificationChannelMsteams example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelMsteamsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelMsteamsTimeouts:MonitorNotificationChannelMsteamsTimeouts"},"url":{"type":"string","description":"URL of the MS Teams webhook.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelMsteamsId","name","url","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelMsteamsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelMsteamsTimeouts:MonitorNotificationChannelMsteamsTimeouts"},"url":{"type":"string","description":"URL of the MS Teams webhook.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelMsteams resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelMsteamsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelMsteamsTimeouts:MonitorNotificationChannelMsteamsTimeouts"},"url":{"type":"string","description":"URL of the MS Teams webhook.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelOpsgenie:MonitorNotificationChannelOpsgenie":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_opsgenie = new sysdig.MonitorNotificationChannelOpsgenie(\"sample-opsgenie\", {\n    name: \"Example Channel - OpsGenie\",\n    enabled: true,\n    apiKey: \"2349324-342354353-5324-23\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_opsgenie = sysdig.MonitorNotificationChannelOpsgenie(\"sample-opsgenie\",\n    name=\"Example Channel - OpsGenie\",\n    enabled=True,\n    api_key=\"2349324-342354353-5324-23\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_opsgenie = new Sysdig.MonitorNotificationChannelOpsgenie(\"sample-opsgenie\", new()\n    {\n        Name = \"Example Channel - OpsGenie\",\n        Enabled = true,\n        ApiKey = \"2349324-342354353-5324-23\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelOpsgenie(ctx, \"sample-opsgenie\", \u0026sysdig.MonitorNotificationChannelOpsgenieArgs{\n\t\t\tName:    pulumi.String(\"Example Channel - OpsGenie\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tApiKey:  pulumi.String(\"2349324-342354353-5324-23\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelOpsgenie;\nimport com.pulumi.sysdig.MonitorNotificationChannelOpsgenieArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_opsgenie = new MonitorNotificationChannelOpsgenie(\"sample-opsgenie\", MonitorNotificationChannelOpsgenieArgs.builder()\n            .name(\"Example Channel - OpsGenie\")\n            .enabled(true)\n            .apiKey(\"2349324-342354353-5324-23\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-opsgenie:\n    type: sysdig:MonitorNotificationChannelOpsgenie\n    properties:\n      name: Example Channel - OpsGenie\n      enabled: true\n      apiKey: 2349324-342354353-5324-23\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nOpsgenie notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelOpsgenie:MonitorNotificationChannelOpsgenie example 12345\n```\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelOpsgenieId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"region":{"type":"string","description":"Opsgenie Region. Can be `US` or `EU`. Default is `US`.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelOpsgenieTimeouts:MonitorNotificationChannelOpsgenieTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["apiKey","monitorNotificationChannelOpsgenieId","name","version"],"inputProperties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelOpsgenieId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"region":{"type":"string","description":"Opsgenie Region. Can be `US` or `EU`. Default is `US`.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelOpsgenieTimeouts:MonitorNotificationChannelOpsgenieTimeouts"}},"requiredInputs":["apiKey"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelOpsgenie resources.\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelOpsgenieId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"region":{"type":"string","description":"Opsgenie Region. Can be `US` or `EU`. Default is `US`.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelOpsgenieTimeouts:MonitorNotificationChannelOpsgenieTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelPagerduty:MonitorNotificationChannelPagerduty":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_pagerduty = new sysdig.MonitorNotificationChannelPagerduty(\"sample-pagerduty\", {\n    name: \"Example Channel - Pagerduty\",\n    enabled: true,\n    account: \"account\",\n    serviceKey: \"XXXXXXXXXX\",\n    serviceName: \"sysdig\",\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_pagerduty = sysdig.MonitorNotificationChannelPagerduty(\"sample-pagerduty\",\n    name=\"Example Channel - Pagerduty\",\n    enabled=True,\n    account=\"account\",\n    service_key=\"XXXXXXXXXX\",\n    service_name=\"sysdig\",\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_pagerduty = new Sysdig.MonitorNotificationChannelPagerduty(\"sample-pagerduty\", new()\n    {\n        Name = \"Example Channel - Pagerduty\",\n        Enabled = true,\n        Account = \"account\",\n        ServiceKey = \"XXXXXXXXXX\",\n        ServiceName = \"sysdig\",\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelPagerduty(ctx, \"sample-pagerduty\", \u0026sysdig.MonitorNotificationChannelPagerdutyArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - Pagerduty\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tAccount:              pulumi.String(\"account\"),\n\t\t\tServiceKey:           pulumi.String(\"XXXXXXXXXX\"),\n\t\t\tServiceName:          pulumi.String(\"sysdig\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelPagerduty;\nimport com.pulumi.sysdig.MonitorNotificationChannelPagerdutyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_pagerduty = new MonitorNotificationChannelPagerduty(\"sample-pagerduty\", MonitorNotificationChannelPagerdutyArgs.builder()\n            .name(\"Example Channel - Pagerduty\")\n            .enabled(true)\n            .account(\"account\")\n            .serviceKey(\"XXXXXXXXXX\")\n            .serviceName(\"sysdig\")\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-pagerduty:\n    type: sysdig:MonitorNotificationChannelPagerduty\n    properties:\n      name: Example Channel - Pagerduty\n      enabled: true\n      account: account\n      serviceKey: XXXXXXXXXX\n      serviceName: sysdig\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPagerduty notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelPagerduty:MonitorNotificationChannelPagerduty example 12345\n```\n","properties":{"account":{"type":"string","description":"Pagerduty account.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelPagerdutyId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"serviceKey":{"type":"string","description":"Service Key for the Pagerduty account.\n"},"serviceName":{"type":"string","description":"Service name for the Pagerduty account.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelPagerdutyTimeouts:MonitorNotificationChannelPagerdutyTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["account","monitorNotificationChannelPagerdutyId","name","serviceKey","serviceName","version"],"inputProperties":{"account":{"type":"string","description":"Pagerduty account.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelPagerdutyId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"serviceKey":{"type":"string","description":"Service Key for the Pagerduty account.\n"},"serviceName":{"type":"string","description":"Service name for the Pagerduty account.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelPagerdutyTimeouts:MonitorNotificationChannelPagerdutyTimeouts"}},"requiredInputs":["account","serviceKey","serviceName"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelPagerduty resources.\n","properties":{"account":{"type":"string","description":"Pagerduty account.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelPagerdutyId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"serviceKey":{"type":"string","description":"Service Key for the Pagerduty account.\n"},"serviceName":{"type":"string","description":"Service name for the Pagerduty account.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelPagerdutyTimeouts:MonitorNotificationChannelPagerdutyTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelPrometheusAlertManager:MonitorNotificationChannelPrometheusAlertManager":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.MonitorNotificationChannelPrometheusAlertManager(\"sample\", {\n    name: \"Example Channel - Prometheus Alert Manager\",\n    enabled: true,\n    url: \"https://testurl:8080\",\n    sendTestNotification: false,\n    additionalHeaders: {\n        \"custom-Header\": \"TestHeader\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.MonitorNotificationChannelPrometheusAlertManager(\"sample\",\n    name=\"Example Channel - Prometheus Alert Manager\",\n    enabled=True,\n    url=\"https://testurl:8080\",\n    send_test_notification=False,\n    additional_headers={\n        \"custom-Header\": \"TestHeader\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.MonitorNotificationChannelPrometheusAlertManager(\"sample\", new()\n    {\n        Name = \"Example Channel - Prometheus Alert Manager\",\n        Enabled = true,\n        Url = \"https://testurl:8080\",\n        SendTestNotification = false,\n        AdditionalHeaders = \n        {\n            { \"custom-Header\", \"TestHeader\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelPrometheusAlertManager(ctx, \"sample\", \u0026sysdig.MonitorNotificationChannelPrometheusAlertManagerArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - Prometheus Alert Manager\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tUrl:                  pulumi.String(\"https://testurl:8080\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t\tAdditionalHeaders: pulumi.StringMap{\n\t\t\t\t\"custom-Header\": pulumi.String(\"TestHeader\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelPrometheusAlertManager;\nimport com.pulumi.sysdig.MonitorNotificationChannelPrometheusAlertManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new MonitorNotificationChannelPrometheusAlertManager(\"sample\", MonitorNotificationChannelPrometheusAlertManagerArgs.builder()\n            .name(\"Example Channel - Prometheus Alert Manager\")\n            .enabled(true)\n            .url(\"https://testurl:8080\")\n            .sendTestNotification(false)\n            .additionalHeaders(Map.of(\"custom-Header\", \"TestHeader\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:MonitorNotificationChannelPrometheusAlertManager\n    properties:\n      name: Example Channel - Prometheus Alert Manager\n      enabled: true\n      url: https://testurl:8080\n      sendTestNotification: false\n      additionalHeaders:\n        custom-Header: TestHeader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPrometheus Alert Manager notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelPrometheusAlertManager:MonitorNotificationChannelPrometheusAlertManager example 12345\n```\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelPrometheusAlertManagerId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelPrometheusAlertManagerTimeouts:MonitorNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelPrometheusAlertManagerId","name","url","version"],"inputProperties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelPrometheusAlertManagerId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelPrometheusAlertManagerTimeouts:MonitorNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelPrometheusAlertManager resources.\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelPrometheusAlertManagerId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelPrometheusAlertManagerTimeouts:MonitorNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelSlack:MonitorNotificationChannelSlack":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_slack = new sysdig.MonitorNotificationChannelSlack(\"sample-slack\", {\n    name: \"Example Channel - Slack\",\n    enabled: true,\n    url: \"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\",\n    channel: \"#sysdig\",\n    isPrivateChannel: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_slack = sysdig.MonitorNotificationChannelSlack(\"sample-slack\",\n    name=\"Example Channel - Slack\",\n    enabled=True,\n    url=\"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\",\n    channel=\"#sysdig\",\n    is_private_channel=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_slack = new Sysdig.MonitorNotificationChannelSlack(\"sample-slack\", new()\n    {\n        Name = \"Example Channel - Slack\",\n        Enabled = true,\n        Url = \"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\",\n        Channel = \"#sysdig\",\n        IsPrivateChannel = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelSlack(ctx, \"sample-slack\", \u0026sysdig.MonitorNotificationChannelSlackArgs{\n\t\t\tName:             pulumi.String(\"Example Channel - Slack\"),\n\t\t\tEnabled:          pulumi.Bool(true),\n\t\t\tUrl:              pulumi.String(\"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\"),\n\t\t\tChannel:          pulumi.String(\"#sysdig\"),\n\t\t\tIsPrivateChannel: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelSlack;\nimport com.pulumi.sysdig.MonitorNotificationChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_slack = new MonitorNotificationChannelSlack(\"sample-slack\", MonitorNotificationChannelSlackArgs.builder()\n            .name(\"Example Channel - Slack\")\n            .enabled(true)\n            .url(\"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\")\n            .channel(\"#sysdig\")\n            .isPrivateChannel(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-slack:\n    type: sysdig:MonitorNotificationChannelSlack\n    properties:\n      name: Example Channel - Slack\n      enabled: true\n      url: https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\n      channel: '#sysdig'\n      isPrivateChannel: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSlack notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelSlack:MonitorNotificationChannelSlack example 12345\n```\n","properties":{"channel":{"type":"string","description":"Name of the Slack channel.  **NOTE**: If the channel is private this field cannot be changed after creation.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"isPrivateChannel":{"type":"boolean","description":"If true, the Slack channel name will be visible only to the user that created this notification channel. Default: false.\n"},"monitorNotificationChannelSlackId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"privateChannelUrl":{"type":"string","description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url). Can be set only if the channel is private.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"showSectionAlertDetails":{"type":"boolean","description":"Whether to include the alert details section in the Slack messages. Default: true.\n"},"showSectionCapturingInformation":{"type":"boolean","description":"Whether to include the capturing information section in the Slack messages. Default: true.\n"},"showSectionDashboardLinks":{"type":"boolean","description":"Whether to include the dashboard links section in the Slack messages. Default: true.\n"},"showSectionEventDetails":{"type":"boolean","description":"Whether to include the event details section in the Slack messages. Default: true.\n"},"showSectionNotificationChart":{"type":"boolean","description":"Whether to include the notification chart section in the Slack messages. Default: true.\n"},"showSectionRunbookLinks":{"type":"boolean","description":"Whether to include the runbook links section in the Slack messages. Default: true.\n"},"showSectionUserDefinedContent":{"type":"boolean","description":"Whether to include the user defined section in the Slack messages. Default: true.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelSlackTimeouts:MonitorNotificationChannelSlackTimeouts"},"url":{"type":"string","description":"URL of the Slack webhook.\n","secret":true},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["channel","monitorNotificationChannelSlackId","name","url","version"],"inputProperties":{"channel":{"type":"string","description":"Name of the Slack channel.  **NOTE**: If the channel is private this field cannot be changed after creation.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"isPrivateChannel":{"type":"boolean","description":"If true, the Slack channel name will be visible only to the user that created this notification channel. Default: false.\n"},"monitorNotificationChannelSlackId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"privateChannelUrl":{"type":"string","description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url). Can be set only if the channel is private.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"showSectionAlertDetails":{"type":"boolean","description":"Whether to include the alert details section in the Slack messages. Default: true.\n"},"showSectionCapturingInformation":{"type":"boolean","description":"Whether to include the capturing information section in the Slack messages. Default: true.\n"},"showSectionDashboardLinks":{"type":"boolean","description":"Whether to include the dashboard links section in the Slack messages. Default: true.\n"},"showSectionEventDetails":{"type":"boolean","description":"Whether to include the event details section in the Slack messages. Default: true.\n"},"showSectionNotificationChart":{"type":"boolean","description":"Whether to include the notification chart section in the Slack messages. Default: true.\n"},"showSectionRunbookLinks":{"type":"boolean","description":"Whether to include the runbook links section in the Slack messages. Default: true.\n"},"showSectionUserDefinedContent":{"type":"boolean","description":"Whether to include the user defined section in the Slack messages. Default: true.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelSlackTimeouts:MonitorNotificationChannelSlackTimeouts"},"url":{"type":"string","description":"URL of the Slack webhook.\n","secret":true}},"requiredInputs":["channel","url"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelSlack resources.\n","properties":{"channel":{"type":"string","description":"Name of the Slack channel.  **NOTE**: If the channel is private this field cannot be changed after creation.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"isPrivateChannel":{"type":"boolean","description":"If true, the Slack channel name will be visible only to the user that created this notification channel. Default: false.\n"},"monitorNotificationChannelSlackId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"privateChannelUrl":{"type":"string","description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url). Can be set only if the channel is private.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"showSectionAlertDetails":{"type":"boolean","description":"Whether to include the alert details section in the Slack messages. Default: true.\n"},"showSectionCapturingInformation":{"type":"boolean","description":"Whether to include the capturing information section in the Slack messages. Default: true.\n"},"showSectionDashboardLinks":{"type":"boolean","description":"Whether to include the dashboard links section in the Slack messages. Default: true.\n"},"showSectionEventDetails":{"type":"boolean","description":"Whether to include the event details section in the Slack messages. Default: true.\n"},"showSectionNotificationChart":{"type":"boolean","description":"Whether to include the notification chart section in the Slack messages. Default: true.\n"},"showSectionRunbookLinks":{"type":"boolean","description":"Whether to include the runbook links section in the Slack messages. Default: true.\n"},"showSectionUserDefinedContent":{"type":"boolean","description":"Whether to include the user defined section in the Slack messages. Default: true.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelSlackTimeouts:MonitorNotificationChannelSlackTimeouts"},"url":{"type":"string","description":"URL of the Slack webhook.\n","secret":true},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelSns:MonitorNotificationChannelSns":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_amazon_sns = new sysdig.MonitorNotificationChannelSns(\"sample-amazon-sns\", {\n    name: \"Example Channel - Amazon SNS\",\n    enabled: true,\n    topics: [\n        \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n        \"arn:aws:sns:us-east-1:279948934544:my-alerts\",\n    ],\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_amazon_sns = sysdig.MonitorNotificationChannelSns(\"sample-amazon-sns\",\n    name=\"Example Channel - Amazon SNS\",\n    enabled=True,\n    topics=[\n        \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n        \"arn:aws:sns:us-east-1:279948934544:my-alerts\",\n    ],\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_amazon_sns = new Sysdig.MonitorNotificationChannelSns(\"sample-amazon-sns\", new()\n    {\n        Name = \"Example Channel - Amazon SNS\",\n        Enabled = true,\n        Topics = new[]\n        {\n            \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n            \"arn:aws:sns:us-east-1:279948934544:my-alerts\",\n        },\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelSns(ctx, \"sample-amazon-sns\", \u0026sysdig.MonitorNotificationChannelSnsArgs{\n\t\t\tName:    pulumi.String(\"Example Channel - Amazon SNS\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tTopics: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"arn:aws:sns:us-east-1:273489009834:my-alerts2\"),\n\t\t\t\tpulumi.String(\"arn:aws:sns:us-east-1:279948934544:my-alerts\"),\n\t\t\t},\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelSns;\nimport com.pulumi.sysdig.MonitorNotificationChannelSnsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_amazon_sns = new MonitorNotificationChannelSns(\"sample-amazon-sns\", MonitorNotificationChannelSnsArgs.builder()\n            .name(\"Example Channel - Amazon SNS\")\n            .enabled(true)\n            .topics(            \n                \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n                \"arn:aws:sns:us-east-1:279948934544:my-alerts\")\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-amazon-sns:\n    type: sysdig:MonitorNotificationChannelSns\n    properties:\n      name: Example Channel - Amazon SNS\n      enabled: true\n      topics:\n        - arn:aws:sns:us-east-1:273489009834:my-alerts2\n        - arn:aws:sns:us-east-1:279948934544:my-alerts\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nAmazon SNS notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelSns:MonitorNotificationChannelSns example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelSnsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelSnsTimeouts:MonitorNotificationChannelSnsTimeouts"},"topics":{"type":"array","items":{"type":"string"},"description":"List of ARNs from the SNS topics.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelSnsId","name","topics","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelSnsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelSnsTimeouts:MonitorNotificationChannelSnsTimeouts"},"topics":{"type":"array","items":{"type":"string"},"description":"List of ARNs from the SNS topics.\n"}},"requiredInputs":["topics"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelSns resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelSnsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelSnsTimeouts:MonitorNotificationChannelSnsTimeouts"},"topics":{"type":"array","items":{"type":"string"},"description":"List of ARNs from the SNS topics.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelTeamEmail:MonitorNotificationChannelTeamEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_team_email = new sysdig.MonitorNotificationChannelTeamEmail(\"sample-team-email\", {\n    name: \"Example Channel - team email\",\n    teamId: 1,\n    includeAdminUsers: false,\n    enabled: true,\n    shareWithCurrentTeam: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_team_email = sysdig.MonitorNotificationChannelTeamEmail(\"sample-team-email\",\n    name=\"Example Channel - team email\",\n    team_id=1,\n    include_admin_users=False,\n    enabled=True,\n    share_with_current_team=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_team_email = new Sysdig.MonitorNotificationChannelTeamEmail(\"sample-team-email\", new()\n    {\n        Name = \"Example Channel - team email\",\n        TeamId = 1,\n        IncludeAdminUsers = false,\n        Enabled = true,\n        ShareWithCurrentTeam = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelTeamEmail(ctx, \"sample-team-email\", \u0026sysdig.MonitorNotificationChannelTeamEmailArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - team email\"),\n\t\t\tTeamId:               pulumi.Float64(1),\n\t\t\tIncludeAdminUsers:    pulumi.Bool(false),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tShareWithCurrentTeam: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelTeamEmail;\nimport com.pulumi.sysdig.MonitorNotificationChannelTeamEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_team_email = new MonitorNotificationChannelTeamEmail(\"sample-team-email\", MonitorNotificationChannelTeamEmailArgs.builder()\n            .name(\"Example Channel - team email\")\n            .teamId(1.0)\n            .includeAdminUsers(false)\n            .enabled(true)\n            .shareWithCurrentTeam(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-team-email:\n    type: sysdig:MonitorNotificationChannelTeamEmail\n    properties:\n      name: Example Channel - team email\n      teamId: 1\n      includeAdminUsers: false\n      enabled: true\n      shareWithCurrentTeam: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nTeam Email notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelTeamEmail:MonitorNotificationChannelTeamEmail example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"includeAdminUsers":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, it will include admin users in notifications. Default is false.\n"},"monitorNotificationChannelTeamEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"teamId":{"type":"number","description":"id of the team.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelTeamEmailTimeouts:MonitorNotificationChannelTeamEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelTeamEmailId","name","teamId","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"includeAdminUsers":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, it will include admin users in notifications. Default is false.\n"},"monitorNotificationChannelTeamEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"teamId":{"type":"number","description":"id of the team.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelTeamEmailTimeouts:MonitorNotificationChannelTeamEmailTimeouts"}},"requiredInputs":["teamId"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelTeamEmail resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"includeAdminUsers":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, it will include admin users in notifications. Default is false.\n"},"monitorNotificationChannelTeamEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"teamId":{"type":"number","description":"id of the team.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelTeamEmailTimeouts:MonitorNotificationChannelTeamEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelVictorops:MonitorNotificationChannelVictorops":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_victorops = new sysdig.MonitorNotificationChannelVictorops(\"sample-victorops\", {\n    name: \"Example Channel - VictorOps\",\n    enabled: true,\n    apiKey: \"1234342-4234243-4234-2\",\n    routingKey: \"My team\",\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_victorops = sysdig.MonitorNotificationChannelVictorops(\"sample-victorops\",\n    name=\"Example Channel - VictorOps\",\n    enabled=True,\n    api_key=\"1234342-4234243-4234-2\",\n    routing_key=\"My team\",\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_victorops = new Sysdig.MonitorNotificationChannelVictorops(\"sample-victorops\", new()\n    {\n        Name = \"Example Channel - VictorOps\",\n        Enabled = true,\n        ApiKey = \"1234342-4234243-4234-2\",\n        RoutingKey = \"My team\",\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelVictorops(ctx, \"sample-victorops\", \u0026sysdig.MonitorNotificationChannelVictoropsArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - VictorOps\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tApiKey:               pulumi.String(\"1234342-4234243-4234-2\"),\n\t\t\tRoutingKey:           pulumi.String(\"My team\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelVictorops;\nimport com.pulumi.sysdig.MonitorNotificationChannelVictoropsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_victorops = new MonitorNotificationChannelVictorops(\"sample-victorops\", MonitorNotificationChannelVictoropsArgs.builder()\n            .name(\"Example Channel - VictorOps\")\n            .enabled(true)\n            .apiKey(\"1234342-4234243-4234-2\")\n            .routingKey(\"My team\")\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-victorops:\n    type: sysdig:MonitorNotificationChannelVictorops\n    properties:\n      name: Example Channel - VictorOps\n      enabled: true\n      apiKey: 1234342-4234243-4234-2\n      routingKey: My team\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nVictorOPS notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelVictorops:MonitorNotificationChannelVictorops example 12345\n```\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelVictoropsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"routingKey":{"type":"string","description":"Routing key for VictorOps.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelVictoropsTimeouts:MonitorNotificationChannelVictoropsTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["apiKey","monitorNotificationChannelVictoropsId","name","routingKey","version"],"inputProperties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelVictoropsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"routingKey":{"type":"string","description":"Routing key for VictorOps.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelVictoropsTimeouts:MonitorNotificationChannelVictoropsTimeouts"}},"requiredInputs":["apiKey","routingKey"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelVictorops resources.\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelVictoropsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"routingKey":{"type":"string","description":"Routing key for VictorOps.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelVictoropsTimeouts:MonitorNotificationChannelVictoropsTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorNotificationChannelWebhook:MonitorNotificationChannelWebhook":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_webhook = new sysdig.MonitorNotificationChannelWebhook(\"sample-webhook\", {\n    name: \"Example Channel - Webhook\",\n    enabled: true,\n    url: \"localhost:8080\",\n    sendTestNotification: false,\n    customData: {\n        data1: \"value1\",\n        data2: \"value2\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_webhook = sysdig.MonitorNotificationChannelWebhook(\"sample-webhook\",\n    name=\"Example Channel - Webhook\",\n    enabled=True,\n    url=\"localhost:8080\",\n    send_test_notification=False,\n    custom_data={\n        \"data1\": \"value1\",\n        \"data2\": \"value2\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_webhook = new Sysdig.MonitorNotificationChannelWebhook(\"sample-webhook\", new()\n    {\n        Name = \"Example Channel - Webhook\",\n        Enabled = true,\n        Url = \"localhost:8080\",\n        SendTestNotification = false,\n        CustomData = \n        {\n            { \"data1\", \"value1\" },\n            { \"data2\", \"value2\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewMonitorNotificationChannelWebhook(ctx, \"sample-webhook\", \u0026sysdig.MonitorNotificationChannelWebhookArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - Webhook\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tUrl:                  pulumi.String(\"localhost:8080\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t\tCustomData: pulumi.StringMap{\n\t\t\t\t\"data1\": pulumi.String(\"value1\"),\n\t\t\t\t\"data2\": pulumi.String(\"value2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.MonitorNotificationChannelWebhook;\nimport com.pulumi.sysdig.MonitorNotificationChannelWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_webhook = new MonitorNotificationChannelWebhook(\"sample-webhook\", MonitorNotificationChannelWebhookArgs.builder()\n            .name(\"Example Channel - Webhook\")\n            .enabled(true)\n            .url(\"localhost:8080\")\n            .sendTestNotification(false)\n            .customData(Map.ofEntries(\n                Map.entry(\"data1\", \"value1\"),\n                Map.entry(\"data2\", \"value2\")\n            ))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-webhook:\n    type: sysdig:MonitorNotificationChannelWebhook\n    properties:\n      name: Example Channel - Webhook\n      enabled: true\n      url: localhost:8080\n      sendTestNotification: false\n      customData:\n        data1: value1\n        data2: value2\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWebhook notification channels for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorNotificationChannelWebhook:MonitorNotificationChannelWebhook example 12345\n```\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"customData":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelWebhookTimeouts:MonitorNotificationChannelWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["monitorNotificationChannelWebhookId","name","url","version"],"inputProperties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"customData":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelWebhookTimeouts:MonitorNotificationChannelWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorNotificationChannelWebhook resources.\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"customData":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"monitorNotificationChannelWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorNotificationChannelWebhookTimeouts:MonitorNotificationChannelWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/monitorSilenceRule:MonitorSilenceRule":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\nimport * as time from \"@pulumi/time\";\n\nconst startTs = new time.index.Static(\"start_ts\", {rfc3339: \"2023-07-08T07:00:00Z\"});\nconst sample = new sysdig.MonitorSilenceRule(\"sample\", {\n    name: \"Example Silence Rule\",\n    enabled: true,\n    startTs: startTs.unix * 1000,\n    durationSeconds: 60 * 60 * 24,\n    scope: \"cloudProvider.region != \\\"us-east-1\\\" and not host.hostName contains \\\"testhost\\\" and kubernetes.job.name starts with \\\"prod\\\" and kubernetes.daemonSet.name in (\\\"ds1\\\", \\\"ds2\\\")\",\n    alertIds: [\n        1234,\n        1235,\n    ],\n    notificationChannelIds: [\n        111,\n        222,\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\nimport pulumi_time as time\n\nstart_ts = time.index.Static(\"start_ts\", rfc3339=2023-07-08T07:00:00Z)\nsample = sysdig.MonitorSilenceRule(\"sample\",\n    name=\"Example Silence Rule\",\n    enabled=True,\n    start_ts=start_ts[\"unix\"] * 1000,\n    duration_seconds=60 * 60 * 24,\n    scope=\"cloudProvider.region != \\\"us-east-1\\\" and not host.hostName contains \\\"testhost\\\" and kubernetes.job.name starts with \\\"prod\\\" and kubernetes.daemonSet.name in (\\\"ds1\\\", \\\"ds2\\\")\",\n    alert_ids=[\n        1234,\n        1235,\n    ],\n    notification_channel_ids=[\n        111,\n        222,\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\nusing Time = Pulumi.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var startTs = new Time.Index.Static(\"start_ts\", new()\n    {\n        Rfc3339 = \"2023-07-08T07:00:00Z\",\n    });\n\n    var sample = new Sysdig.MonitorSilenceRule(\"sample\", new()\n    {\n        Name = \"Example Silence Rule\",\n        Enabled = true,\n        StartTs = startTs.Unix * 1000,\n        DurationSeconds = 60 * 60 * 24,\n        Scope = \"cloudProvider.region != \\\"us-east-1\\\" and not host.hostName contains \\\"testhost\\\" and kubernetes.job.name starts with \\\"prod\\\" and kubernetes.daemonSet.name in (\\\"ds1\\\", \\\"ds2\\\")\",\n        AlertIds = new[]\n        {\n            1234,\n            1235,\n        },\n        NotificationChannelIds = new[]\n        {\n            111,\n            222,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi-time/sdk/go/time\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tstartTs, err := time.NewStatic(ctx, \"start_ts\", \u0026time.StaticArgs{\n\t\t\tRfc3339: \"2023-07-08T07:00:00Z\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewMonitorSilenceRule(ctx, \"sample\", \u0026sysdig.MonitorSilenceRuleArgs{\n\t\t\tName:            pulumi.String(\"Example Silence Rule\"),\n\t\t\tEnabled:         pulumi.Bool(true),\n\t\t\tStartTs:         pulumi.String(startTs.Unix * 1000),\n\t\t\tDurationSeconds: 60 * 60 * 24,\n\t\t\tScope:           pulumi.String(\"cloudProvider.region != \\\"us-east-1\\\" and not host.hostName contains \\\"testhost\\\" and kubernetes.job.name starts with \\\"prod\\\" and kubernetes.daemonSet.name in (\\\"ds1\\\", \\\"ds2\\\")\"),\n\t\t\tAlertIds: pulumi.Float64Array{\n\t\t\t\tpulumi.Float64(1234),\n\t\t\t\tpulumi.Float64(1235),\n\t\t\t},\n\t\t\tNotificationChannelIds: pulumi.Float64Array{\n\t\t\t\tpulumi.Float64(111),\n\t\t\t\tpulumi.Float64(222),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.time.Static;\nimport com.pulumi.time.StaticArgs;\nimport com.pulumi.sysdig.MonitorSilenceRule;\nimport com.pulumi.sysdig.MonitorSilenceRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var startTs = new Static(\"startTs\", StaticArgs.builder()\n            .rfc3339(\"2023-07-08T07:00:00Z\")\n            .build());\n\n        var sample = new MonitorSilenceRule(\"sample\", MonitorSilenceRuleArgs.builder()\n            .name(\"Example Silence Rule\")\n            .enabled(true)\n            .startTs(startTs.unix() * 1000)\n            .durationSeconds(60 * 60 * 24)\n            .scope(\"cloudProvider.region != \\\"us-east-1\\\" and not host.hostName contains \\\"testhost\\\" and kubernetes.job.name starts with \\\"prod\\\" and kubernetes.daemonSet.name in (\\\"ds1\\\", \\\"ds2\\\")\")\n            .alertIds(            \n                1234.0,\n                1235.0)\n            .notificationChannelIds(            \n                111.0,\n                222.0)\n            .build());\n\n    }\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSilence Rules for Monitor can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorSilenceRule:MonitorSilenceRule example 12345\n```\n","properties":{"alertIds":{"type":"array","items":{"type":"number"},"description":"List of alerts the Silence Rule will be applied to. At least one of \u003cspan pulumi-lang-nodejs=\"`scope`\" pulumi-lang-dotnet=\"`Scope`\" pulumi-lang-go=\"`scope`\" pulumi-lang-python=\"`scope`\" pulumi-lang-yaml=\"`scope`\" pulumi-lang-java=\"`scope`\"\u003e`scope`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`alertIds`\" pulumi-lang-dotnet=\"`AlertIds`\" pulumi-lang-go=\"`alertIds`\" pulumi-lang-python=\"`alert_ids`\" pulumi-lang-yaml=\"`alertIds`\" pulumi-lang-java=\"`alertIds`\"\u003e`alert_ids`\u003c/span\u003e must be defined.\n"},"durationSeconds":{"type":"number","description":"Duration of the Silence Rule, in seconds.\n"},"enabled":{"type":"boolean","description":"Whether to enable the Silence Rule. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"monitorSilenceRuleId":{"type":"string","description":"(Computed) The ID of the Silence Rule.\n"},"name":{"type":"string","description":"The name of the Silence Rule.\n"},"notificationChannelIds":{"type":"array","items":{"type":"number"},"description":"List of notification channels that will be used to notify when the Silence Rule starts and end.\n"},"scope":{"type":"string","description":"Part of the infrastructure the Silence Rule will be applied to. At least one of \u003cspan pulumi-lang-nodejs=\"`scope`\" pulumi-lang-dotnet=\"`Scope`\" pulumi-lang-go=\"`scope`\" pulumi-lang-python=\"`scope`\" pulumi-lang-yaml=\"`scope`\" pulumi-lang-java=\"`scope`\"\u003e`scope`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`alertIds`\" pulumi-lang-dotnet=\"`AlertIds`\" pulumi-lang-go=\"`alertIds`\" pulumi-lang-python=\"`alert_ids`\" pulumi-lang-yaml=\"`alertIds`\" pulumi-lang-java=\"`alertIds`\"\u003e`alert_ids`\u003c/span\u003e must be defined.\n"},"startTs":{"type":"string","description":"Unix timestamp, in milliseconds, when the Silence Rule starts.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorSilenceRuleTimeouts:MonitorSilenceRuleTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Silence Rule.\n"}},"type":"object","required":["durationSeconds","monitorSilenceRuleId","name","startTs","version"],"inputProperties":{"alertIds":{"type":"array","items":{"type":"number"},"description":"List of alerts the Silence Rule will be applied to. At least one of \u003cspan pulumi-lang-nodejs=\"`scope`\" pulumi-lang-dotnet=\"`Scope`\" pulumi-lang-go=\"`scope`\" pulumi-lang-python=\"`scope`\" pulumi-lang-yaml=\"`scope`\" pulumi-lang-java=\"`scope`\"\u003e`scope`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`alertIds`\" pulumi-lang-dotnet=\"`AlertIds`\" pulumi-lang-go=\"`alertIds`\" pulumi-lang-python=\"`alert_ids`\" pulumi-lang-yaml=\"`alertIds`\" pulumi-lang-java=\"`alertIds`\"\u003e`alert_ids`\u003c/span\u003e must be defined.\n"},"durationSeconds":{"type":"number","description":"Duration of the Silence Rule, in seconds.\n"},"enabled":{"type":"boolean","description":"Whether to enable the Silence Rule. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"monitorSilenceRuleId":{"type":"string","description":"(Computed) The ID of the Silence Rule.\n"},"name":{"type":"string","description":"The name of the Silence Rule.\n"},"notificationChannelIds":{"type":"array","items":{"type":"number"},"description":"List of notification channels that will be used to notify when the Silence Rule starts and end.\n"},"scope":{"type":"string","description":"Part of the infrastructure the Silence Rule will be applied to. At least one of \u003cspan pulumi-lang-nodejs=\"`scope`\" pulumi-lang-dotnet=\"`Scope`\" pulumi-lang-go=\"`scope`\" pulumi-lang-python=\"`scope`\" pulumi-lang-yaml=\"`scope`\" pulumi-lang-java=\"`scope`\"\u003e`scope`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`alertIds`\" pulumi-lang-dotnet=\"`AlertIds`\" pulumi-lang-go=\"`alertIds`\" pulumi-lang-python=\"`alert_ids`\" pulumi-lang-yaml=\"`alertIds`\" pulumi-lang-java=\"`alertIds`\"\u003e`alert_ids`\u003c/span\u003e must be defined.\n"},"startTs":{"type":"string","description":"Unix timestamp, in milliseconds, when the Silence Rule starts.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorSilenceRuleTimeouts:MonitorSilenceRuleTimeouts"}},"requiredInputs":["durationSeconds","startTs"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorSilenceRule resources.\n","properties":{"alertIds":{"type":"array","items":{"type":"number"},"description":"List of alerts the Silence Rule will be applied to. At least one of \u003cspan pulumi-lang-nodejs=\"`scope`\" pulumi-lang-dotnet=\"`Scope`\" pulumi-lang-go=\"`scope`\" pulumi-lang-python=\"`scope`\" pulumi-lang-yaml=\"`scope`\" pulumi-lang-java=\"`scope`\"\u003e`scope`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`alertIds`\" pulumi-lang-dotnet=\"`AlertIds`\" pulumi-lang-go=\"`alertIds`\" pulumi-lang-python=\"`alert_ids`\" pulumi-lang-yaml=\"`alertIds`\" pulumi-lang-java=\"`alertIds`\"\u003e`alert_ids`\u003c/span\u003e must be defined.\n"},"durationSeconds":{"type":"number","description":"Duration of the Silence Rule, in seconds.\n"},"enabled":{"type":"boolean","description":"Whether to enable the Silence Rule. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"monitorSilenceRuleId":{"type":"string","description":"(Computed) The ID of the Silence Rule.\n"},"name":{"type":"string","description":"The name of the Silence Rule.\n"},"notificationChannelIds":{"type":"array","items":{"type":"number"},"description":"List of notification channels that will be used to notify when the Silence Rule starts and end.\n"},"scope":{"type":"string","description":"Part of the infrastructure the Silence Rule will be applied to. At least one of \u003cspan pulumi-lang-nodejs=\"`scope`\" pulumi-lang-dotnet=\"`Scope`\" pulumi-lang-go=\"`scope`\" pulumi-lang-python=\"`scope`\" pulumi-lang-yaml=\"`scope`\" pulumi-lang-java=\"`scope`\"\u003e`scope`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`alertIds`\" pulumi-lang-dotnet=\"`AlertIds`\" pulumi-lang-go=\"`alertIds`\" pulumi-lang-python=\"`alert_ids`\" pulumi-lang-yaml=\"`alertIds`\" pulumi-lang-java=\"`alertIds`\"\u003e`alert_ids`\u003c/span\u003e must be defined.\n"},"startTs":{"type":"string","description":"Unix timestamp, in milliseconds, when the Silence Rule starts.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorSilenceRuleTimeouts:MonitorSilenceRuleTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Silence Rule.\n"}},"type":"object"}},"sysdig:index/monitorTeam:MonitorTeam":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst me = sysdig.getCurrentUser({});\nconst customRole = sysdig.getCustomRole({\n    name: \"CustomRoleName\",\n});\nconst devops = new sysdig.MonitorTeam(\"devops\", {\n    name: \"Monitoring DevOps team\",\n    entrypoints: [{\n        type: \"DashboardTemplates\",\n        selection: \"view.net.http\",\n    }],\n    userRoles: [\n        {\n            email: me.then(me =\u003e me.email),\n            role: \"ROLE_TEAM_MANAGER\",\n        },\n        {\n            email: \"john.doe@example.com\",\n            role: \"ROLE_TEAM_STANDARD\",\n        },\n        {\n            email: \"john.smith@example.com\",\n            role: customRole.then(customRole =\u003e customRole.id),\n        },\n    ],\n    filter: \"kubernetes.namespace.name in (\\\"kube-system\\\") and kubernetes.deployment.name in (\\\"coredns\\\")\",\n    prometheusRemoteWriteMetricsFilter: \"kube_cluster_name in (\\\"test-cluster\\\", \\\"test-k8s-data\\\") and kube_deployment_name  = \\\"coredns\\\" and my_metric starts with \\\"prefix\\\" and not my_metric contains \\\"prefix-test\\\"\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nme = sysdig.get_current_user()\ncustom_role = sysdig.get_custom_role(name=\"CustomRoleName\")\ndevops = sysdig.MonitorTeam(\"devops\",\n    name=\"Monitoring DevOps team\",\n    entrypoints=[{\n        \"type\": \"DashboardTemplates\",\n        \"selection\": \"view.net.http\",\n    }],\n    user_roles=[\n        {\n            \"email\": me.email,\n            \"role\": \"ROLE_TEAM_MANAGER\",\n        },\n        {\n            \"email\": \"john.doe@example.com\",\n            \"role\": \"ROLE_TEAM_STANDARD\",\n        },\n        {\n            \"email\": \"john.smith@example.com\",\n            \"role\": custom_role.id,\n        },\n    ],\n    filter=\"kubernetes.namespace.name in (\\\"kube-system\\\") and kubernetes.deployment.name in (\\\"coredns\\\")\",\n    prometheus_remote_write_metrics_filter=\"kube_cluster_name in (\\\"test-cluster\\\", \\\"test-k8s-data\\\") and kube_deployment_name  = \\\"coredns\\\" and my_metric starts with \\\"prefix\\\" and not my_metric contains \\\"prefix-test\\\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var me = Sysdig.GetCurrentUser.Invoke();\n\n    var customRole = Sysdig.GetCustomRole.Invoke(new()\n    {\n        Name = \"CustomRoleName\",\n    });\n\n    var devops = new Sysdig.MonitorTeam(\"devops\", new()\n    {\n        Name = \"Monitoring DevOps team\",\n        Entrypoints = new[]\n        {\n            new Sysdig.Inputs.MonitorTeamEntrypointArgs\n            {\n                Type = \"DashboardTemplates\",\n                Selection = \"view.net.http\",\n            },\n        },\n        UserRoles = new[]\n        {\n            new Sysdig.Inputs.MonitorTeamUserRoleArgs\n            {\n                Email = me.Apply(getCurrentUserResult =\u003e getCurrentUserResult.Email),\n                Role = \"ROLE_TEAM_MANAGER\",\n            },\n            new Sysdig.Inputs.MonitorTeamUserRoleArgs\n            {\n                Email = \"john.doe@example.com\",\n                Role = \"ROLE_TEAM_STANDARD\",\n            },\n            new Sysdig.Inputs.MonitorTeamUserRoleArgs\n            {\n                Email = \"john.smith@example.com\",\n                Role = customRole.Apply(getCustomRoleResult =\u003e getCustomRoleResult.Id),\n            },\n        },\n        Filter = \"kubernetes.namespace.name in (\\\"kube-system\\\") and kubernetes.deployment.name in (\\\"coredns\\\")\",\n        PrometheusRemoteWriteMetricsFilter = \"kube_cluster_name in (\\\"test-cluster\\\", \\\"test-k8s-data\\\") and kube_deployment_name  = \\\"coredns\\\" and my_metric starts with \\\"prefix\\\" and not my_metric contains \\\"prefix-test\\\"\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tme, err := sysdig.GetCurrentUser(ctx, \u0026sysdig.GetCurrentUserArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustomRole, err := sysdig.LookupCustomRole(ctx, \u0026sysdig.LookupCustomRoleArgs{\n\t\t\tName: \"CustomRoleName\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewMonitorTeam(ctx, \"devops\", \u0026sysdig.MonitorTeamArgs{\n\t\t\tName: pulumi.String(\"Monitoring DevOps team\"),\n\t\t\tEntrypoints: sysdig.MonitorTeamEntrypointArray{\n\t\t\t\t\u0026sysdig.MonitorTeamEntrypointArgs{\n\t\t\t\t\tType:      pulumi.String(\"DashboardTemplates\"),\n\t\t\t\t\tSelection: pulumi.String(\"view.net.http\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tUserRoles: sysdig.MonitorTeamUserRoleArray{\n\t\t\t\t\u0026sysdig.MonitorTeamUserRoleArgs{\n\t\t\t\t\tEmail: pulumi.String(me.Email),\n\t\t\t\t\tRole:  pulumi.String(\"ROLE_TEAM_MANAGER\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorTeamUserRoleArgs{\n\t\t\t\t\tEmail: pulumi.String(\"john.doe@example.com\"),\n\t\t\t\t\tRole:  pulumi.String(\"ROLE_TEAM_STANDARD\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.MonitorTeamUserRoleArgs{\n\t\t\t\t\tEmail: pulumi.String(\"john.smith@example.com\"),\n\t\t\t\t\tRole:  pulumi.String(customRole.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t\tFilter:                             pulumi.String(\"kubernetes.namespace.name in (\\\"kube-system\\\") and kubernetes.deployment.name in (\\\"coredns\\\")\"),\n\t\t\tPrometheusRemoteWriteMetricsFilter: pulumi.String(\"kube_cluster_name in (\\\"test-cluster\\\", \\\"test-k8s-data\\\") and kube_deployment_name  = \\\"coredns\\\" and my_metric starts with \\\"prefix\\\" and not my_metric contains \\\"prefix-test\\\"\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetCurrentUserArgs;\nimport com.pulumi.sysdig.inputs.GetCustomRoleArgs;\nimport com.pulumi.sysdig.MonitorTeam;\nimport com.pulumi.sysdig.MonitorTeamArgs;\nimport com.pulumi.sysdig.inputs.MonitorTeamEntrypointArgs;\nimport com.pulumi.sysdig.inputs.MonitorTeamUserRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var me = SysdigFunctions.getCurrentUser(GetCurrentUserArgs.builder()\n            .build());\n\n        final var customRole = SysdigFunctions.getCustomRole(GetCustomRoleArgs.builder()\n            .name(\"CustomRoleName\")\n            .build());\n\n        var devops = new MonitorTeam(\"devops\", MonitorTeamArgs.builder()\n            .name(\"Monitoring DevOps team\")\n            .entrypoints(MonitorTeamEntrypointArgs.builder()\n                .type(\"DashboardTemplates\")\n                .selection(\"view.net.http\")\n                .build())\n            .userRoles(            \n                MonitorTeamUserRoleArgs.builder()\n                    .email(me.email())\n                    .role(\"ROLE_TEAM_MANAGER\")\n                    .build(),\n                MonitorTeamUserRoleArgs.builder()\n                    .email(\"john.doe@example.com\")\n                    .role(\"ROLE_TEAM_STANDARD\")\n                    .build(),\n                MonitorTeamUserRoleArgs.builder()\n                    .email(\"john.smith@example.com\")\n                    .role(customRole.id())\n                    .build())\n            .filter(\"kubernetes.namespace.name in (\\\"kube-system\\\") and kubernetes.deployment.name in (\\\"coredns\\\")\")\n            .prometheusRemoteWriteMetricsFilter(\"kube_cluster_name in (\\\"test-cluster\\\", \\\"test-k8s-data\\\") and kube_deployment_name  = \\\"coredns\\\" and my_metric starts with \\\"prefix\\\" and not my_metric contains \\\"prefix-test\\\"\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  devops:\n    type: sysdig:MonitorTeam\n    properties:\n      name: Monitoring DevOps team\n      entrypoints:\n        - type: DashboardTemplates\n          selection: view.net.http\n      userRoles:\n        - email: ${me.email}\n          role: ROLE_TEAM_MANAGER\n        - email: john.doe@example.com\n          role: ROLE_TEAM_STANDARD\n        - email: john.smith@example.com\n          role: ${customRole.id}\n      filter: kubernetes.namespace.name in (\"kube-system\") and kubernetes.deployment.name in (\"coredns\")\n      prometheusRemoteWriteMetricsFilter: kube_cluster_name in (\"test-cluster\", \"test-k8s-data\") and kube_deployment_name  = \"coredns\" and my_metric starts with \"prefix\" and not my_metric contains \"prefix-test\"\nvariables:\n  me:\n    fn::invoke:\n      function: sysdig:getCurrentUser\n      arguments: {}\n  customRole:\n    fn::invoke:\n      function: sysdig:getCustomRole\n      arguments:\n        name: CustomRoleName\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMonitor Teams can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/monitorTeam:MonitorTeam example 12345\n```\n","properties":{"canSeeInfrastructureEvents":{"type":"boolean","description":"Enable this option to allow this team to view all Infrastructure and Custom Events from every user and agent. Otherwise, this team will only see infrastructure events sent specifically to this team. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"canUseAgentCli":{"type":"boolean","description":"Enable this option to give this team access to Using the Agent Console. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"canUseAwsData":{"type":"boolean","description":"Enable this option to give this team access to AWS metrics and tags. All AWS data is made available, regardless of the team’s Scope. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"canUseSysdigCapture":{"type":"boolean","description":"Defines if the team is able to create Sysdig Capture files.  Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"defaultTeam":{"type":"boolean"},"description":{"type":"string","description":"A description of the team.\n"},"enableIbmPlatformMetrics":{"type":"boolean","description":"(Optional) Enable Platform Metrics on IBM Cloud Monitoring.\n"},"entrypoints":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorTeamEntrypoint:MonitorTeamEntrypoint"},"description":"Main entry point for the current team in the product.\nSee the Entrypoint argument reference section for more information.\n"},"filter":{"type":"string","description":"Use this option to select which Agent Metrics data users of this team can view. Not setting it will allow users to see all Agent Metrics data.\n"},"ibmPlatformMetrics":{"type":"string","description":"(Optional) Use this option to select which Platform Metrics data users of this team can view. Not setting it will allow users to see all Platform Metrics data.\n"},"monitorTeamId":{"type":"string","description":"ID of the created team.\n"},"name":{"type":"string","description":"The name of the Monitor Team. It must be unique and must not exist in Secure.\n"},"prometheusRemoteWriteMetricsFilter":{"type":"string","description":"Use this option to select which Prometheus Remote Write data users of this team can view. Not setting it will allow users to see all Prometheus Remote Write data.\n"},"scopeBy":{"type":"string","description":"Scope for the team, either \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. Default: \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. If set to \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e, team members can see all host-level and container-level information. If set to \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e, team members can see only Container-level information.\n"},"theme":{"type":"string","description":"Colour of the team. Default: `#05C391`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorTeamTimeouts:MonitorTeamTimeouts"},"userRoles":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorTeamUserRole:MonitorTeamUserRole"}},"version":{"type":"number","description":"Current version of the resource.\n"}},"type":"object","required":["entrypoints","monitorTeamId","name","version"],"inputProperties":{"canSeeInfrastructureEvents":{"type":"boolean","description":"Enable this option to allow this team to view all Infrastructure and Custom Events from every user and agent. Otherwise, this team will only see infrastructure events sent specifically to this team. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"canUseAgentCli":{"type":"boolean","description":"Enable this option to give this team access to Using the Agent Console. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"canUseAwsData":{"type":"boolean","description":"Enable this option to give this team access to AWS metrics and tags. All AWS data is made available, regardless of the team’s Scope. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"canUseSysdigCapture":{"type":"boolean","description":"Defines if the team is able to create Sysdig Capture files.  Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"defaultTeam":{"type":"boolean"},"description":{"type":"string","description":"A description of the team.\n"},"enableIbmPlatformMetrics":{"type":"boolean","description":"(Optional) Enable Platform Metrics on IBM Cloud Monitoring.\n"},"entrypoints":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorTeamEntrypoint:MonitorTeamEntrypoint"},"description":"Main entry point for the current team in the product.\nSee the Entrypoint argument reference section for more information.\n"},"filter":{"type":"string","description":"Use this option to select which Agent Metrics data users of this team can view. Not setting it will allow users to see all Agent Metrics data.\n"},"ibmPlatformMetrics":{"type":"string","description":"(Optional) Use this option to select which Platform Metrics data users of this team can view. Not setting it will allow users to see all Platform Metrics data.\n"},"monitorTeamId":{"type":"string","description":"ID of the created team.\n"},"name":{"type":"string","description":"The name of the Monitor Team. It must be unique and must not exist in Secure.\n"},"prometheusRemoteWriteMetricsFilter":{"type":"string","description":"Use this option to select which Prometheus Remote Write data users of this team can view. Not setting it will allow users to see all Prometheus Remote Write data.\n"},"scopeBy":{"type":"string","description":"Scope for the team, either \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. Default: \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. If set to \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e, team members can see all host-level and container-level information. If set to \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e, team members can see only Container-level information.\n"},"theme":{"type":"string","description":"Colour of the team. Default: `#05C391`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorTeamTimeouts:MonitorTeamTimeouts"},"userRoles":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorTeamUserRole:MonitorTeamUserRole"}}},"requiredInputs":["entrypoints"],"stateInputs":{"description":"Input properties used for looking up and filtering MonitorTeam resources.\n","properties":{"canSeeInfrastructureEvents":{"type":"boolean","description":"Enable this option to allow this team to view all Infrastructure and Custom Events from every user and agent. Otherwise, this team will only see infrastructure events sent specifically to this team. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"canUseAgentCli":{"type":"boolean","description":"Enable this option to give this team access to Using the Agent Console. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"canUseAwsData":{"type":"boolean","description":"Enable this option to give this team access to AWS metrics and tags. All AWS data is made available, regardless of the team’s Scope. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"canUseSysdigCapture":{"type":"boolean","description":"Defines if the team is able to create Sysdig Capture files.  Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"defaultTeam":{"type":"boolean"},"description":{"type":"string","description":"A description of the team.\n"},"enableIbmPlatformMetrics":{"type":"boolean","description":"(Optional) Enable Platform Metrics on IBM Cloud Monitoring.\n"},"entrypoints":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorTeamEntrypoint:MonitorTeamEntrypoint"},"description":"Main entry point for the current team in the product.\nSee the Entrypoint argument reference section for more information.\n"},"filter":{"type":"string","description":"Use this option to select which Agent Metrics data users of this team can view. Not setting it will allow users to see all Agent Metrics data.\n"},"ibmPlatformMetrics":{"type":"string","description":"(Optional) Use this option to select which Platform Metrics data users of this team can view. Not setting it will allow users to see all Platform Metrics data.\n"},"monitorTeamId":{"type":"string","description":"ID of the created team.\n"},"name":{"type":"string","description":"The name of the Monitor Team. It must be unique and must not exist in Secure.\n"},"prometheusRemoteWriteMetricsFilter":{"type":"string","description":"Use this option to select which Prometheus Remote Write data users of this team can view. Not setting it will allow users to see all Prometheus Remote Write data.\n"},"scopeBy":{"type":"string","description":"Scope for the team, either \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. Default: \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. If set to \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e, team members can see all host-level and container-level information. If set to \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e, team members can see only Container-level information.\n"},"theme":{"type":"string","description":"Colour of the team. Default: `#05C391`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FMonitorTeamTimeouts:MonitorTeamTimeouts"},"userRoles":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FMonitorTeamUserRole:MonitorTeamUserRole"}},"version":{"type":"number","description":"Current version of the resource.\n"}},"type":"object"}},"sysdig:index/secureAwsMlPolicy:SecureAwsMlPolicy":{"description":"## Example Usage\n\n","properties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyRule:SecureAwsMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureAwsMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyTimeouts:SecureAwsMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object","required":["description","name","rules","secureAwsMlPolicyId","version"],"inputProperties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyRule:SecureAwsMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureAwsMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyTimeouts:SecureAwsMlPolicyTimeouts"},"type":{"type":"string"}},"requiredInputs":["description","rules"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureAwsMlPolicy resources.\n","properties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyRule:SecureAwsMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureAwsMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureAwsMlPolicyTimeouts:SecureAwsMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureCloudAuthAccount:SecureCloudAuthAccount":{"description":"## Example Usage\n\n### Basic Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureCloudAuthAccount(\"sample\", {\n    providerId: \"mygcpproject\",\n    providerType: \"PROVIDER_GCP\",\n    enabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureCloudAuthAccount(\"sample\",\n    provider_id=\"mygcpproject\",\n    provider_type=\"PROVIDER_GCP\",\n    enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureCloudAuthAccount(\"sample\", new()\n    {\n        ProviderId = \"mygcpproject\",\n        ProviderType = \"PROVIDER_GCP\",\n        Enabled = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureCloudAuthAccount(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"mygcpproject\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_GCP\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureCloudAuthAccount(\"sample\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"mygcpproject\")\n            .providerType(\"PROVIDER_GCP\")\n            .enabled(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureCloudAuthAccount\n    properties:\n      providerId: mygcpproject\n      providerType: PROVIDER_GCP\n      enabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS Account with Response Actions\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst awsResponseActions = new sysdig.SecureCloudAuthAccount(\"aws_response_actions\", {\n    providerId: \"123456789012\",\n    providerType: \"PROVIDER_AWS\",\n    enabled: true,\n    features: [{\n        secureResponseActions: [{\n            enabled: true,\n            components: [\n                \"COMPONENT_CLOUD_RESPONDER/cloud-responder\",\n                \"COMPONENT_CLOUD_RESPONDER_ROLES/cloud-responder\",\n            ],\n        }],\n    }],\n    components: [\n        {\n            type: \"COMPONENT_CLOUD_RESPONDER\",\n            instance: \"cloud-responder\",\n            cloudResponderMetadata: JSON.stringify({\n                aws: {\n                    responder_lambdas: {\n                        lambda_names: [\n                            \"sysdig-responder-lambda-1\",\n                            \"sysdig-responder-lambda-2\",\n                        ],\n                        regions: [\n                            \"us-east-1\",\n                            \"us-west-2\",\n                        ],\n                        delegate_role_name: \"sysdig-delegate-role\",\n                    },\n                },\n            }),\n        },\n        {\n            type: \"COMPONENT_CLOUD_RESPONDER_ROLES\",\n            instance: \"cloud-responder\",\n            cloudResponderRolesMetadata: JSON.stringify({\n                roles: [\n                    {\n                        aws: {\n                            role_name: \"sysdig-responder-role-1\",\n                        },\n                    },\n                    {\n                        aws: {\n                            role_name: \"sysdig-responder-role-2\",\n                        },\n                    },\n                ],\n            }),\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\naws_response_actions = sysdig.SecureCloudAuthAccount(\"aws_response_actions\",\n    provider_id=\"123456789012\",\n    provider_type=\"PROVIDER_AWS\",\n    enabled=True,\n    features=[{\n        \"secure_response_actions\": [{\n            \"enabled\": True,\n            \"components\": [\n                \"COMPONENT_CLOUD_RESPONDER/cloud-responder\",\n                \"COMPONENT_CLOUD_RESPONDER_ROLES/cloud-responder\",\n            ],\n        }],\n    }],\n    components=[\n        {\n            \"type\": \"COMPONENT_CLOUD_RESPONDER\",\n            \"instance\": \"cloud-responder\",\n            \"cloud_responder_metadata\": json.dumps({\n                \"aws\": {\n                    \"responder_lambdas\": {\n                        \"lambda_names\": [\n                            \"sysdig-responder-lambda-1\",\n                            \"sysdig-responder-lambda-2\",\n                        ],\n                        \"regions\": [\n                            \"us-east-1\",\n                            \"us-west-2\",\n                        ],\n                        \"delegate_role_name\": \"sysdig-delegate-role\",\n                    },\n                },\n            }),\n        },\n        {\n            \"type\": \"COMPONENT_CLOUD_RESPONDER_ROLES\",\n            \"instance\": \"cloud-responder\",\n            \"cloud_responder_roles_metadata\": json.dumps({\n                \"roles\": [\n                    {\n                        \"aws\": {\n                            \"role_name\": \"sysdig-responder-role-1\",\n                        },\n                    },\n                    {\n                        \"aws\": {\n                            \"role_name\": \"sysdig-responder-role-2\",\n                        },\n                    },\n                ],\n            }),\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var awsResponseActions = new Sysdig.SecureCloudAuthAccount(\"aws_response_actions\", new()\n    {\n        ProviderId = \"123456789012\",\n        ProviderType = \"PROVIDER_AWS\",\n        Enabled = true,\n        Features = new[]\n        {\n            new Sysdig.Inputs.SecureCloudAuthAccountFeatureArgs\n            {\n                SecureResponseActions = new[]\n                {\n                    new Sysdig.Inputs.SecureCloudAuthAccountFeatureSecureResponseActionArgs\n                    {\n                        Enabled = true,\n                        Components = new[]\n                        {\n                            \"COMPONENT_CLOUD_RESPONDER/cloud-responder\",\n                            \"COMPONENT_CLOUD_RESPONDER_ROLES/cloud-responder\",\n                        },\n                    },\n                },\n            },\n        },\n        Components = new[]\n        {\n            new Sysdig.Inputs.SecureCloudAuthAccountComponentArgs\n            {\n                Type = \"COMPONENT_CLOUD_RESPONDER\",\n                Instance = \"cloud-responder\",\n                CloudResponderMetadata = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n                    {\n                        [\"responder_lambdas\"] = new Dictionary\u003cstring, object?\u003e\n                        {\n                            [\"lambda_names\"] = new[]\n                            {\n                                \"sysdig-responder-lambda-1\",\n                                \"sysdig-responder-lambda-2\",\n                            },\n                            [\"regions\"] = new[]\n                            {\n                                \"us-east-1\",\n                                \"us-west-2\",\n                            },\n                            [\"delegate_role_name\"] = \"sysdig-delegate-role\",\n                        },\n                    },\n                }),\n            },\n            new Sysdig.Inputs.SecureCloudAuthAccountComponentArgs\n            {\n                Type = \"COMPONENT_CLOUD_RESPONDER_ROLES\",\n                Instance = \"cloud-responder\",\n                CloudResponderRolesMetadata = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"roles\"] = new[]\n                    {\n                        new Dictionary\u003cstring, object?\u003e\n                        {\n                            [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n                            {\n                                [\"role_name\"] = \"sysdig-responder-role-1\",\n                            },\n                        },\n                        new Dictionary\u003cstring, object?\u003e\n                        {\n                            [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n                            {\n                                [\"role_name\"] = \"sysdig-responder-role-2\",\n                            },\n                        },\n                    },\n                }),\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\"responder_lambdas\": map[string]interface{}{\n\t\t\t\t\t\"lambda_names\": []string{\n\t\t\t\t\t\t\"sysdig-responder-lambda-1\",\n\t\t\t\t\t\t\"sysdig-responder-lambda-2\",\n\t\t\t\t\t},\n\t\t\t\t\t\"regions\": []string{\n\t\t\t\t\t\t\"us-east-1\",\n\t\t\t\t\t\t\"us-west-2\",\n\t\t\t\t\t},\n\t\t\t\t\t\"delegate_role_name\": \"sysdig-delegate-role\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"roles\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\t\t\"role_name\": \"sysdig-responder-role-1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\t\t\"role_name\": \"sysdig-responder-role-2\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = sysdig.NewSecureCloudAuthAccount(ctx, \"aws_response_actions\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"123456789012\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_AWS\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t\tFeatures: sysdig.SecureCloudAuthAccountFeatureTypeArray{\n\t\t\t\t\u0026sysdig.SecureCloudAuthAccountFeatureTypeArgs{\n\t\t\t\t\tSecureResponseActions: sysdig.SecureCloudAuthAccountFeatureSecureResponseActionArray{\n\t\t\t\t\t\t\u0026sysdig.SecureCloudAuthAccountFeatureSecureResponseActionArgs{\n\t\t\t\t\t\t\tEnabled: pulumi.Bool(true),\n\t\t\t\t\t\t\tComponents: pulumi.StringArray{\n\t\t\t\t\t\t\t\tpulumi.String(\"COMPONENT_CLOUD_RESPONDER/cloud-responder\"),\n\t\t\t\t\t\t\t\tpulumi.String(\"COMPONENT_CLOUD_RESPONDER_ROLES/cloud-responder\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tComponents: sysdig.SecureCloudAuthAccountComponentTypeArray{\n\t\t\t\t\u0026sysdig.SecureCloudAuthAccountComponentTypeArgs{\n\t\t\t\t\tType:                   pulumi.String(\"COMPONENT_CLOUD_RESPONDER\"),\n\t\t\t\t\tInstance:               pulumi.String(\"cloud-responder\"),\n\t\t\t\t\tCloudResponderMetadata: pulumi.String(json0),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureCloudAuthAccountComponentTypeArgs{\n\t\t\t\t\tType:                        pulumi.String(\"COMPONENT_CLOUD_RESPONDER_ROLES\"),\n\t\t\t\t\tInstance:                    pulumi.String(\"cloud-responder\"),\n\t\t\t\t\tCloudResponderRolesMetadata: pulumi.String(json1),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport com.pulumi.sysdig.inputs.SecureCloudAuthAccountFeatureArgs;\nimport com.pulumi.sysdig.inputs.SecureCloudAuthAccountComponentArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var awsResponseActions = new SecureCloudAuthAccount(\"awsResponseActions\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"123456789012\")\n            .providerType(\"PROVIDER_AWS\")\n            .enabled(true)\n            .features(SecureCloudAuthAccountFeatureArgs.builder()\n                .secureResponseActions(SecureCloudAuthAccountFeatureSecureResponseActionArgs.builder()\n                    .enabled(true)\n                    .components(                    \n                        \"COMPONENT_CLOUD_RESPONDER/cloud-responder\",\n                        \"COMPONENT_CLOUD_RESPONDER_ROLES/cloud-responder\")\n                    .build())\n                .build())\n            .components(            \n                SecureCloudAuthAccountComponentArgs.builder()\n                    .type(\"COMPONENT_CLOUD_RESPONDER\")\n                    .instance(\"cloud-responder\")\n                    .cloudResponderMetadata(serializeJson(\n                        jsonObject(\n                            jsonProperty(\"aws\", jsonObject(\n                                jsonProperty(\"responder_lambdas\", jsonObject(\n                                    jsonProperty(\"lambda_names\", jsonArray(\n                                        \"sysdig-responder-lambda-1\", \n                                        \"sysdig-responder-lambda-2\"\n                                    )),\n                                    jsonProperty(\"regions\", jsonArray(\n                                        \"us-east-1\", \n                                        \"us-west-2\"\n                                    )),\n                                    jsonProperty(\"delegate_role_name\", \"sysdig-delegate-role\")\n                                ))\n                            ))\n                        )))\n                    .build(),\n                SecureCloudAuthAccountComponentArgs.builder()\n                    .type(\"COMPONENT_CLOUD_RESPONDER_ROLES\")\n                    .instance(\"cloud-responder\")\n                    .cloudResponderRolesMetadata(serializeJson(\n                        jsonObject(\n                            jsonProperty(\"roles\", jsonArray(\n                                jsonObject(\n                                    jsonProperty(\"aws\", jsonObject(\n                                        jsonProperty(\"role_name\", \"sysdig-responder-role-1\")\n                                    ))\n                                ), \n                                jsonObject(\n                                    jsonProperty(\"aws\", jsonObject(\n                                        jsonProperty(\"role_name\", \"sysdig-responder-role-2\")\n                                    ))\n                                )\n                            ))\n                        )))\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  awsResponseActions:\n    type: sysdig:SecureCloudAuthAccount\n    name: aws_response_actions\n    properties:\n      providerId: '123456789012'\n      providerType: PROVIDER_AWS\n      enabled: true\n      features:\n        - secureResponseActions:\n            - enabled: true\n              components:\n                - COMPONENT_CLOUD_RESPONDER/cloud-responder\n                - COMPONENT_CLOUD_RESPONDER_ROLES/cloud-responder\n      components:\n        - type: COMPONENT_CLOUD_RESPONDER\n          instance: cloud-responder\n          cloudResponderMetadata:\n            fn::toJSON:\n              aws:\n                responder_lambdas:\n                  lambda_names:\n                    - sysdig-responder-lambda-1\n                    - sysdig-responder-lambda-2\n                  regions:\n                    - us-east-1\n                    - us-west-2\n                  delegate_role_name: sysdig-delegate-role\n        - type: COMPONENT_CLOUD_RESPONDER_ROLES\n          instance: cloud-responder\n          cloudResponderRolesMetadata:\n            fn::toJSON:\n              roles:\n                - aws:\n                    role_name: sysdig-responder-role-1\n                - aws:\n                    role_name: sysdig-responder-role-2\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"components":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountComponent:SecureCloudAuthAccountComponent"},"description":"The component configuration to enable on this cloud account. There can be multiple component blocks for a feature, one for each component to be enabled.\n"},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"features":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeature:SecureCloudAuthAccountFeature"},"description":"The name and configuration of each feature along with the respective components to enable on this cloud account.\n"},"organizationId":{"type":"string","description":"(Computed) The ID of the organization, if the cloud account is part of any organization.\n"},"providerAlias":{"type":"string"},"providerId":{"type":"string","description":"The unique identifier of the cloud account. e.g. for GCP: \u003cspan pulumi-lang-nodejs=\"`mygcpproject`\" pulumi-lang-dotnet=\"`Mygcpproject`\" pulumi-lang-go=\"`mygcpproject`\" pulumi-lang-python=\"`mygcpproject`\" pulumi-lang-yaml=\"`mygcpproject`\" pulumi-lang-java=\"`mygcpproject`\"\u003e`mygcpproject`\u003c/span\u003e.\n"},"providerPartition":{"type":"string","description":"The type of Partition of the Provider for cloud account. Currently supported options are `PROVIDER_PARTITION_UNSPECIFIED` and `PROVIDER_PARTITION_AWS_GOVCLOUD`.\n\n\n\u003e **Note:** Please refer to Sysdig Secure API Documentation for the Cloud Accounts API for providing \u003cspan pulumi-lang-nodejs=\"`feature`\" pulumi-lang-dotnet=\"`Feature`\" pulumi-lang-go=\"`feature`\" pulumi-lang-python=\"`feature`\" pulumi-lang-yaml=\"`feature`\" pulumi-lang-java=\"`feature`\"\u003e`feature`\u003c/span\u003e \u0026 \u003cspan pulumi-lang-nodejs=\"`component`\" pulumi-lang-dotnet=\"`Component`\" pulumi-lang-go=\"`component`\" pulumi-lang-python=\"`component`\" pulumi-lang-yaml=\"`component`\" pulumi-lang-java=\"`component`\"\u003e`component`\u003c/span\u003e.\n"},"providerTenantId":{"type":"string"},"providerType":{"type":"string","description":"The cloud provider in which the account exists. Currently supported provider is `PROVIDER_GCP`.\n"},"secureCloudAuthAccountId":{"type":"string","description":"(Computed) The ID of the cloud account.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountTimeouts:SecureCloudAuthAccountTimeouts"}},"type":"object","required":["enabled","organizationId","providerId","providerType","secureCloudAuthAccountId"],"inputProperties":{"components":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountComponent:SecureCloudAuthAccountComponent"},"description":"The component configuration to enable on this cloud account. There can be multiple component blocks for a feature, one for each component to be enabled.\n"},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"features":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeature:SecureCloudAuthAccountFeature"},"description":"The name and configuration of each feature along with the respective components to enable on this cloud account.\n"},"providerAlias":{"type":"string"},"providerId":{"type":"string","description":"The unique identifier of the cloud account. e.g. for GCP: \u003cspan pulumi-lang-nodejs=\"`mygcpproject`\" pulumi-lang-dotnet=\"`Mygcpproject`\" pulumi-lang-go=\"`mygcpproject`\" pulumi-lang-python=\"`mygcpproject`\" pulumi-lang-yaml=\"`mygcpproject`\" pulumi-lang-java=\"`mygcpproject`\"\u003e`mygcpproject`\u003c/span\u003e.\n"},"providerPartition":{"type":"string","description":"The type of Partition of the Provider for cloud account. Currently supported options are `PROVIDER_PARTITION_UNSPECIFIED` and `PROVIDER_PARTITION_AWS_GOVCLOUD`.\n\n\n\u003e **Note:** Please refer to Sysdig Secure API Documentation for the Cloud Accounts API for providing \u003cspan pulumi-lang-nodejs=\"`feature`\" pulumi-lang-dotnet=\"`Feature`\" pulumi-lang-go=\"`feature`\" pulumi-lang-python=\"`feature`\" pulumi-lang-yaml=\"`feature`\" pulumi-lang-java=\"`feature`\"\u003e`feature`\u003c/span\u003e \u0026 \u003cspan pulumi-lang-nodejs=\"`component`\" pulumi-lang-dotnet=\"`Component`\" pulumi-lang-go=\"`component`\" pulumi-lang-python=\"`component`\" pulumi-lang-yaml=\"`component`\" pulumi-lang-java=\"`component`\"\u003e`component`\u003c/span\u003e.\n"},"providerTenantId":{"type":"string"},"providerType":{"type":"string","description":"The cloud provider in which the account exists. Currently supported provider is `PROVIDER_GCP`.\n"},"secureCloudAuthAccountId":{"type":"string","description":"(Computed) The ID of the cloud account.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountTimeouts:SecureCloudAuthAccountTimeouts"}},"requiredInputs":["enabled","providerId","providerType"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureCloudAuthAccount resources.\n","properties":{"components":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountComponent:SecureCloudAuthAccountComponent"},"description":"The component configuration to enable on this cloud account. There can be multiple component blocks for a feature, one for each component to be enabled.\n"},"enabled":{"type":"boolean","description":"Whether or not to enable sysdig provisioning of resources on this cloud account.\n"},"features":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeature:SecureCloudAuthAccountFeature"},"description":"The name and configuration of each feature along with the respective components to enable on this cloud account.\n"},"organizationId":{"type":"string","description":"(Computed) The ID of the organization, if the cloud account is part of any organization.\n"},"providerAlias":{"type":"string"},"providerId":{"type":"string","description":"The unique identifier of the cloud account. e.g. for GCP: \u003cspan pulumi-lang-nodejs=\"`mygcpproject`\" pulumi-lang-dotnet=\"`Mygcpproject`\" pulumi-lang-go=\"`mygcpproject`\" pulumi-lang-python=\"`mygcpproject`\" pulumi-lang-yaml=\"`mygcpproject`\" pulumi-lang-java=\"`mygcpproject`\"\u003e`mygcpproject`\u003c/span\u003e.\n"},"providerPartition":{"type":"string","description":"The type of Partition of the Provider for cloud account. Currently supported options are `PROVIDER_PARTITION_UNSPECIFIED` and `PROVIDER_PARTITION_AWS_GOVCLOUD`.\n\n\n\u003e **Note:** Please refer to Sysdig Secure API Documentation for the Cloud Accounts API for providing \u003cspan pulumi-lang-nodejs=\"`feature`\" pulumi-lang-dotnet=\"`Feature`\" pulumi-lang-go=\"`feature`\" pulumi-lang-python=\"`feature`\" pulumi-lang-yaml=\"`feature`\" pulumi-lang-java=\"`feature`\"\u003e`feature`\u003c/span\u003e \u0026 \u003cspan pulumi-lang-nodejs=\"`component`\" pulumi-lang-dotnet=\"`Component`\" pulumi-lang-go=\"`component`\" pulumi-lang-python=\"`component`\" pulumi-lang-yaml=\"`component`\" pulumi-lang-java=\"`component`\"\u003e`component`\u003c/span\u003e.\n"},"providerTenantId":{"type":"string"},"providerType":{"type":"string","description":"The cloud provider in which the account exists. Currently supported provider is `PROVIDER_GCP`.\n"},"secureCloudAuthAccountId":{"type":"string","description":"(Computed) The ID of the cloud account.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountTimeouts:SecureCloudAuthAccountTimeouts"}},"type":"object"}},"sysdig:index/secureCloudAuthAccountComponent:SecureCloudAuthAccountComponent":{"description":"## Example Usage\n\n### GCP Service Principal Component\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureCloudAuthAccount(\"sample\", {\n    providerId: \"mygcpproject\",\n    providerType: \"PROVIDER_GCP\",\n    enabled: true,\n});\nconst sampleSecureCloudAuthAccountComponent = new sysdig.SecureCloudAuthAccountComponent(\"sample\", {\n    accountId: sample.secureCloudAuthAccountId,\n    type: \"COMPONENT_SERVICE_PRINCIPAL\",\n    instance: \"secure-posture\",\n    servicePrincipalMetadata: JSON.stringify({\n        gcp: {\n            key: \"gcp-sa-key\",\n        },\n    }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureCloudAuthAccount(\"sample\",\n    provider_id=\"mygcpproject\",\n    provider_type=\"PROVIDER_GCP\",\n    enabled=True)\nsample_secure_cloud_auth_account_component = sysdig.SecureCloudAuthAccountComponent(\"sample\",\n    account_id=sample.secure_cloud_auth_account_id,\n    type=\"COMPONENT_SERVICE_PRINCIPAL\",\n    instance=\"secure-posture\",\n    service_principal_metadata=json.dumps({\n        \"gcp\": {\n            \"key\": \"gcp-sa-key\",\n        },\n    }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureCloudAuthAccount(\"sample\", new()\n    {\n        ProviderId = \"mygcpproject\",\n        ProviderType = \"PROVIDER_GCP\",\n        Enabled = true,\n    });\n\n    var sampleSecureCloudAuthAccountComponent = new Sysdig.SecureCloudAuthAccountComponent(\"sample\", new()\n    {\n        AccountId = sample.SecureCloudAuthAccountId,\n        Type = \"COMPONENT_SERVICE_PRINCIPAL\",\n        Instance = \"secure-posture\",\n        ServicePrincipalMetadata = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n        {\n            [\"gcp\"] = new Dictionary\u003cstring, object?\u003e\n            {\n                [\"key\"] = \"gcp-sa-key\",\n            },\n        }),\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tsample, err := sysdig.NewSecureCloudAuthAccount(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"mygcpproject\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_GCP\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"gcp\": map[string]interface{}{\n\t\t\t\t\"key\": \"gcp-sa-key\",\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = sysdig.NewSecureCloudAuthAccountComponent(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountComponentArgs{\n\t\t\tAccountId:                sample.SecureCloudAuthAccountId,\n\t\t\tType:                     pulumi.String(\"COMPONENT_SERVICE_PRINCIPAL\"),\n\t\t\tInstance:                 pulumi.String(\"secure-posture\"),\n\t\t\tServicePrincipalMetadata: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponent;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponentArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureCloudAuthAccount(\"sample\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"mygcpproject\")\n            .providerType(\"PROVIDER_GCP\")\n            .enabled(true)\n            .build());\n\n        var sampleSecureCloudAuthAccountComponent = new SecureCloudAuthAccountComponent(\"sampleSecureCloudAuthAccountComponent\", SecureCloudAuthAccountComponentArgs.builder()\n            .accountId(sample.secureCloudAuthAccountId())\n            .type(\"COMPONENT_SERVICE_PRINCIPAL\")\n            .instance(\"secure-posture\")\n            .servicePrincipalMetadata(serializeJson(\n                jsonObject(\n                    jsonProperty(\"gcp\", jsonObject(\n                        jsonProperty(\"key\", \"gcp-sa-key\")\n                    ))\n                )))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureCloudAuthAccount\n    properties:\n      providerId: mygcpproject\n      providerType: PROVIDER_GCP\n      enabled: true\n  sampleSecureCloudAuthAccountComponent:\n    type: sysdig:SecureCloudAuthAccountComponent\n    name: sample\n    properties:\n      accountId: ${sample.secureCloudAuthAccountId}\n      type: COMPONENT_SERVICE_PRINCIPAL\n      instance: secure-posture\n      servicePrincipalMetadata:\n        fn::toJSON:\n          gcp:\n            key: gcp-sa-key\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS Cloud Responder Component\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst awsAccount = new sysdig.SecureCloudAuthAccount(\"aws_account\", {\n    providerId: \"123456789012\",\n    providerType: \"PROVIDER_AWS\",\n    enabled: true,\n});\nconst cloudResponder = new sysdig.SecureCloudAuthAccountComponent(\"cloud_responder\", {\n    accountId: awsAccount.secureCloudAuthAccountId,\n    type: \"COMPONENT_CLOUD_RESPONDER\",\n    instance: \"cloud-responder\",\n    cloudResponderMetadata: JSON.stringify({\n        aws: {\n            responder_lambdas: {\n                lambda_names: [\n                    \"sysdig-responder-lambda-1\",\n                    \"sysdig-responder-lambda-2\",\n                ],\n                regions: [\n                    \"us-east-1\",\n                    \"us-west-2\",\n                ],\n                delegate_role_name: \"sysdig-delegate-role\",\n            },\n        },\n    }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\naws_account = sysdig.SecureCloudAuthAccount(\"aws_account\",\n    provider_id=\"123456789012\",\n    provider_type=\"PROVIDER_AWS\",\n    enabled=True)\ncloud_responder = sysdig.SecureCloudAuthAccountComponent(\"cloud_responder\",\n    account_id=aws_account.secure_cloud_auth_account_id,\n    type=\"COMPONENT_CLOUD_RESPONDER\",\n    instance=\"cloud-responder\",\n    cloud_responder_metadata=json.dumps({\n        \"aws\": {\n            \"responder_lambdas\": {\n                \"lambda_names\": [\n                    \"sysdig-responder-lambda-1\",\n                    \"sysdig-responder-lambda-2\",\n                ],\n                \"regions\": [\n                    \"us-east-1\",\n                    \"us-west-2\",\n                ],\n                \"delegate_role_name\": \"sysdig-delegate-role\",\n            },\n        },\n    }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var awsAccount = new Sysdig.SecureCloudAuthAccount(\"aws_account\", new()\n    {\n        ProviderId = \"123456789012\",\n        ProviderType = \"PROVIDER_AWS\",\n        Enabled = true,\n    });\n\n    var cloudResponder = new Sysdig.SecureCloudAuthAccountComponent(\"cloud_responder\", new()\n    {\n        AccountId = awsAccount.SecureCloudAuthAccountId,\n        Type = \"COMPONENT_CLOUD_RESPONDER\",\n        Instance = \"cloud-responder\",\n        CloudResponderMetadata = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n        {\n            [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n            {\n                [\"responder_lambdas\"] = new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"lambda_names\"] = new[]\n                    {\n                        \"sysdig-responder-lambda-1\",\n                        \"sysdig-responder-lambda-2\",\n                    },\n                    [\"regions\"] = new[]\n                    {\n                        \"us-east-1\",\n                        \"us-west-2\",\n                    },\n                    [\"delegate_role_name\"] = \"sysdig-delegate-role\",\n                },\n            },\n        }),\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tawsAccount, err := sysdig.NewSecureCloudAuthAccount(ctx, \"aws_account\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"123456789012\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_AWS\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\"responder_lambdas\": map[string]interface{}{\n\t\t\t\t\t\"lambda_names\": []string{\n\t\t\t\t\t\t\"sysdig-responder-lambda-1\",\n\t\t\t\t\t\t\"sysdig-responder-lambda-2\",\n\t\t\t\t\t},\n\t\t\t\t\t\"regions\": []string{\n\t\t\t\t\t\t\"us-east-1\",\n\t\t\t\t\t\t\"us-west-2\",\n\t\t\t\t\t},\n\t\t\t\t\t\"delegate_role_name\": \"sysdig-delegate-role\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = sysdig.NewSecureCloudAuthAccountComponent(ctx, \"cloud_responder\", \u0026sysdig.SecureCloudAuthAccountComponentArgs{\n\t\t\tAccountId:              awsAccount.SecureCloudAuthAccountId,\n\t\t\tType:                   pulumi.String(\"COMPONENT_CLOUD_RESPONDER\"),\n\t\t\tInstance:               pulumi.String(\"cloud-responder\"),\n\t\t\tCloudResponderMetadata: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponent;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponentArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var awsAccount = new SecureCloudAuthAccount(\"awsAccount\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"123456789012\")\n            .providerType(\"PROVIDER_AWS\")\n            .enabled(true)\n            .build());\n\n        var cloudResponder = new SecureCloudAuthAccountComponent(\"cloudResponder\", SecureCloudAuthAccountComponentArgs.builder()\n            .accountId(awsAccount.secureCloudAuthAccountId())\n            .type(\"COMPONENT_CLOUD_RESPONDER\")\n            .instance(\"cloud-responder\")\n            .cloudResponderMetadata(serializeJson(\n                jsonObject(\n                    jsonProperty(\"aws\", jsonObject(\n                        jsonProperty(\"responder_lambdas\", jsonObject(\n                            jsonProperty(\"lambda_names\", jsonArray(\n                                \"sysdig-responder-lambda-1\", \n                                \"sysdig-responder-lambda-2\"\n                            )),\n                            jsonProperty(\"regions\", jsonArray(\n                                \"us-east-1\", \n                                \"us-west-2\"\n                            )),\n                            jsonProperty(\"delegate_role_name\", \"sysdig-delegate-role\")\n                        ))\n                    ))\n                )))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  awsAccount:\n    type: sysdig:SecureCloudAuthAccount\n    name: aws_account\n    properties:\n      providerId: '123456789012'\n      providerType: PROVIDER_AWS\n      enabled: true\n  cloudResponder:\n    type: sysdig:SecureCloudAuthAccountComponent\n    name: cloud_responder\n    properties:\n      accountId: ${awsAccount.secureCloudAuthAccountId}\n      type: COMPONENT_CLOUD_RESPONDER\n      instance: cloud-responder\n      cloudResponderMetadata:\n        fn::toJSON:\n          aws:\n            responder_lambdas:\n              lambda_names:\n                - sysdig-responder-lambda-1\n                - sysdig-responder-lambda-2\n              regions:\n                - us-east-1\n                - us-west-2\n              delegate_role_name: sysdig-delegate-role\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS Cloud Responder Roles Component\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst awsAccount = new sysdig.SecureCloudAuthAccount(\"aws_account\", {\n    providerId: \"123456789012\",\n    providerType: \"PROVIDER_AWS\",\n    enabled: true,\n});\nconst cloudResponderRoles = new sysdig.SecureCloudAuthAccountComponent(\"cloud_responder_roles\", {\n    accountId: awsAccount.secureCloudAuthAccountId,\n    type: \"COMPONENT_CLOUD_RESPONDER_ROLES\",\n    instance: \"cloud-responder\",\n    cloudResponderRolesMetadata: JSON.stringify({\n        roles: [\n            {\n                aws: {\n                    role_name: \"sysdig-responder-role-1\",\n                },\n            },\n            {\n                aws: {\n                    role_name: \"sysdig-responder-role-2\",\n                },\n            },\n            {\n                aws: {\n                    role_name: \"sysdig-responder-role-3\",\n                },\n            },\n        ],\n    }),\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\naws_account = sysdig.SecureCloudAuthAccount(\"aws_account\",\n    provider_id=\"123456789012\",\n    provider_type=\"PROVIDER_AWS\",\n    enabled=True)\ncloud_responder_roles = sysdig.SecureCloudAuthAccountComponent(\"cloud_responder_roles\",\n    account_id=aws_account.secure_cloud_auth_account_id,\n    type=\"COMPONENT_CLOUD_RESPONDER_ROLES\",\n    instance=\"cloud-responder\",\n    cloud_responder_roles_metadata=json.dumps({\n        \"roles\": [\n            {\n                \"aws\": {\n                    \"role_name\": \"sysdig-responder-role-1\",\n                },\n            },\n            {\n                \"aws\": {\n                    \"role_name\": \"sysdig-responder-role-2\",\n                },\n            },\n            {\n                \"aws\": {\n                    \"role_name\": \"sysdig-responder-role-3\",\n                },\n            },\n        ],\n    }))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var awsAccount = new Sysdig.SecureCloudAuthAccount(\"aws_account\", new()\n    {\n        ProviderId = \"123456789012\",\n        ProviderType = \"PROVIDER_AWS\",\n        Enabled = true,\n    });\n\n    var cloudResponderRoles = new Sysdig.SecureCloudAuthAccountComponent(\"cloud_responder_roles\", new()\n    {\n        AccountId = awsAccount.SecureCloudAuthAccountId,\n        Type = \"COMPONENT_CLOUD_RESPONDER_ROLES\",\n        Instance = \"cloud-responder\",\n        CloudResponderRolesMetadata = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n        {\n            [\"roles\"] = new[]\n            {\n                new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n                    {\n                        [\"role_name\"] = \"sysdig-responder-role-1\",\n                    },\n                },\n                new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n                    {\n                        [\"role_name\"] = \"sysdig-responder-role-2\",\n                    },\n                },\n                new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"aws\"] = new Dictionary\u003cstring, object?\u003e\n                    {\n                        [\"role_name\"] = \"sysdig-responder-role-3\",\n                    },\n                },\n            },\n        }),\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tawsAccount, err := sysdig.NewSecureCloudAuthAccount(ctx, \"aws_account\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"123456789012\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_AWS\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"roles\": []map[string]interface{}{\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\t\t\"role_name\": \"sysdig-responder-role-1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\t\t\"role_name\": \"sysdig-responder-role-2\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tmap[string]interface{}{\n\t\t\t\t\t\"aws\": map[string]interface{}{\n\t\t\t\t\t\t\"role_name\": \"sysdig-responder-role-3\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = sysdig.NewSecureCloudAuthAccountComponent(ctx, \"cloud_responder_roles\", \u0026sysdig.SecureCloudAuthAccountComponentArgs{\n\t\t\tAccountId:                   awsAccount.SecureCloudAuthAccountId,\n\t\t\tType:                        pulumi.String(\"COMPONENT_CLOUD_RESPONDER_ROLES\"),\n\t\t\tInstance:                    pulumi.String(\"cloud-responder\"),\n\t\t\tCloudResponderRolesMetadata: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponent;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponentArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var awsAccount = new SecureCloudAuthAccount(\"awsAccount\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"123456789012\")\n            .providerType(\"PROVIDER_AWS\")\n            .enabled(true)\n            .build());\n\n        var cloudResponderRoles = new SecureCloudAuthAccountComponent(\"cloudResponderRoles\", SecureCloudAuthAccountComponentArgs.builder()\n            .accountId(awsAccount.secureCloudAuthAccountId())\n            .type(\"COMPONENT_CLOUD_RESPONDER_ROLES\")\n            .instance(\"cloud-responder\")\n            .cloudResponderRolesMetadata(serializeJson(\n                jsonObject(\n                    jsonProperty(\"roles\", jsonArray(\n                        jsonObject(\n                            jsonProperty(\"aws\", jsonObject(\n                                jsonProperty(\"role_name\", \"sysdig-responder-role-1\")\n                            ))\n                        ), \n                        jsonObject(\n                            jsonProperty(\"aws\", jsonObject(\n                                jsonProperty(\"role_name\", \"sysdig-responder-role-2\")\n                            ))\n                        ), \n                        jsonObject(\n                            jsonProperty(\"aws\", jsonObject(\n                                jsonProperty(\"role_name\", \"sysdig-responder-role-3\")\n                            ))\n                        )\n                    ))\n                )))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  awsAccount:\n    type: sysdig:SecureCloudAuthAccount\n    name: aws_account\n    properties:\n      providerId: '123456789012'\n      providerType: PROVIDER_AWS\n      enabled: true\n  cloudResponderRoles:\n    type: sysdig:SecureCloudAuthAccountComponent\n    name: cloud_responder_roles\n    properties:\n      accountId: ${awsAccount.secureCloudAuthAccountId}\n      type: COMPONENT_CLOUD_RESPONDER_ROLES\n      instance: cloud-responder\n      cloudResponderRolesMetadata:\n        fn::toJSON:\n          roles:\n            - aws:\n                role_name: sysdig-responder-role-1\n            - aws:\n                role_name: sysdig-responder-role-2\n            - aws:\n                role_name: sysdig-responder-role-3\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"accountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"cloudConnectorMetadata":{"type":"string"},"cloudLogsMetadata":{"type":"string"},"cloudResponderMetadata":{"type":"string","description":"Metadata for `COMPONENT_CLOUD_RESPONDER` type. Configures the Lambda functions and IAM roles for automated response actions. Required fields:\n* `aws.responder_lambdas.lambda_names` - List of Lambda function names to use for response actions\n* `aws.responder_lambdas.regions` - List of AWS regions where the responder is deployed\n* `aws.responder_lambdas.delegate_role_name` - IAM role name that the responder assumes\n* `aws.responder_lambdas.validation_role_name` - IAM role name used to validate the onboarded lambdas on the customer cloud account\n"},"cloudResponderRolesMetadata":{"type":"string","description":"Metadata for `COMPONENT_CLOUD_RESPONDER_ROLES` type. Defines the IAM roles that can be assumed for response actions. Required fields:\n"},"cryptoKeyMetadata":{"type":"string"},"eventBridgeMetadata":{"type":"string"},"instance":{"type":"string","description":"The component instance to be created, identified by a specific string. e.g. `secure-posture`, `secure-runtime`, `cloud-responder`, etc.\n\n* `\u003ccomponent\u003e_metadata` - (Optional) Based on the component type created, this is the metadata information passed to enable the component on the account.\n"},"secureCloudAuthAccountComponentId":{"type":"string"},"servicePrincipalMetadata":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountComponentTimeouts:SecureCloudAuthAccountComponentTimeouts"},"trustedRoleMetadata":{"type":"string"},"type":{"type":"string","description":"The type of component to be created. e.g. `COMPONENT_SERVICE_PRINCIPAL`.\n"},"version":{"type":"string"},"webhookDatasourceMetadata":{"type":"string"}},"type":"object","required":["accountId","instance","secureCloudAuthAccountComponentId","type"],"inputProperties":{"accountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"cloudConnectorMetadata":{"type":"string"},"cloudLogsMetadata":{"type":"string"},"cloudResponderMetadata":{"type":"string","description":"Metadata for `COMPONENT_CLOUD_RESPONDER` type. Configures the Lambda functions and IAM roles for automated response actions. Required fields:\n* `aws.responder_lambdas.lambda_names` - List of Lambda function names to use for response actions\n* `aws.responder_lambdas.regions` - List of AWS regions where the responder is deployed\n* `aws.responder_lambdas.delegate_role_name` - IAM role name that the responder assumes\n* `aws.responder_lambdas.validation_role_name` - IAM role name used to validate the onboarded lambdas on the customer cloud account\n"},"cloudResponderRolesMetadata":{"type":"string","description":"Metadata for `COMPONENT_CLOUD_RESPONDER_ROLES` type. Defines the IAM roles that can be assumed for response actions. Required fields:\n"},"cryptoKeyMetadata":{"type":"string"},"eventBridgeMetadata":{"type":"string"},"instance":{"type":"string","description":"The component instance to be created, identified by a specific string. e.g. `secure-posture`, `secure-runtime`, `cloud-responder`, etc.\n\n* `\u003ccomponent\u003e_metadata` - (Optional) Based on the component type created, this is the metadata information passed to enable the component on the account.\n"},"secureCloudAuthAccountComponentId":{"type":"string"},"servicePrincipalMetadata":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountComponentTimeouts:SecureCloudAuthAccountComponentTimeouts"},"trustedRoleMetadata":{"type":"string"},"type":{"type":"string","description":"The type of component to be created. e.g. `COMPONENT_SERVICE_PRINCIPAL`.\n"},"version":{"type":"string"},"webhookDatasourceMetadata":{"type":"string"}},"requiredInputs":["accountId","instance","type"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureCloudAuthAccountComponent resources.\n","properties":{"accountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"cloudConnectorMetadata":{"type":"string"},"cloudLogsMetadata":{"type":"string"},"cloudResponderMetadata":{"type":"string","description":"Metadata for `COMPONENT_CLOUD_RESPONDER` type. Configures the Lambda functions and IAM roles for automated response actions. Required fields:\n* `aws.responder_lambdas.lambda_names` - List of Lambda function names to use for response actions\n* `aws.responder_lambdas.regions` - List of AWS regions where the responder is deployed\n* `aws.responder_lambdas.delegate_role_name` - IAM role name that the responder assumes\n* `aws.responder_lambdas.validation_role_name` - IAM role name used to validate the onboarded lambdas on the customer cloud account\n"},"cloudResponderRolesMetadata":{"type":"string","description":"Metadata for `COMPONENT_CLOUD_RESPONDER_ROLES` type. Defines the IAM roles that can be assumed for response actions. Required fields:\n"},"cryptoKeyMetadata":{"type":"string"},"eventBridgeMetadata":{"type":"string"},"instance":{"type":"string","description":"The component instance to be created, identified by a specific string. e.g. `secure-posture`, `secure-runtime`, `cloud-responder`, etc.\n\n* `\u003ccomponent\u003e_metadata` - (Optional) Based on the component type created, this is the metadata information passed to enable the component on the account.\n"},"secureCloudAuthAccountComponentId":{"type":"string"},"servicePrincipalMetadata":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountComponentTimeouts:SecureCloudAuthAccountComponentTimeouts"},"trustedRoleMetadata":{"type":"string"},"type":{"type":"string","description":"The type of component to be created. e.g. `COMPONENT_SERVICE_PRINCIPAL`.\n"},"version":{"type":"string"},"webhookDatasourceMetadata":{"type":"string"}},"type":"object"}},"sysdig:index/secureCloudAuthAccountFeature:SecureCloudAuthAccountFeature":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureCloudAuthAccount(\"sample\", {\n    providerId: \"mygcpproject\",\n    providerType: \"PROVIDER_GCP\",\n    enabled: true,\n});\nconst sampleSecureCloudAuthAccountComponent = new sysdig.SecureCloudAuthAccountComponent(\"sample\", {\n    accountId: sample.secureCloudAuthAccountId,\n    type: \"COMPONENT_SERVICE_PRINCIPAL\",\n    instance: \"secure-scanning\",\n    servicePrincipalMetadata: JSON.stringify({\n        gcp: {\n            workload_identity_federation: {\n                pool_provider_id: \"some-pool-provider-id\",\n            },\n            email: \"some-service-account-email\",\n        },\n    }),\n});\nconst sampleSecureCloudAuthAccountFeature = new sysdig.SecureCloudAuthAccountFeature(\"sample\", {\n    accountId: sample.secureCloudAuthAccountId,\n    type: \"FEATURE_SECURE_AGENTLESS_SCANNING\",\n    enabled: true,\n    components: [\"COMPONENT_SERVICE_PRINCIPAL/secure-scanning\"],\n    flags: {\n        SCANNING_HOST_CONTAINER_ENABLED: \"true\",\n    },\n}, {\n    dependsOn: [sampleSecureCloudAuthAccountComponent],\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureCloudAuthAccount(\"sample\",\n    provider_id=\"mygcpproject\",\n    provider_type=\"PROVIDER_GCP\",\n    enabled=True)\nsample_secure_cloud_auth_account_component = sysdig.SecureCloudAuthAccountComponent(\"sample\",\n    account_id=sample.secure_cloud_auth_account_id,\n    type=\"COMPONENT_SERVICE_PRINCIPAL\",\n    instance=\"secure-scanning\",\n    service_principal_metadata=json.dumps({\n        \"gcp\": {\n            \"workload_identity_federation\": {\n                \"pool_provider_id\": \"some-pool-provider-id\",\n            },\n            \"email\": \"some-service-account-email\",\n        },\n    }))\nsample_secure_cloud_auth_account_feature = sysdig.SecureCloudAuthAccountFeature(\"sample\",\n    account_id=sample.secure_cloud_auth_account_id,\n    type=\"FEATURE_SECURE_AGENTLESS_SCANNING\",\n    enabled=True,\n    components=[\"COMPONENT_SERVICE_PRINCIPAL/secure-scanning\"],\n    flags={\n        \"SCANNING_HOST_CONTAINER_ENABLED\": \"true\",\n    },\n    opts = pulumi.ResourceOptions(depends_on=[sample_secure_cloud_auth_account_component]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureCloudAuthAccount(\"sample\", new()\n    {\n        ProviderId = \"mygcpproject\",\n        ProviderType = \"PROVIDER_GCP\",\n        Enabled = true,\n    });\n\n    var sampleSecureCloudAuthAccountComponent = new Sysdig.SecureCloudAuthAccountComponent(\"sample\", new()\n    {\n        AccountId = sample.SecureCloudAuthAccountId,\n        Type = \"COMPONENT_SERVICE_PRINCIPAL\",\n        Instance = \"secure-scanning\",\n        ServicePrincipalMetadata = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n        {\n            [\"gcp\"] = new Dictionary\u003cstring, object?\u003e\n            {\n                [\"workload_identity_federation\"] = new Dictionary\u003cstring, object?\u003e\n                {\n                    [\"pool_provider_id\"] = \"some-pool-provider-id\",\n                },\n                [\"email\"] = \"some-service-account-email\",\n            },\n        }),\n    });\n\n    var sampleSecureCloudAuthAccountFeature = new Sysdig.SecureCloudAuthAccountFeature(\"sample\", new()\n    {\n        AccountId = sample.SecureCloudAuthAccountId,\n        Type = \"FEATURE_SECURE_AGENTLESS_SCANNING\",\n        Enabled = true,\n        Components = new[]\n        {\n            \"COMPONENT_SERVICE_PRINCIPAL/secure-scanning\",\n        },\n        Flags = \n        {\n            { \"SCANNING_HOST_CONTAINER_ENABLED\", \"true\" },\n        },\n    }, new CustomResourceOptions\n    {\n        DependsOn =\n        {\n            sampleSecureCloudAuthAccountComponent,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tsample, err := sysdig.NewSecureCloudAuthAccount(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"mygcpproject\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_GCP\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"gcp\": map[string]interface{}{\n\t\t\t\t\"workload_identity_federation\": map[string]interface{}{\n\t\t\t\t\t\"pool_provider_id\": \"some-pool-provider-id\",\n\t\t\t\t},\n\t\t\t\t\"email\": \"some-service-account-email\",\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\tsampleSecureCloudAuthAccountComponent, err := sysdig.NewSecureCloudAuthAccountComponent(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountComponentArgs{\n\t\t\tAccountId:                sample.SecureCloudAuthAccountId,\n\t\t\tType:                     pulumi.String(\"COMPONENT_SERVICE_PRINCIPAL\"),\n\t\t\tInstance:                 pulumi.String(\"secure-scanning\"),\n\t\t\tServicePrincipalMetadata: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureCloudAuthAccountFeature(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountFeatureArgs{\n\t\t\tAccountId: sample.SecureCloudAuthAccountId,\n\t\t\tType:      pulumi.String(\"FEATURE_SECURE_AGENTLESS_SCANNING\"),\n\t\t\tEnabled:   pulumi.Bool(true),\n\t\t\tComponents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"COMPONENT_SERVICE_PRINCIPAL/secure-scanning\"),\n\t\t\t},\n\t\t\tFlags: pulumi.StringMap{\n\t\t\t\t\"SCANNING_HOST_CONTAINER_ENABLED\": pulumi.String(\"true\"),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tsampleSecureCloudAuthAccountComponent,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponent;\nimport com.pulumi.sysdig.SecureCloudAuthAccountComponentArgs;\nimport com.pulumi.sysdig.SecureCloudAuthAccountFeature;\nimport com.pulumi.sysdig.SecureCloudAuthAccountFeatureArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureCloudAuthAccount(\"sample\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"mygcpproject\")\n            .providerType(\"PROVIDER_GCP\")\n            .enabled(true)\n            .build());\n\n        var sampleSecureCloudAuthAccountComponent = new SecureCloudAuthAccountComponent(\"sampleSecureCloudAuthAccountComponent\", SecureCloudAuthAccountComponentArgs.builder()\n            .accountId(sample.secureCloudAuthAccountId())\n            .type(\"COMPONENT_SERVICE_PRINCIPAL\")\n            .instance(\"secure-scanning\")\n            .servicePrincipalMetadata(serializeJson(\n                jsonObject(\n                    jsonProperty(\"gcp\", jsonObject(\n                        jsonProperty(\"workload_identity_federation\", jsonObject(\n                            jsonProperty(\"pool_provider_id\", \"some-pool-provider-id\")\n                        )),\n                        jsonProperty(\"email\", \"some-service-account-email\")\n                    ))\n                )))\n            .build());\n\n        var sampleSecureCloudAuthAccountFeature = new SecureCloudAuthAccountFeature(\"sampleSecureCloudAuthAccountFeature\", SecureCloudAuthAccountFeatureArgs.builder()\n            .accountId(sample.secureCloudAuthAccountId())\n            .type(\"FEATURE_SECURE_AGENTLESS_SCANNING\")\n            .enabled(true)\n            .components(\"COMPONENT_SERVICE_PRINCIPAL/secure-scanning\")\n            .flags(Map.of(\"SCANNING_HOST_CONTAINER_ENABLED\", \"true\"))\n            .build(), CustomResourceOptions.builder()\n                .dependsOn(sampleSecureCloudAuthAccountComponent)\n                .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureCloudAuthAccount\n    properties:\n      providerId: mygcpproject\n      providerType: PROVIDER_GCP\n      enabled: true\n  sampleSecureCloudAuthAccountComponent:\n    type: sysdig:SecureCloudAuthAccountComponent\n    name: sample\n    properties:\n      accountId: ${sample.secureCloudAuthAccountId}\n      type: COMPONENT_SERVICE_PRINCIPAL\n      instance: secure-scanning\n      servicePrincipalMetadata:\n        fn::toJSON:\n          gcp:\n            workload_identity_federation:\n              pool_provider_id: some-pool-provider-id\n            email: some-service-account-email\n  sampleSecureCloudAuthAccountFeature:\n    type: sysdig:SecureCloudAuthAccountFeature\n    name: sample\n    properties:\n      accountId: ${sample.secureCloudAuthAccountId}\n      type: FEATURE_SECURE_AGENTLESS_SCANNING\n      enabled: true\n      components:\n        - COMPONENT_SERVICE_PRINCIPAL/secure-scanning\n      flags:\n        SCANNING_HOST_CONTAINER_ENABLED: 'true'\n    options:\n      dependsOn:\n        - ${sampleSecureCloudAuthAccountComponent}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"accountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"components":{"type":"array","items":{"type":"string"},"description":"Based on the feature type to be created, this is the list of components to be enabled on the cloud account.\n"},"enabled":{"type":"boolean","description":"Whether or not to enable this feature on the given cloud account.\n"},"flags":{"type":"object","additionalProperties":{"type":"string"}},"secureCloudAuthAccountFeatureId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureTimeouts:SecureCloudAuthAccountFeatureTimeouts"},"type":{"type":"string","description":"The type of feature to be created/added. e.g. `FEATURE_SECURE_CONFIG_POSTURE`.\n"}},"type":"object","required":["accountId","components","enabled","secureCloudAuthAccountFeatureId","type"],"inputProperties":{"accountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"components":{"type":"array","items":{"type":"string"},"description":"Based on the feature type to be created, this is the list of components to be enabled on the cloud account.\n"},"enabled":{"type":"boolean","description":"Whether or not to enable this feature on the given cloud account.\n"},"flags":{"type":"object","additionalProperties":{"type":"string"}},"secureCloudAuthAccountFeatureId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureTimeouts:SecureCloudAuthAccountFeatureTimeouts"},"type":{"type":"string","description":"The type of feature to be created/added. e.g. `FEATURE_SECURE_CONFIG_POSTURE`.\n"}},"requiredInputs":["accountId","components","enabled","type"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureCloudAuthAccountFeature resources.\n","properties":{"accountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"components":{"type":"array","items":{"type":"string"},"description":"Based on the feature type to be created, this is the list of components to be enabled on the cloud account.\n"},"enabled":{"type":"boolean","description":"Whether or not to enable this feature on the given cloud account.\n"},"flags":{"type":"object","additionalProperties":{"type":"string"}},"secureCloudAuthAccountFeatureId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCloudAuthAccountFeatureTimeouts:SecureCloudAuthAccountFeatureTimeouts"},"type":{"type":"string","description":"The type of feature to be created/added. e.g. `FEATURE_SECURE_CONFIG_POSTURE`.\n"}},"type":"object"}},"sysdig:index/secureCustomPolicy:SecureCustomPolicy":{"description":"## Example Usage\n\n## Import\n\nSecure custom policies can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureCustomPolicy:SecureCustomPolicy example 12345\n```\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyAction:SecureCustomPolicyAction"}},"description":{"type":"string","description":"The description of Secure policy.\n"},"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyRule:SecureCustomPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n- - -\n"},"scope":{"type":"string"},"secureCustomPolicyId":{"type":"string"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyTimeouts:SecureCustomPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"},"version":{"type":"number"}},"type":"object","required":["description","name","secureCustomPolicyId","version"],"inputProperties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyAction:SecureCustomPolicyAction"}},"description":{"type":"string","description":"The description of Secure policy.\n"},"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyRule:SecureCustomPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n- - -\n"},"scope":{"type":"string"},"secureCustomPolicyId":{"type":"string"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyTimeouts:SecureCustomPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"}},"requiredInputs":["description"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureCustomPolicy resources.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyAction:SecureCustomPolicyAction"}},"description":{"type":"string","description":"The description of Secure policy.\n"},"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyRule:SecureCustomPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n- - -\n"},"scope":{"type":"string"},"secureCustomPolicyId":{"type":"string"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureCustomPolicyTimeouts:SecureCustomPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureDriftPolicy:SecureDriftPolicy":{"description":"## Example Usage\n\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyAction:SecureDriftPolicyAction"}},"description":{"type":"string","description":"(Required) The description of the drift rule.\n"},"enabled":{"type":"boolean","description":"(Required) Toggle to dynamically detect execution of drifted binaries. A drifted binary is any binary that was not part of the original image of the container. It is typically downloaded or compiled into a running container.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRule:SecureDriftPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureDriftPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyTimeouts:SecureDriftPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object","required":["description","name","rules","secureDriftPolicyId","version"],"inputProperties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyAction:SecureDriftPolicyAction"}},"description":{"type":"string","description":"(Required) The description of the drift rule.\n"},"enabled":{"type":"boolean","description":"(Required) Toggle to dynamically detect execution of drifted binaries. A drifted binary is any binary that was not part of the original image of the container. It is typically downloaded or compiled into a running container.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRule:SecureDriftPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureDriftPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyTimeouts:SecureDriftPolicyTimeouts"},"type":{"type":"string"}},"requiredInputs":["description","rules"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureDriftPolicy resources.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyAction:SecureDriftPolicyAction"}},"description":{"type":"string","description":"(Required) The description of the drift rule.\n"},"enabled":{"type":"boolean","description":"(Required) Toggle to dynamically detect execution of drifted binaries. A drifted binary is any binary that was not part of the original image of the container. It is typically downloaded or compiled into a running container.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyRule:SecureDriftPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureDriftPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureDriftPolicyTimeouts:SecureDriftPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureList:SecureList":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst allowedDevFiles = new sysdig.SecureList(\"allowed_dev_files\", {\n    name: \"allowed_dev_files\",\n    items: [\n        \"/dev/null\",\n        \"/dev/stdin\",\n        \"/dev/stdout\",\n        \"/dev/stderr\",\n        \"/dev/random\",\n        \"/dev/urandom\",\n        \"/dev/console\",\n        \"/dev/kmsg\",\n    ],\n    append: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nallowed_dev_files = sysdig.SecureList(\"allowed_dev_files\",\n    name=\"allowed_dev_files\",\n    items=[\n        \"/dev/null\",\n        \"/dev/stdin\",\n        \"/dev/stdout\",\n        \"/dev/stderr\",\n        \"/dev/random\",\n        \"/dev/urandom\",\n        \"/dev/console\",\n        \"/dev/kmsg\",\n    ],\n    append=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var allowedDevFiles = new Sysdig.SecureList(\"allowed_dev_files\", new()\n    {\n        Name = \"allowed_dev_files\",\n        Items = new[]\n        {\n            \"/dev/null\",\n            \"/dev/stdin\",\n            \"/dev/stdout\",\n            \"/dev/stderr\",\n            \"/dev/random\",\n            \"/dev/urandom\",\n            \"/dev/console\",\n            \"/dev/kmsg\",\n        },\n        Append = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureList(ctx, \"allowed_dev_files\", \u0026sysdig.SecureListArgs{\n\t\t\tName: pulumi.String(\"allowed_dev_files\"),\n\t\t\tItems: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"/dev/null\"),\n\t\t\t\tpulumi.String(\"/dev/stdin\"),\n\t\t\t\tpulumi.String(\"/dev/stdout\"),\n\t\t\t\tpulumi.String(\"/dev/stderr\"),\n\t\t\t\tpulumi.String(\"/dev/random\"),\n\t\t\t\tpulumi.String(\"/dev/urandom\"),\n\t\t\t\tpulumi.String(\"/dev/console\"),\n\t\t\t\tpulumi.String(\"/dev/kmsg\"),\n\t\t\t},\n\t\t\tAppend: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureList;\nimport com.pulumi.sysdig.SecureListArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var allowedDevFiles = new SecureList(\"allowedDevFiles\", SecureListArgs.builder()\n            .name(\"allowed_dev_files\")\n            .items(            \n                \"/dev/null\",\n                \"/dev/stdin\",\n                \"/dev/stdout\",\n                \"/dev/stderr\",\n                \"/dev/random\",\n                \"/dev/urandom\",\n                \"/dev/console\",\n                \"/dev/kmsg\")\n            .append(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  allowedDevFiles:\n    type: sysdig:SecureList\n    name: allowed_dev_files\n    properties:\n      name: allowed_dev_files\n      items:\n        - /dev/null\n        - /dev/stdin\n        - /dev/stdout\n        - /dev/stderr\n        - /dev/random\n        - /dev/urandom\n        - /dev/console\n        - /dev/kmsg\n      append: true # default: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure lists can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureList:SecureList example 12345\n```\n","properties":{"append":{"type":"boolean","description":"Adds these elements to an existing list. Used to extend existing lists provided by Sysdig.\nThe rules can only be extended once, for example if there is an existing list called \"foo\", one can have another\nappend rule called \"foo\" but not a second one. By default this is false.\n"},"items":{"type":"array","items":{"type":"string"},"description":"Elements in the list. Elements can be another lists.\n"},"name":{"type":"string","description":"The name of the Secure list. It must be unique if it's not in append mode.\n"},"secureListId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureListTimeouts:SecureListTimeouts"},"version":{"type":"number"}},"type":"object","required":["items","name","secureListId","version"],"inputProperties":{"append":{"type":"boolean","description":"Adds these elements to an existing list. Used to extend existing lists provided by Sysdig.\nThe rules can only be extended once, for example if there is an existing list called \"foo\", one can have another\nappend rule called \"foo\" but not a second one. By default this is false.\n"},"items":{"type":"array","items":{"type":"string"},"description":"Elements in the list. Elements can be another lists.\n"},"name":{"type":"string","description":"The name of the Secure list. It must be unique if it's not in append mode.\n"},"secureListId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureListTimeouts:SecureListTimeouts"}},"requiredInputs":["items"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureList resources.\n","properties":{"append":{"type":"boolean","description":"Adds these elements to an existing list. Used to extend existing lists provided by Sysdig.\nThe rules can only be extended once, for example if there is an existing list called \"foo\", one can have another\nappend rule called \"foo\" but not a second one. By default this is false.\n"},"items":{"type":"array","items":{"type":"string"},"description":"Elements in the list. Elements can be another lists.\n"},"name":{"type":"string","description":"The name of the Secure list. It must be unique if it's not in append mode.\n"},"secureListId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureListTimeouts:SecureListTimeouts"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureMacro:SecureMacro":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst httpPort = new sysdig.SecureMacro(\"http_port\", {\n    name: \"web_port\",\n    condition: \"fd.sport=80\",\n});\nconst httpsPort = new sysdig.SecureMacro(\"https_port\", {\n    name: \"web_port\",\n    condition: \"or fd.sport=443\",\n    append: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nhttp_port = sysdig.SecureMacro(\"http_port\",\n    name=\"web_port\",\n    condition=\"fd.sport=80\")\nhttps_port = sysdig.SecureMacro(\"https_port\",\n    name=\"web_port\",\n    condition=\"or fd.sport=443\",\n    append=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var httpPort = new Sysdig.SecureMacro(\"http_port\", new()\n    {\n        Name = \"web_port\",\n        Condition = \"fd.sport=80\",\n    });\n\n    var httpsPort = new Sysdig.SecureMacro(\"https_port\", new()\n    {\n        Name = \"web_port\",\n        Condition = \"or fd.sport=443\",\n        Append = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureMacro(ctx, \"http_port\", \u0026sysdig.SecureMacroArgs{\n\t\t\tName:      pulumi.String(\"web_port\"),\n\t\t\tCondition: pulumi.String(\"fd.sport=80\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureMacro(ctx, \"https_port\", \u0026sysdig.SecureMacroArgs{\n\t\t\tName:      pulumi.String(\"web_port\"),\n\t\t\tCondition: pulumi.String(\"or fd.sport=443\"),\n\t\t\tAppend:    pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureMacro;\nimport com.pulumi.sysdig.SecureMacroArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var httpPort = new SecureMacro(\"httpPort\", SecureMacroArgs.builder()\n            .name(\"web_port\")\n            .condition(\"fd.sport=80\")\n            .build());\n\n        var httpsPort = new SecureMacro(\"httpsPort\", SecureMacroArgs.builder()\n            .name(\"web_port\")\n            .condition(\"or fd.sport=443\")\n            .append(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  httpPort:\n    type: sysdig:SecureMacro\n    name: http_port\n    properties:\n      name: web_port\n      condition: fd.sport=80\n  httpsPort:\n    type: sysdig:SecureMacro\n    name: https_port\n    properties:\n      name: web_port\n      condition: or fd.sport=443\n      append: true # default: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure macros can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureMacro:SecureMacro example 12345\n```\n","properties":{"append":{"type":"boolean","description":"Adds these elements to an existing macro. Used to extend existing macros provided by Sysdig.\nThe macros can only be extended once, for example if there is an existing macro called \"foo\", one can have another\nappend macro called \"foo\" but not a second one. By default this is false.\n"},"condition":{"type":"string","description":"Macro condition. It can contain lists or other macros.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the macro requires a minimum engine version. This\ncan allow you to add macros that would not normally pass validation with older agents in your environment. The macro\nwill only be processed by agents that support the\u003cspan pulumi-lang-nodejs=\" minimumEngineVersion \" pulumi-lang-dotnet=\" MinimumEngineVersion \" pulumi-lang-go=\" minimumEngineVersion \" pulumi-lang-python=\" minimum_engine_version \" pulumi-lang-yaml=\" minimumEngineVersion \" pulumi-lang-java=\" minimumEngineVersion \"\u003e minimum_engine_version \u003c/span\u003especified.\n"},"name":{"type":"string","description":"The name of the macro. It must be unique if it's not in append mode.\n"},"secureMacroId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMacroTimeouts:SecureMacroTimeouts"},"version":{"type":"number"}},"type":"object","required":["condition","name","secureMacroId","version"],"inputProperties":{"append":{"type":"boolean","description":"Adds these elements to an existing macro. Used to extend existing macros provided by Sysdig.\nThe macros can only be extended once, for example if there is an existing macro called \"foo\", one can have another\nappend macro called \"foo\" but not a second one. By default this is false.\n"},"condition":{"type":"string","description":"Macro condition. It can contain lists or other macros.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the macro requires a minimum engine version. This\ncan allow you to add macros that would not normally pass validation with older agents in your environment. The macro\nwill only be processed by agents that support the\u003cspan pulumi-lang-nodejs=\" minimumEngineVersion \" pulumi-lang-dotnet=\" MinimumEngineVersion \" pulumi-lang-go=\" minimumEngineVersion \" pulumi-lang-python=\" minimum_engine_version \" pulumi-lang-yaml=\" minimumEngineVersion \" pulumi-lang-java=\" minimumEngineVersion \"\u003e minimum_engine_version \u003c/span\u003especified.\n"},"name":{"type":"string","description":"The name of the macro. It must be unique if it's not in append mode.\n"},"secureMacroId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMacroTimeouts:SecureMacroTimeouts"}},"requiredInputs":["condition"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureMacro resources.\n","properties":{"append":{"type":"boolean","description":"Adds these elements to an existing macro. Used to extend existing macros provided by Sysdig.\nThe macros can only be extended once, for example if there is an existing macro called \"foo\", one can have another\nappend macro called \"foo\" but not a second one. By default this is false.\n"},"condition":{"type":"string","description":"Macro condition. It can contain lists or other macros.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the macro requires a minimum engine version. This\ncan allow you to add macros that would not normally pass validation with older agents in your environment. The macro\nwill only be processed by agents that support the\u003cspan pulumi-lang-nodejs=\" minimumEngineVersion \" pulumi-lang-dotnet=\" MinimumEngineVersion \" pulumi-lang-go=\" minimumEngineVersion \" pulumi-lang-python=\" minimum_engine_version \" pulumi-lang-yaml=\" minimumEngineVersion \" pulumi-lang-java=\" minimumEngineVersion \"\u003e minimum_engine_version \u003c/span\u003especified.\n"},"name":{"type":"string","description":"The name of the macro. It must be unique if it's not in append mode.\n"},"secureMacroId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMacroTimeouts:SecureMacroTimeouts"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureMalwarePolicy:SecureMalwarePolicy":{"description":"## Example Usage\n\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyAction:SecureMalwarePolicyAction"}},"description":{"type":"string","description":"(Required) The description of the malware rule.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rule":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyRule:SecureMalwarePolicyRule"},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureMalwarePolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyTimeouts:SecureMalwarePolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object","required":["description","name","rule","secureMalwarePolicyId","version"],"inputProperties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyAction:SecureMalwarePolicyAction"}},"description":{"type":"string","description":"(Required) The description of the malware rule.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rule":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyRule:SecureMalwarePolicyRule"},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureMalwarePolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyTimeouts:SecureMalwarePolicyTimeouts"},"type":{"type":"string"}},"requiredInputs":["description","rule"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureMalwarePolicy resources.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyAction:SecureMalwarePolicyAction"}},"description":{"type":"string","description":"(Required) The description of the malware rule.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rule":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyRule:SecureMalwarePolicyRule"},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureMalwarePolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMalwarePolicyTimeouts:SecureMalwarePolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureManagedPolicy:SecureManagedPolicy":{"description":"## Example Usage\n\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyAction:SecureManagedPolicyAction"}},"disabledRules":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Will secure process with this policy?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure managed policy. It must match the name of an existing managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n\n- - -\n"},"scope":{"type":"string"},"secureManagedPolicyId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyTimeouts:SecureManagedPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"},"version":{"type":"number"}},"type":"object","required":["name","secureManagedPolicyId","version"],"inputProperties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyAction:SecureManagedPolicyAction"}},"disabledRules":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Will secure process with this policy?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure managed policy. It must match the name of an existing managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n\n- - -\n"},"scope":{"type":"string"},"secureManagedPolicyId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyTimeouts:SecureManagedPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureManagedPolicy resources.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyAction:SecureManagedPolicyAction"}},"disabledRules":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Will secure process with this policy?. By default this is true.\n"},"name":{"type":"string","description":"The name of the Secure managed policy. It must match the name of an existing managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n\n- - -\n"},"scope":{"type":"string"},"secureManagedPolicyId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureManagedPolicyTimeouts:SecureManagedPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureManagedRuleset:SecureManagedRuleset":{"description":"## Example Usage\n\n## Import\n\nSecure managed rulesets can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureManagedRuleset:SecureManagedRuleset example 12345\n```\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetAction:SecureManagedRulesetAction"}},"description":{"type":"string","description":"The description of Secure policy.\n"},"disabledRules":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"inheritedFroms":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetInheritedFrom:SecureManagedRulesetInheritedFrom"}},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n- - -\n"},"scope":{"type":"string"},"secureManagedRulesetId":{"type":"string"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).\n"},"templateId":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetTimeouts:SecureManagedRulesetTimeouts"},"version":{"type":"number"}},"type":"object","required":["description","inheritedFroms","name","secureManagedRulesetId","templateId","version"],"inputProperties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetAction:SecureManagedRulesetAction"}},"description":{"type":"string","description":"The description of Secure policy.\n"},"disabledRules":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"inheritedFroms":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetInheritedFrom:SecureManagedRulesetInheritedFrom"}},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n- - -\n"},"scope":{"type":"string"},"secureManagedRulesetId":{"type":"string"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetTimeouts:SecureManagedRulesetTimeouts"}},"requiredInputs":["description","inheritedFroms"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureManagedRuleset resources.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetAction:SecureManagedRulesetAction"}},"description":{"type":"string","description":"The description of Secure policy.\n"},"disabledRules":{"type":"array","items":{"type":"string"}},"enabled":{"type":"boolean","description":"Will secure process with this rule?. By default this is true.\n"},"inheritedFroms":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetInheritedFrom:SecureManagedRulesetInheritedFrom"}},"name":{"type":"string","description":"The name of the Secure policy. It must be unique.\n"},"notificationChannels":{"type":"array","items":{"type":"number"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy. \n- - -\n"},"scope":{"type":"string"},"secureManagedRulesetId":{"type":"string"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).\n"},"templateId":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureManagedRulesetTimeouts:SecureManagedRulesetTimeouts"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureMlPolicy:SecureMlPolicy":{"description":"## Example Usage\n\n","properties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyRule:SecureMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyTimeouts:SecureMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object","required":["description","name","rules","secureMlPolicyId","version"],"inputProperties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyRule:SecureMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyTimeouts:SecureMlPolicyTimeouts"},"type":{"type":"string"}},"requiredInputs":["description","rules"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureMlPolicy resources.\n","properties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or not.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyRule:SecureMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureMlPolicyTimeouts:SecureMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureNotificationChannelEmail:SecureNotificationChannelEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sampleEmail = new sysdig.SecureNotificationChannelEmail(\"sample_email\", {\n    name: \"Example Channel - Email\",\n    recipients: [\n        \"foo@localhost.com\",\n        \"bar@localhost.com\",\n    ],\n    enabled: true,\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_email = sysdig.SecureNotificationChannelEmail(\"sample_email\",\n    name=\"Example Channel - Email\",\n    recipients=[\n        \"foo@localhost.com\",\n        \"bar@localhost.com\",\n    ],\n    enabled=True,\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sampleEmail = new Sysdig.SecureNotificationChannelEmail(\"sample_email\", new()\n    {\n        Name = \"Example Channel - Email\",\n        Recipients = new[]\n        {\n            \"foo@localhost.com\",\n            \"bar@localhost.com\",\n        },\n        Enabled = true,\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelEmail(ctx, \"sample_email\", \u0026sysdig.SecureNotificationChannelEmailArgs{\n\t\t\tName: pulumi.String(\"Example Channel - Email\"),\n\t\t\tRecipients: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo@localhost.com\"),\n\t\t\t\tpulumi.String(\"bar@localhost.com\"),\n\t\t\t},\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelEmail;\nimport com.pulumi.sysdig.SecureNotificationChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sampleEmail = new SecureNotificationChannelEmail(\"sampleEmail\", SecureNotificationChannelEmailArgs.builder()\n            .name(\"Example Channel - Email\")\n            .recipients(            \n                \"foo@localhost.com\",\n                \"bar@localhost.com\")\n            .enabled(true)\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sampleEmail:\n    type: sysdig:SecureNotificationChannelEmail\n    name: sample_email\n    properties:\n      name: Example Channel - Email\n      recipients:\n        - foo@localhost.com\n        - bar@localhost.com\n      enabled: true\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nEmail notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelEmail:SecureNotificationChannelEmail example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"recipients":{"type":"array","items":{"type":"string"},"description":"List of recipients that will receive\nthe message.\n"},"secureNotificationChannelEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelEmailTimeouts:SecureNotificationChannelEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["name","recipients","secureNotificationChannelEmailId","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"recipients":{"type":"array","items":{"type":"string"},"description":"List of recipients that will receive\nthe message.\n"},"secureNotificationChannelEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelEmailTimeouts:SecureNotificationChannelEmailTimeouts"}},"requiredInputs":["recipients"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelEmail resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"recipients":{"type":"array","items":{"type":"string"},"description":"List of recipients that will receive\nthe message.\n"},"secureNotificationChannelEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelEmailTimeouts:SecureNotificationChannelEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelMsteams:SecureNotificationChannelMsteams":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_msteams = new sysdig.SecureNotificationChannelMsteams(\"sample-msteams\", {\n    name: \"Example Channel - MS Teams\",\n    enabled: true,\n    url: \"https://xxxxx.webhook.office.com/xxxxxxxxx\",\n    templateVersion: \"v2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_msteams = sysdig.SecureNotificationChannelMsteams(\"sample-msteams\",\n    name=\"Example Channel - MS Teams\",\n    enabled=True,\n    url=\"https://xxxxx.webhook.office.com/xxxxxxxxx\",\n    template_version=\"v2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_msteams = new Sysdig.SecureNotificationChannelMsteams(\"sample-msteams\", new()\n    {\n        Name = \"Example Channel - MS Teams\",\n        Enabled = true,\n        Url = \"https://xxxxx.webhook.office.com/xxxxxxxxx\",\n        TemplateVersion = \"v2\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelMsteams(ctx, \"sample-msteams\", \u0026sysdig.SecureNotificationChannelMsteamsArgs{\n\t\t\tName:            pulumi.String(\"Example Channel - MS Teams\"),\n\t\t\tEnabled:         pulumi.Bool(true),\n\t\t\tUrl:             pulumi.String(\"https://xxxxx.webhook.office.com/xxxxxxxxx\"),\n\t\t\tTemplateVersion: pulumi.String(\"v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelMsteams;\nimport com.pulumi.sysdig.SecureNotificationChannelMsteamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_msteams = new SecureNotificationChannelMsteams(\"sample-msteams\", SecureNotificationChannelMsteamsArgs.builder()\n            .name(\"Example Channel - MS Teams\")\n            .enabled(true)\n            .url(\"https://xxxxx.webhook.office.com/xxxxxxxxx\")\n            .templateVersion(\"v2\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-msteams:\n    type: sysdig:SecureNotificationChannelMsteams\n    properties:\n      name: Example Channel - MS Teams\n      enabled: true\n      url: https://xxxxx.webhook.office.com/xxxxxxxxx\n      templateVersion: v2\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nMS Teams notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelMsteams:SecureNotificationChannelMsteams example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelMsteamsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"templateVersion":{"type":"string","description":"The notification template version to use to create notifications.\nCurrently v1 refers to Detailed Notification and v2 refers to Shortened Notification. Default is v1.\nThis field is not supported for Sysdig onprems \u003c 6.2.1\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelMsteamsTimeouts:SecureNotificationChannelMsteamsTimeouts"},"url":{"type":"string","description":"URL of the MS Teams webhook.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["name","secureNotificationChannelMsteamsId","url","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelMsteamsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"templateVersion":{"type":"string","description":"The notification template version to use to create notifications.\nCurrently v1 refers to Detailed Notification and v2 refers to Shortened Notification. Default is v1.\nThis field is not supported for Sysdig onprems \u003c 6.2.1\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelMsteamsTimeouts:SecureNotificationChannelMsteamsTimeouts"},"url":{"type":"string","description":"URL of the MS Teams webhook.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelMsteams resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelMsteamsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"templateVersion":{"type":"string","description":"The notification template version to use to create notifications.\nCurrently v1 refers to Detailed Notification and v2 refers to Shortened Notification. Default is v1.\nThis field is not supported for Sysdig onprems \u003c 6.2.1\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelMsteamsTimeouts:SecureNotificationChannelMsteamsTimeouts"},"url":{"type":"string","description":"URL of the MS Teams webhook.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelOpsgenie:SecureNotificationChannelOpsgenie":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_opsgenie = new sysdig.SecureNotificationChannelOpsgenie(\"sample-opsgenie\", {\n    name: \"Example Channel - OpsGenie\",\n    enabled: true,\n    apiKey: \"2349324-342354353-5324-23\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_opsgenie = sysdig.SecureNotificationChannelOpsgenie(\"sample-opsgenie\",\n    name=\"Example Channel - OpsGenie\",\n    enabled=True,\n    api_key=\"2349324-342354353-5324-23\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_opsgenie = new Sysdig.SecureNotificationChannelOpsgenie(\"sample-opsgenie\", new()\n    {\n        Name = \"Example Channel - OpsGenie\",\n        Enabled = true,\n        ApiKey = \"2349324-342354353-5324-23\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelOpsgenie(ctx, \"sample-opsgenie\", \u0026sysdig.SecureNotificationChannelOpsgenieArgs{\n\t\t\tName:    pulumi.String(\"Example Channel - OpsGenie\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tApiKey:  pulumi.String(\"2349324-342354353-5324-23\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelOpsgenie;\nimport com.pulumi.sysdig.SecureNotificationChannelOpsgenieArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_opsgenie = new SecureNotificationChannelOpsgenie(\"sample-opsgenie\", SecureNotificationChannelOpsgenieArgs.builder()\n            .name(\"Example Channel - OpsGenie\")\n            .enabled(true)\n            .apiKey(\"2349324-342354353-5324-23\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-opsgenie:\n    type: sysdig:SecureNotificationChannelOpsgenie\n    properties:\n      name: Example Channel - OpsGenie\n      enabled: true\n      apiKey: 2349324-342354353-5324-23\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nOpsgenie notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelOpsgenie:SecureNotificationChannelOpsgenie example 12345\n```\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"region":{"type":"string","description":"Opsgenie Region. Can be `US` or `EU`. Default is `US`.\n"},"secureNotificationChannelOpsgenieId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelOpsgenieTimeouts:SecureNotificationChannelOpsgenieTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["apiKey","name","secureNotificationChannelOpsgenieId","version"],"inputProperties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"region":{"type":"string","description":"Opsgenie Region. Can be `US` or `EU`. Default is `US`.\n"},"secureNotificationChannelOpsgenieId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelOpsgenieTimeouts:SecureNotificationChannelOpsgenieTimeouts"}},"requiredInputs":["apiKey"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelOpsgenie resources.\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"region":{"type":"string","description":"Opsgenie Region. Can be `US` or `EU`. Default is `US`.\n"},"secureNotificationChannelOpsgenieId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelOpsgenieTimeouts:SecureNotificationChannelOpsgenieTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelPagerduty:SecureNotificationChannelPagerduty":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_pagerduty = new sysdig.SecureNotificationChannelPagerduty(\"sample-pagerduty\", {\n    name: \"Example Channel - Pagerduty\",\n    enabled: true,\n    account: \"account\",\n    serviceKey: \"XXXXXXXXXX\",\n    serviceName: \"sysdig\",\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_pagerduty = sysdig.SecureNotificationChannelPagerduty(\"sample-pagerduty\",\n    name=\"Example Channel - Pagerduty\",\n    enabled=True,\n    account=\"account\",\n    service_key=\"XXXXXXXXXX\",\n    service_name=\"sysdig\",\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_pagerduty = new Sysdig.SecureNotificationChannelPagerduty(\"sample-pagerduty\", new()\n    {\n        Name = \"Example Channel - Pagerduty\",\n        Enabled = true,\n        Account = \"account\",\n        ServiceKey = \"XXXXXXXXXX\",\n        ServiceName = \"sysdig\",\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelPagerduty(ctx, \"sample-pagerduty\", \u0026sysdig.SecureNotificationChannelPagerdutyArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - Pagerduty\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tAccount:              pulumi.String(\"account\"),\n\t\t\tServiceKey:           pulumi.String(\"XXXXXXXXXX\"),\n\t\t\tServiceName:          pulumi.String(\"sysdig\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelPagerduty;\nimport com.pulumi.sysdig.SecureNotificationChannelPagerdutyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_pagerduty = new SecureNotificationChannelPagerduty(\"sample-pagerduty\", SecureNotificationChannelPagerdutyArgs.builder()\n            .name(\"Example Channel - Pagerduty\")\n            .enabled(true)\n            .account(\"account\")\n            .serviceKey(\"XXXXXXXXXX\")\n            .serviceName(\"sysdig\")\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-pagerduty:\n    type: sysdig:SecureNotificationChannelPagerduty\n    properties:\n      name: Example Channel - Pagerduty\n      enabled: true\n      account: account\n      serviceKey: XXXXXXXXXX\n      serviceName: sysdig\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPagerduty notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelPagerduty:SecureNotificationChannelPagerduty example 12345\n```\n","properties":{"account":{"type":"string","description":"Pagerduty account.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelPagerdutyId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"serviceKey":{"type":"string","description":"Service Key for the Pagerduty account.\n"},"serviceName":{"type":"string","description":"Service name for the Pagerduty account.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelPagerdutyTimeouts:SecureNotificationChannelPagerdutyTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["account","name","secureNotificationChannelPagerdutyId","serviceKey","serviceName","version"],"inputProperties":{"account":{"type":"string","description":"Pagerduty account.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelPagerdutyId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"serviceKey":{"type":"string","description":"Service Key for the Pagerduty account.\n"},"serviceName":{"type":"string","description":"Service name for the Pagerduty account.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelPagerdutyTimeouts:SecureNotificationChannelPagerdutyTimeouts"}},"requiredInputs":["account","serviceKey","serviceName"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelPagerduty resources.\n","properties":{"account":{"type":"string","description":"Pagerduty account.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelPagerdutyId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"serviceKey":{"type":"string","description":"Service Key for the Pagerduty account.\n"},"serviceName":{"type":"string","description":"Service name for the Pagerduty account.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelPagerdutyTimeouts:SecureNotificationChannelPagerdutyTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelPrometheusAlertManager:SecureNotificationChannelPrometheusAlertManager":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureNotificationChannelPrometheusAlertManager(\"sample\", {\n    name: \"Example Channel - Prometheus Alert Manager\",\n    enabled: true,\n    url: \"https://testurl:8080\",\n    sendTestNotification: false,\n    additionalHeaders: {\n        \"custom-Header\": \"TestHeader\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureNotificationChannelPrometheusAlertManager(\"sample\",\n    name=\"Example Channel - Prometheus Alert Manager\",\n    enabled=True,\n    url=\"https://testurl:8080\",\n    send_test_notification=False,\n    additional_headers={\n        \"custom-Header\": \"TestHeader\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureNotificationChannelPrometheusAlertManager(\"sample\", new()\n    {\n        Name = \"Example Channel - Prometheus Alert Manager\",\n        Enabled = true,\n        Url = \"https://testurl:8080\",\n        SendTestNotification = false,\n        AdditionalHeaders = \n        {\n            { \"custom-Header\", \"TestHeader\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelPrometheusAlertManager(ctx, \"sample\", \u0026sysdig.SecureNotificationChannelPrometheusAlertManagerArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - Prometheus Alert Manager\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tUrl:                  pulumi.String(\"https://testurl:8080\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t\tAdditionalHeaders: pulumi.StringMap{\n\t\t\t\t\"custom-Header\": pulumi.String(\"TestHeader\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelPrometheusAlertManager;\nimport com.pulumi.sysdig.SecureNotificationChannelPrometheusAlertManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureNotificationChannelPrometheusAlertManager(\"sample\", SecureNotificationChannelPrometheusAlertManagerArgs.builder()\n            .name(\"Example Channel - Prometheus Alert Manager\")\n            .enabled(true)\n            .url(\"https://testurl:8080\")\n            .sendTestNotification(false)\n            .additionalHeaders(Map.of(\"custom-Header\", \"TestHeader\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureNotificationChannelPrometheusAlertManager\n    properties:\n      name: Example Channel - Prometheus Alert Manager\n      enabled: true\n      url: https://testurl:8080\n      sendTestNotification: false\n      additionalHeaders:\n        custom-Header: TestHeader\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPrometheus Alert Manager notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelPrometheusAlertManager:SecureNotificationChannelPrometheusAlertManager example 12345\n```\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelPrometheusAlertManagerId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelPrometheusAlertManagerTimeouts:SecureNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["name","secureNotificationChannelPrometheusAlertManagerId","url","version"],"inputProperties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelPrometheusAlertManagerId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelPrometheusAlertManagerTimeouts:SecureNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelPrometheusAlertManager resources.\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelPrometheusAlertManagerId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelPrometheusAlertManagerTimeouts:SecureNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelSlack:SecureNotificationChannelSlack":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_slack = new sysdig.SecureNotificationChannelSlack(\"sample-slack\", {\n    name: \"Example Channel - Slack\",\n    enabled: true,\n    url: \"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\",\n    channel: \"#sysdig\",\n    isPrivateChannel: false,\n    templateVersion: \"v2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_slack = sysdig.SecureNotificationChannelSlack(\"sample-slack\",\n    name=\"Example Channel - Slack\",\n    enabled=True,\n    url=\"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\",\n    channel=\"#sysdig\",\n    is_private_channel=False,\n    template_version=\"v2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_slack = new Sysdig.SecureNotificationChannelSlack(\"sample-slack\", new()\n    {\n        Name = \"Example Channel - Slack\",\n        Enabled = true,\n        Url = \"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\",\n        Channel = \"#sysdig\",\n        IsPrivateChannel = false,\n        TemplateVersion = \"v2\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelSlack(ctx, \"sample-slack\", \u0026sysdig.SecureNotificationChannelSlackArgs{\n\t\t\tName:             pulumi.String(\"Example Channel - Slack\"),\n\t\t\tEnabled:          pulumi.Bool(true),\n\t\t\tUrl:              pulumi.String(\"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\"),\n\t\t\tChannel:          pulumi.String(\"#sysdig\"),\n\t\t\tIsPrivateChannel: pulumi.Bool(false),\n\t\t\tTemplateVersion:  pulumi.String(\"v2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelSlack;\nimport com.pulumi.sysdig.SecureNotificationChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_slack = new SecureNotificationChannelSlack(\"sample-slack\", SecureNotificationChannelSlackArgs.builder()\n            .name(\"Example Channel - Slack\")\n            .enabled(true)\n            .url(\"https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\")\n            .channel(\"#sysdig\")\n            .isPrivateChannel(false)\n            .templateVersion(\"v2\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-slack:\n    type: sysdig:SecureNotificationChannelSlack\n    properties:\n      name: Example Channel - Slack\n      enabled: true\n      url: https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX\n      channel: '#sysdig'\n      isPrivateChannel: false\n      templateVersion: v2\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSlack notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelSlack:SecureNotificationChannelSlack example 12345\n```\n","properties":{"channel":{"type":"string","description":"Name of the Slack channel. **NOTE**: If the channel is private this field cannot be changed after creation.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"isPrivateChannel":{"type":"boolean","description":"If true, the Slack channel name will be visible only to the user that created this notification channel. Default: false.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"privateChannelUrl":{"type":"string","description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url). Can be set only if the channel is private.\n"},"secureNotificationChannelSlackId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"templateVersion":{"type":"string","description":"The notification template version to use to create notifications.\nCurrently v1 refers to Detailed Notification and v2 refers to Shortened Notification. Default is v1.\nThis field is not supported for Sysdig onprems \u003c 6.2.1\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelSlackTimeouts:SecureNotificationChannelSlackTimeouts"},"url":{"type":"string","description":"URL of the Slack webhook.\n","secret":true},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["channel","name","secureNotificationChannelSlackId","url","version"],"inputProperties":{"channel":{"type":"string","description":"Name of the Slack channel. **NOTE**: If the channel is private this field cannot be changed after creation.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"isPrivateChannel":{"type":"boolean","description":"If true, the Slack channel name will be visible only to the user that created this notification channel. Default: false.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"privateChannelUrl":{"type":"string","description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url). Can be set only if the channel is private.\n"},"secureNotificationChannelSlackId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"templateVersion":{"type":"string","description":"The notification template version to use to create notifications.\nCurrently v1 refers to Detailed Notification and v2 refers to Shortened Notification. Default is v1.\nThis field is not supported for Sysdig onprems \u003c 6.2.1\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelSlackTimeouts:SecureNotificationChannelSlackTimeouts"},"url":{"type":"string","description":"URL of the Slack webhook.\n","secret":true}},"requiredInputs":["channel","url"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelSlack resources.\n","properties":{"channel":{"type":"string","description":"Name of the Slack channel. **NOTE**: If the channel is private this field cannot be changed after creation.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"isPrivateChannel":{"type":"boolean","description":"If true, the Slack channel name will be visible only to the user that created this notification channel. Default: false.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"privateChannelUrl":{"type":"string","description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url). Can be set only if the channel is private.\n"},"secureNotificationChannelSlackId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"templateVersion":{"type":"string","description":"The notification template version to use to create notifications.\nCurrently v1 refers to Detailed Notification and v2 refers to Shortened Notification. Default is v1.\nThis field is not supported for Sysdig onprems \u003c 6.2.1\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelSlackTimeouts:SecureNotificationChannelSlackTimeouts"},"url":{"type":"string","description":"URL of the Slack webhook.\n","secret":true},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelSns:SecureNotificationChannelSns":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_amazon_sns = new sysdig.SecureNotificationChannelSns(\"sample-amazon-sns\", {\n    name: \"Example Channel - Amazon SNS\",\n    enabled: true,\n    topics: [\n        \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n        \"arn:aws:sns:us-east-1:279948934544:my-alerts\",\n    ],\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_amazon_sns = sysdig.SecureNotificationChannelSns(\"sample-amazon-sns\",\n    name=\"Example Channel - Amazon SNS\",\n    enabled=True,\n    topics=[\n        \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n        \"arn:aws:sns:us-east-1:279948934544:my-alerts\",\n    ],\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_amazon_sns = new Sysdig.SecureNotificationChannelSns(\"sample-amazon-sns\", new()\n    {\n        Name = \"Example Channel - Amazon SNS\",\n        Enabled = true,\n        Topics = new[]\n        {\n            \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n            \"arn:aws:sns:us-east-1:279948934544:my-alerts\",\n        },\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelSns(ctx, \"sample-amazon-sns\", \u0026sysdig.SecureNotificationChannelSnsArgs{\n\t\t\tName:    pulumi.String(\"Example Channel - Amazon SNS\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tTopics: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"arn:aws:sns:us-east-1:273489009834:my-alerts2\"),\n\t\t\t\tpulumi.String(\"arn:aws:sns:us-east-1:279948934544:my-alerts\"),\n\t\t\t},\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelSns;\nimport com.pulumi.sysdig.SecureNotificationChannelSnsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_amazon_sns = new SecureNotificationChannelSns(\"sample-amazon-sns\", SecureNotificationChannelSnsArgs.builder()\n            .name(\"Example Channel - Amazon SNS\")\n            .enabled(true)\n            .topics(            \n                \"arn:aws:sns:us-east-1:273489009834:my-alerts2\",\n                \"arn:aws:sns:us-east-1:279948934544:my-alerts\")\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-amazon-sns:\n    type: sysdig:SecureNotificationChannelSns\n    properties:\n      name: Example Channel - Amazon SNS\n      enabled: true\n      topics:\n        - arn:aws:sns:us-east-1:273489009834:my-alerts2\n        - arn:aws:sns:us-east-1:279948934544:my-alerts\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSNS notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelSns:SecureNotificationChannelSns example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelSnsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelSnsTimeouts:SecureNotificationChannelSnsTimeouts"},"topics":{"type":"array","items":{"type":"string"},"description":"List of ARNs from the SNS topics.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["name","secureNotificationChannelSnsId","topics","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelSnsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelSnsTimeouts:SecureNotificationChannelSnsTimeouts"},"topics":{"type":"array","items":{"type":"string"},"description":"List of ARNs from the SNS topics.\n"}},"requiredInputs":["topics"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelSns resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelSnsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelSnsTimeouts:SecureNotificationChannelSnsTimeouts"},"topics":{"type":"array","items":{"type":"string"},"description":"List of ARNs from the SNS topics.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelTeamEmail:SecureNotificationChannelTeamEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_team_email = new sysdig.SecureNotificationChannelTeamEmail(\"sample-team-email\", {\n    name: \"Example Channel - team email\",\n    teamId: 1,\n    includeAdminUsers: false,\n    enabled: true,\n    shareWithCurrentTeam: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_team_email = sysdig.SecureNotificationChannelTeamEmail(\"sample-team-email\",\n    name=\"Example Channel - team email\",\n    team_id=1,\n    include_admin_users=False,\n    enabled=True,\n    share_with_current_team=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_team_email = new Sysdig.SecureNotificationChannelTeamEmail(\"sample-team-email\", new()\n    {\n        Name = \"Example Channel - team email\",\n        TeamId = 1,\n        IncludeAdminUsers = false,\n        Enabled = true,\n        ShareWithCurrentTeam = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelTeamEmail(ctx, \"sample-team-email\", \u0026sysdig.SecureNotificationChannelTeamEmailArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - team email\"),\n\t\t\tTeamId:               pulumi.Float64(1),\n\t\t\tIncludeAdminUsers:    pulumi.Bool(false),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tShareWithCurrentTeam: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelTeamEmail;\nimport com.pulumi.sysdig.SecureNotificationChannelTeamEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_team_email = new SecureNotificationChannelTeamEmail(\"sample-team-email\", SecureNotificationChannelTeamEmailArgs.builder()\n            .name(\"Example Channel - team email\")\n            .teamId(1.0)\n            .includeAdminUsers(false)\n            .enabled(true)\n            .shareWithCurrentTeam(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-team-email:\n    type: sysdig:SecureNotificationChannelTeamEmail\n    properties:\n      name: Example Channel - team email\n      teamId: 1\n      includeAdminUsers: false\n      enabled: true\n      shareWithCurrentTeam: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nTeam email notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelTeamEmail:SecureNotificationChannelTeamEmail example 12345\n```\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"includeAdminUsers":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, it will include admin users in notifications. Default is false.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelTeamEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"teamId":{"type":"number","description":"id of the team.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelTeamEmailTimeouts:SecureNotificationChannelTeamEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["name","secureNotificationChannelTeamEmailId","teamId","version"],"inputProperties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"includeAdminUsers":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, it will include admin users in notifications. Default is false.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelTeamEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"teamId":{"type":"number","description":"id of the team.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelTeamEmailTimeouts:SecureNotificationChannelTeamEmailTimeouts"}},"requiredInputs":["teamId"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelTeamEmail resources.\n","properties":{"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"includeAdminUsers":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e, it will include admin users in notifications. Default is false.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelTeamEmailId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"teamId":{"type":"number","description":"id of the team.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelTeamEmailTimeouts:SecureNotificationChannelTeamEmailTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelVictorops:SecureNotificationChannelVictorops":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_victorops = new sysdig.SecureNotificationChannelVictorops(\"sample-victorops\", {\n    name: \"Example Channel - VictorOps\",\n    enabled: true,\n    apiKey: \"1234342-4234243-4234-2\",\n    routingKey: \"My team\",\n    sendTestNotification: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_victorops = sysdig.SecureNotificationChannelVictorops(\"sample-victorops\",\n    name=\"Example Channel - VictorOps\",\n    enabled=True,\n    api_key=\"1234342-4234243-4234-2\",\n    routing_key=\"My team\",\n    send_test_notification=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_victorops = new Sysdig.SecureNotificationChannelVictorops(\"sample-victorops\", new()\n    {\n        Name = \"Example Channel - VictorOps\",\n        Enabled = true,\n        ApiKey = \"1234342-4234243-4234-2\",\n        RoutingKey = \"My team\",\n        SendTestNotification = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelVictorops(ctx, \"sample-victorops\", \u0026sysdig.SecureNotificationChannelVictoropsArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - VictorOps\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tApiKey:               pulumi.String(\"1234342-4234243-4234-2\"),\n\t\t\tRoutingKey:           pulumi.String(\"My team\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelVictorops;\nimport com.pulumi.sysdig.SecureNotificationChannelVictoropsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_victorops = new SecureNotificationChannelVictorops(\"sample-victorops\", SecureNotificationChannelVictoropsArgs.builder()\n            .name(\"Example Channel - VictorOps\")\n            .enabled(true)\n            .apiKey(\"1234342-4234243-4234-2\")\n            .routingKey(\"My team\")\n            .sendTestNotification(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-victorops:\n    type: sysdig:SecureNotificationChannelVictorops\n    properties:\n      name: Example Channel - VictorOps\n      enabled: true\n      apiKey: 1234342-4234243-4234-2\n      routingKey: My team\n      sendTestNotification: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nVictorOPS notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelVictorops:SecureNotificationChannelVictorops example 12345\n```\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"routingKey":{"type":"string","description":"Routing key for VictorOps.\n"},"secureNotificationChannelVictoropsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelVictoropsTimeouts:SecureNotificationChannelVictoropsTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["apiKey","name","routingKey","secureNotificationChannelVictoropsId","version"],"inputProperties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"routingKey":{"type":"string","description":"Routing key for VictorOps.\n"},"secureNotificationChannelVictoropsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelVictoropsTimeouts:SecureNotificationChannelVictoropsTimeouts"}},"requiredInputs":["apiKey","routingKey"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelVictorops resources.\n","properties":{"apiKey":{"type":"string","description":"Key for the API.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"routingKey":{"type":"string","description":"Routing key for VictorOps.\n"},"secureNotificationChannelVictoropsId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelVictoropsTimeouts:SecureNotificationChannelVictoropsTimeouts"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureNotificationChannelWebhook:SecureNotificationChannelWebhook":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample_webhook = new sysdig.SecureNotificationChannelWebhook(\"sample-webhook\", {\n    name: \"Example Channel - Webhook\",\n    enabled: true,\n    url: \"localhost:8080\",\n    sendTestNotification: false,\n    customData: {\n        data1: \"value1\",\n        data2: \"value2\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample_webhook = sysdig.SecureNotificationChannelWebhook(\"sample-webhook\",\n    name=\"Example Channel - Webhook\",\n    enabled=True,\n    url=\"localhost:8080\",\n    send_test_notification=False,\n    custom_data={\n        \"data1\": \"value1\",\n        \"data2\": \"value2\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample_webhook = new Sysdig.SecureNotificationChannelWebhook(\"sample-webhook\", new()\n    {\n        Name = \"Example Channel - Webhook\",\n        Enabled = true,\n        Url = \"localhost:8080\",\n        SendTestNotification = false,\n        CustomData = \n        {\n            { \"data1\", \"value1\" },\n            { \"data2\", \"value2\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureNotificationChannelWebhook(ctx, \"sample-webhook\", \u0026sysdig.SecureNotificationChannelWebhookArgs{\n\t\t\tName:                 pulumi.String(\"Example Channel - Webhook\"),\n\t\t\tEnabled:              pulumi.Bool(true),\n\t\t\tUrl:                  pulumi.String(\"localhost:8080\"),\n\t\t\tSendTestNotification: pulumi.Bool(false),\n\t\t\tCustomData: pulumi.StringMap{\n\t\t\t\t\"data1\": pulumi.String(\"value1\"),\n\t\t\t\t\"data2\": pulumi.String(\"value2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureNotificationChannelWebhook;\nimport com.pulumi.sysdig.SecureNotificationChannelWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample_webhook = new SecureNotificationChannelWebhook(\"sample-webhook\", SecureNotificationChannelWebhookArgs.builder()\n            .name(\"Example Channel - Webhook\")\n            .enabled(true)\n            .url(\"localhost:8080\")\n            .sendTestNotification(false)\n            .customData(Map.ofEntries(\n                Map.entry(\"data1\", \"value1\"),\n                Map.entry(\"data2\", \"value2\")\n            ))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample-webhook:\n    type: sysdig:SecureNotificationChannelWebhook\n    properties:\n      name: Example Channel - Webhook\n      enabled: true\n      url: localhost:8080\n      sendTestNotification: false\n      customData:\n        data1: value1\n        data2: value2\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nWebhook notification channels for Secure can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureNotificationChannelWebhook:SecureNotificationChannelWebhook example 12345\n```\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"customData":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelWebhookTimeouts:SecureNotificationChannelWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object","required":["name","secureNotificationChannelWebhookId","url","version"],"inputProperties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"customData":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelWebhookTimeouts:SecureNotificationChannelWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"}},"requiredInputs":["url"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureNotificationChannelWebhook resources.\n","properties":{"additionalHeaders":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n"},"allowInsecureConnections":{"type":"boolean","description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"customData":{"type":"object","additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n"},"enabled":{"type":"boolean","description":"If false, the channel will not emit notifications. Default is true.\n"},"name":{"type":"string","description":"The name of the Notification Channel. Must be unique.\n"},"notifyWhenOk":{"type":"boolean","description":"Send a new notification when the alert condition is no longer triggered. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnResolve`\" pulumi-lang-dotnet=\"`NotifyOnResolve`\" pulumi-lang-go=\"`notifyOnResolve`\" pulumi-lang-python=\"`notify_on_resolve`\" pulumi-lang-yaml=\"`notifyOnResolve`\" pulumi-lang-java=\"`notifyOnResolve`\"\u003e`notify_on_resolve`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Send a new notification when the alert is manually acknowledged by a user. Default is \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e. This option is deprecated; use \u003cspan pulumi-lang-nodejs=\"`notifyOnAcknowledge`\" pulumi-lang-dotnet=\"`NotifyOnAcknowledge`\" pulumi-lang-go=\"`notifyOnAcknowledge`\" pulumi-lang-python=\"`notify_on_acknowledge`\" pulumi-lang-yaml=\"`notifyOnAcknowledge`\" pulumi-lang-java=\"`notifyOnAcknowledge`\"\u003e`notify_on_acknowledge`\u003c/span\u003e within the \u003cspan pulumi-lang-nodejs=\"`notificationChannels`\" pulumi-lang-dotnet=\"`NotificationChannels`\" pulumi-lang-go=\"`notificationChannels`\" pulumi-lang-python=\"`notification_channels`\" pulumi-lang-yaml=\"`notificationChannels`\" pulumi-lang-java=\"`notificationChannels`\"\u003e`notification_channels`\u003c/span\u003e options in the `sysdig_monitor_alert_v2_*` resources instead, which takes precedence over this setting. This option only applies to Monitor alerts when the channel is shared across all teams. It has no effect on Secure features.\n","deprecationMessage":"Deprecated"},"secureNotificationChannelWebhookId":{"type":"string","description":"(Computed) The ID of the Notification Channel.\n"},"sendTestNotification":{"type":"boolean","description":"Send an initial test notification to check\nif the notification channel is working. Default is false.\n"},"shareWithCurrentTeam":{"type":"boolean","description":"(Optional) If set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e it will share notification channel only with current team (in which user is logged in).\nOtherwise, it will share it with all teams, which is the default behaviour. Although this is an optional setting, beware that if you have lower permissions than admin you may see a `error: 403 Forbidden` if this is not set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureNotificationChannelWebhookTimeouts:SecureNotificationChannelWebhookTimeouts"},"url":{"type":"string","description":"URL to send the event.\n"},"version":{"type":"number","description":"(Computed) The current version of the Notification Channel.\n"}},"type":"object"}},"sysdig:index/secureOktaMlPolicy:SecureOktaMlPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst policy = new sysdig.SecureOktaMlPolicy(\"policy\", {\n    name: \"Test Okta ML Policy 1\",\n    description: \"Test Okta ML Policy Description\",\n    enabled: true,\n    severity: 4,\n    rules: [{\n        description: \"Test Okta ML Rule Description\",\n        anomalousConsoleLogin: {\n            enabled: true,\n            threshold: 1,\n        },\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\npolicy = sysdig.SecureOktaMlPolicy(\"policy\",\n    name=\"Test Okta ML Policy 1\",\n    description=\"Test Okta ML Policy Description\",\n    enabled=True,\n    severity=4,\n    rules=[{\n        \"description\": \"Test Okta ML Rule Description\",\n        \"anomalous_console_login\": {\n            \"enabled\": True,\n            \"threshold\": 1,\n        },\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var policy = new Sysdig.SecureOktaMlPolicy(\"policy\", new()\n    {\n        Name = \"Test Okta ML Policy 1\",\n        Description = \"Test Okta ML Policy Description\",\n        Enabled = true,\n        Severity = 4,\n        Rules = new[]\n        {\n            new Sysdig.Inputs.SecureOktaMlPolicyRuleArgs\n            {\n                Description = \"Test Okta ML Rule Description\",\n                AnomalousConsoleLogin = new Sysdig.Inputs.SecureOktaMlPolicyRuleAnomalousConsoleLoginArgs\n                {\n                    Enabled = true,\n                    Threshold = 1,\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureOktaMlPolicy(ctx, \"policy\", \u0026sysdig.SecureOktaMlPolicyArgs{\n\t\t\tName:        pulumi.String(\"Test Okta ML Policy 1\"),\n\t\t\tDescription: pulumi.String(\"Test Okta ML Policy Description\"),\n\t\t\tEnabled:     pulumi.Bool(true),\n\t\t\tSeverity:    pulumi.Float64(4),\n\t\t\tRules: sysdig.SecureOktaMlPolicyRuleArray{\n\t\t\t\t\u0026sysdig.SecureOktaMlPolicyRuleArgs{\n\t\t\t\t\tDescription: pulumi.String(\"Test Okta ML Rule Description\"),\n\t\t\t\t\tAnomalousConsoleLogin: \u0026sysdig.SecureOktaMlPolicyRuleAnomalousConsoleLoginArgs{\n\t\t\t\t\t\tEnabled:   pulumi.Bool(true),\n\t\t\t\t\t\tThreshold: pulumi.Float64(1),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureOktaMlPolicy;\nimport com.pulumi.sysdig.SecureOktaMlPolicyArgs;\nimport com.pulumi.sysdig.inputs.SecureOktaMlPolicyRuleArgs;\nimport com.pulumi.sysdig.inputs.SecureOktaMlPolicyRuleAnomalousConsoleLoginArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var policy = new SecureOktaMlPolicy(\"policy\", SecureOktaMlPolicyArgs.builder()\n            .name(\"Test Okta ML Policy 1\")\n            .description(\"Test Okta ML Policy Description\")\n            .enabled(true)\n            .severity(4.0)\n            .rules(SecureOktaMlPolicyRuleArgs.builder()\n                .description(\"Test Okta ML Rule Description\")\n                .anomalousConsoleLogin(SecureOktaMlPolicyRuleAnomalousConsoleLoginArgs.builder()\n                    .enabled(true)\n                    .threshold(1.0)\n                    .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  policy:\n    type: sysdig:SecureOktaMlPolicy\n    properties:\n      name: Test Okta ML Policy 1\n      description: Test Okta ML Policy Description\n      enabled: true\n      severity: 4\n      rules:\n        - description: Test Okta ML Rule Description\n          anomalousConsoleLogin:\n            enabled: true\n            threshold: 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyRule:SecureOktaMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureOktaMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyTimeouts:SecureOktaMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object","required":["description","name","rules","secureOktaMlPolicyId","version"],"inputProperties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyRule:SecureOktaMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureOktaMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyTimeouts:SecureOktaMlPolicyTimeouts"},"type":{"type":"string"}},"requiredInputs":["description","rules"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureOktaMlPolicy resources.\n","properties":{"description":{"type":"string","description":"(Required) Rule description.\n"},"enabled":{"type":"boolean","description":"(Optional) Whether anomaly detection is enabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"notificationChannels":{"type":"array","items":{"type":"number"},"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyRule:SecureOktaMlPolicyRule"}},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"scope":{"type":"string","description":"The application scope for the policy.\n"},"secureOktaMlPolicyId":{"type":"string","description":"The id for the policy.\n"},"severity":{"type":"number","description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureOktaMlPolicyTimeouts:SecureOktaMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"type":"object"}},"sysdig:index/secureOrganization:SecureOrganization":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureCloudAuthAccount(\"sample\", {\n    providerId: \"google_cloud_project_id\",\n    providerType: \"PROVIDER_GCP\",\n    enabled: true,\n});\nconst sampleSecureOrganization = new sysdig.SecureOrganization(\"sample\", {managementAccountId: sample.secureCloudAuthAccountId});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureCloudAuthAccount(\"sample\",\n    provider_id=\"google_cloud_project_id\",\n    provider_type=\"PROVIDER_GCP\",\n    enabled=True)\nsample_secure_organization = sysdig.SecureOrganization(\"sample\", management_account_id=sample.secure_cloud_auth_account_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureCloudAuthAccount(\"sample\", new()\n    {\n        ProviderId = \"google_cloud_project_id\",\n        ProviderType = \"PROVIDER_GCP\",\n        Enabled = true,\n    });\n\n    var sampleSecureOrganization = new Sysdig.SecureOrganization(\"sample\", new()\n    {\n        ManagementAccountId = sample.SecureCloudAuthAccountId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tsample, err := sysdig.NewSecureCloudAuthAccount(ctx, \"sample\", \u0026sysdig.SecureCloudAuthAccountArgs{\n\t\t\tProviderId:   pulumi.String(\"google_cloud_project_id\"),\n\t\t\tProviderType: pulumi.String(\"PROVIDER_GCP\"),\n\t\t\tEnabled:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureOrganization(ctx, \"sample\", \u0026sysdig.SecureOrganizationArgs{\n\t\t\tManagementAccountId: sample.SecureCloudAuthAccountId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureCloudAuthAccount;\nimport com.pulumi.sysdig.SecureCloudAuthAccountArgs;\nimport com.pulumi.sysdig.SecureOrganization;\nimport com.pulumi.sysdig.SecureOrganizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureCloudAuthAccount(\"sample\", SecureCloudAuthAccountArgs.builder()\n            .providerId(\"google_cloud_project_id\")\n            .providerType(\"PROVIDER_GCP\")\n            .enabled(true)\n            .build());\n\n        var sampleSecureOrganization = new SecureOrganization(\"sampleSecureOrganization\", SecureOrganizationArgs.builder()\n            .managementAccountId(sample.secureCloudAuthAccountId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureCloudAuthAccount\n    properties:\n      providerId: google_cloud_project_id\n      providerType: PROVIDER_GCP\n      enabled: 'true'\n  sampleSecureOrganization:\n    type: sysdig:SecureOrganization\n    name: sample\n    properties:\n      managementAccountId: ${sample.secureCloudAuthAccountId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"automaticOnboarding":{"type":"boolean","description":"Whether or not accounts in organization are to be detected automatically.\n"},"excludedCloudAccounts":{"type":"array","items":{"type":"string"},"description":"List of cloud accounts to exclude during onboarding.\n"},"excludedOrganizationalGroups":{"type":"array","items":{"type":"string"},"description":"List of organizational groups to exclude during onboarding.\n"},"includedCloudAccounts":{"type":"array","items":{"type":"string"},"description":"List of cloud accounts to include during onboarding.\n"},"includedOrganizationalGroups":{"type":"array","items":{"type":"string"},"description":"List of organizational groups to include during onboarding.\n"},"managementAccountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"organizationRootId":{"type":"string","description":"Organization's root id if available, else organization/tenant id.\n"},"organizationalUnitIds":{"type":"array","items":{"type":"string"},"description":"List of organizational unit identifiers from which to onboard. If empty, the entire organization is onboarded.\n"},"secureOrganizationId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureOrganizationTimeouts:SecureOrganizationTimeouts"}},"type":"object","required":["managementAccountId","secureOrganizationId"],"inputProperties":{"automaticOnboarding":{"type":"boolean","description":"Whether or not accounts in organization are to be detected automatically.\n"},"excludedCloudAccounts":{"type":"array","items":{"type":"string"},"description":"List of cloud accounts to exclude during onboarding.\n"},"excludedOrganizationalGroups":{"type":"array","items":{"type":"string"},"description":"List of organizational groups to exclude during onboarding.\n"},"includedCloudAccounts":{"type":"array","items":{"type":"string"},"description":"List of cloud accounts to include during onboarding.\n"},"includedOrganizationalGroups":{"type":"array","items":{"type":"string"},"description":"List of organizational groups to include during onboarding.\n"},"managementAccountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"organizationRootId":{"type":"string","description":"Organization's root id if available, else organization/tenant id.\n"},"organizationalUnitIds":{"type":"array","items":{"type":"string"},"description":"List of organizational unit identifiers from which to onboard. If empty, the entire organization is onboarded.\n"},"secureOrganizationId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureOrganizationTimeouts:SecureOrganizationTimeouts"}},"requiredInputs":["managementAccountId"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureOrganization resources.\n","properties":{"automaticOnboarding":{"type":"boolean","description":"Whether or not accounts in organization are to be detected automatically.\n"},"excludedCloudAccounts":{"type":"array","items":{"type":"string"},"description":"List of cloud accounts to exclude during onboarding.\n"},"excludedOrganizationalGroups":{"type":"array","items":{"type":"string"},"description":"List of organizational groups to exclude during onboarding.\n"},"includedCloudAccounts":{"type":"array","items":{"type":"string"},"description":"List of cloud accounts to include during onboarding.\n"},"includedOrganizationalGroups":{"type":"array","items":{"type":"string"},"description":"List of organizational groups to include during onboarding.\n"},"managementAccountId":{"type":"string","description":"Cloud Account created using resource sysdig_secure_cloud_auth_account.\n"},"organizationRootId":{"type":"string","description":"Organization's root id if available, else organization/tenant id.\n"},"organizationalUnitIds":{"type":"array","items":{"type":"string"},"description":"List of organizational unit identifiers from which to onboard. If empty, the entire organization is onboarded.\n"},"secureOrganizationId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureOrganizationTimeouts:SecureOrganizationTimeouts"}},"type":"object"}},"sysdig:index/securePostureAcceptRisk:SecurePostureAcceptRisk":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst acceptRiskGlobal = new sysdig.SecurePostureAcceptRisk(\"accept_risk_global\", {\n    description: \"Accept risk for zone\",\n    controlName: \"Network - Enabled Endpoint Private Access in Existing Clusters (EKS)\",\n    reason: \"Risk Transferred\",\n    expiresIn: \"30 Days\",\n    zoneName: \"Entire Infrastructure\",\n});\nconst acceptRiskResource = new sysdig.SecurePostureAcceptRisk(\"accept_risk_resource\", {\n    description: \"Accept risk for resource\",\n    controlName: \"Fargate - Untrusted Workloads\",\n    reason: \"Risk Transferred\",\n    expiresIn: \"30 Days\",\n    filter: \"name in (\\\"aws-int-01-cicd-aws-eks-workloads-shield\\\") and providerType in (\\\"AWS\\\") and kind in (\\\"AWS_EKS_CLUSTER\\\") and location in (\\\"us-east-1\\\")\",\n});\nconst schedulerSetToLoopbackBindAddress = new sysdig.SecurePostureAcceptRisk(\"scheduler_set_to_loopback_bind_address\", {\n    description: \"This is custom risk acceptance for scheduler_set_to_loopback_bind_address\",\n    controlName: \"Scheduler - Set to Loopback bind-address\",\n    reason: \"Custom\",\n    expiresIn: \"Custom\",\n    endTime: \"1730293523000\",\n    zoneName: \"Entire Infrastructure\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\naccept_risk_global = sysdig.SecurePostureAcceptRisk(\"accept_risk_global\",\n    description=\"Accept risk for zone\",\n    control_name=\"Network - Enabled Endpoint Private Access in Existing Clusters (EKS)\",\n    reason=\"Risk Transferred\",\n    expires_in=\"30 Days\",\n    zone_name=\"Entire Infrastructure\")\naccept_risk_resource = sysdig.SecurePostureAcceptRisk(\"accept_risk_resource\",\n    description=\"Accept risk for resource\",\n    control_name=\"Fargate - Untrusted Workloads\",\n    reason=\"Risk Transferred\",\n    expires_in=\"30 Days\",\n    filter=\"name in (\\\"aws-int-01-cicd-aws-eks-workloads-shield\\\") and providerType in (\\\"AWS\\\") and kind in (\\\"AWS_EKS_CLUSTER\\\") and location in (\\\"us-east-1\\\")\")\nscheduler_set_to_loopback_bind_address = sysdig.SecurePostureAcceptRisk(\"scheduler_set_to_loopback_bind_address\",\n    description=\"This is custom risk acceptance for scheduler_set_to_loopback_bind_address\",\n    control_name=\"Scheduler - Set to Loopback bind-address\",\n    reason=\"Custom\",\n    expires_in=\"Custom\",\n    end_time=\"1730293523000\",\n    zone_name=\"Entire Infrastructure\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var acceptRiskGlobal = new Sysdig.SecurePostureAcceptRisk(\"accept_risk_global\", new()\n    {\n        Description = \"Accept risk for zone\",\n        ControlName = \"Network - Enabled Endpoint Private Access in Existing Clusters (EKS)\",\n        Reason = \"Risk Transferred\",\n        ExpiresIn = \"30 Days\",\n        ZoneName = \"Entire Infrastructure\",\n    });\n\n    var acceptRiskResource = new Sysdig.SecurePostureAcceptRisk(\"accept_risk_resource\", new()\n    {\n        Description = \"Accept risk for resource\",\n        ControlName = \"Fargate - Untrusted Workloads\",\n        Reason = \"Risk Transferred\",\n        ExpiresIn = \"30 Days\",\n        Filter = \"name in (\\\"aws-int-01-cicd-aws-eks-workloads-shield\\\") and providerType in (\\\"AWS\\\") and kind in (\\\"AWS_EKS_CLUSTER\\\") and location in (\\\"us-east-1\\\")\",\n    });\n\n    var schedulerSetToLoopbackBindAddress = new Sysdig.SecurePostureAcceptRisk(\"scheduler_set_to_loopback_bind_address\", new()\n    {\n        Description = \"This is custom risk acceptance for scheduler_set_to_loopback_bind_address\",\n        ControlName = \"Scheduler - Set to Loopback bind-address\",\n        Reason = \"Custom\",\n        ExpiresIn = \"Custom\",\n        EndTime = \"1730293523000\",\n        ZoneName = \"Entire Infrastructure\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecurePostureAcceptRisk(ctx, \"accept_risk_global\", \u0026sysdig.SecurePostureAcceptRiskArgs{\n\t\t\tDescription: pulumi.String(\"Accept risk for zone\"),\n\t\t\tControlName: pulumi.String(\"Network - Enabled Endpoint Private Access in Existing Clusters (EKS)\"),\n\t\t\tReason:      pulumi.String(\"Risk Transferred\"),\n\t\t\tExpiresIn:   pulumi.String(\"30 Days\"),\n\t\t\tZoneName:    pulumi.String(\"Entire Infrastructure\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecurePostureAcceptRisk(ctx, \"accept_risk_resource\", \u0026sysdig.SecurePostureAcceptRiskArgs{\n\t\t\tDescription: pulumi.String(\"Accept risk for resource\"),\n\t\t\tControlName: pulumi.String(\"Fargate - Untrusted Workloads\"),\n\t\t\tReason:      pulumi.String(\"Risk Transferred\"),\n\t\t\tExpiresIn:   pulumi.String(\"30 Days\"),\n\t\t\tFilter:      pulumi.String(\"name in (\\\"aws-int-01-cicd-aws-eks-workloads-shield\\\") and providerType in (\\\"AWS\\\") and kind in (\\\"AWS_EKS_CLUSTER\\\") and location in (\\\"us-east-1\\\")\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecurePostureAcceptRisk(ctx, \"scheduler_set_to_loopback_bind_address\", \u0026sysdig.SecurePostureAcceptRiskArgs{\n\t\t\tDescription: pulumi.String(\"This is custom risk acceptance for scheduler_set_to_loopback_bind_address\"),\n\t\t\tControlName: pulumi.String(\"Scheduler - Set to Loopback bind-address\"),\n\t\t\tReason:      pulumi.String(\"Custom\"),\n\t\t\tExpiresIn:   pulumi.String(\"Custom\"),\n\t\t\tEndTime:     pulumi.String(\"1730293523000\"),\n\t\t\tZoneName:    pulumi.String(\"Entire Infrastructure\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecurePostureAcceptRisk;\nimport com.pulumi.sysdig.SecurePostureAcceptRiskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var acceptRiskGlobal = new SecurePostureAcceptRisk(\"acceptRiskGlobal\", SecurePostureAcceptRiskArgs.builder()\n            .description(\"Accept risk for zone\")\n            .controlName(\"Network - Enabled Endpoint Private Access in Existing Clusters (EKS)\")\n            .reason(\"Risk Transferred\")\n            .expiresIn(\"30 Days\")\n            .zoneName(\"Entire Infrastructure\")\n            .build());\n\n        var acceptRiskResource = new SecurePostureAcceptRisk(\"acceptRiskResource\", SecurePostureAcceptRiskArgs.builder()\n            .description(\"Accept risk for resource\")\n            .controlName(\"Fargate - Untrusted Workloads\")\n            .reason(\"Risk Transferred\")\n            .expiresIn(\"30 Days\")\n            .filter(\"name in (\\\"aws-int-01-cicd-aws-eks-workloads-shield\\\") and providerType in (\\\"AWS\\\") and kind in (\\\"AWS_EKS_CLUSTER\\\") and location in (\\\"us-east-1\\\")\")\n            .build());\n\n        var schedulerSetToLoopbackBindAddress = new SecurePostureAcceptRisk(\"schedulerSetToLoopbackBindAddress\", SecurePostureAcceptRiskArgs.builder()\n            .description(\"This is custom risk acceptance for scheduler_set_to_loopback_bind_address\")\n            .controlName(\"Scheduler - Set to Loopback bind-address\")\n            .reason(\"Custom\")\n            .expiresIn(\"Custom\")\n            .endTime(\"1730293523000\")\n            .zoneName(\"Entire Infrastructure\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  acceptRiskGlobal:\n    type: sysdig:SecurePostureAcceptRisk\n    name: accept_risk_global\n    properties:\n      description: Accept risk for zone\n      controlName: Network - Enabled Endpoint Private Access in Existing Clusters (EKS)\n      reason: Risk Transferred\n      expiresIn: 30 Days\n      zoneName: Entire Infrastructure\n  acceptRiskResource:\n    type: sysdig:SecurePostureAcceptRisk\n    name: accept_risk_resource\n    properties:\n      description: Accept risk for resource\n      controlName: Fargate - Untrusted Workloads\n      reason: Risk Transferred\n      expiresIn: 30 Days\n      filter: name in (\"aws-int-01-cicd-aws-eks-workloads-shield\") and providerType in (\"AWS\") and kind in (\"AWS_EKS_CLUSTER\") and location in (\"us-east-1\")\n  schedulerSetToLoopbackBindAddress:\n    type: sysdig:SecurePostureAcceptRisk\n    name: scheduler_set_to_loopback_bind_address\n    properties:\n      description: This is custom risk acceptance for scheduler_set_to_loopback_bind_address\n      controlName: Scheduler - Set to Loopback bind-address\n      reason: Custom\n      expiresIn: Custom\n      endTime: '1730293523000'\n      zoneName: Entire Infrastructure\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nPosture accept risk can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/securePostureAcceptRisk:SecurePostureAcceptRisk example c 12345\n```\n\n","properties":{"acceptPeriod":{"type":"string"},"acceptanceDate":{"type":"number"},"controlName":{"type":"string","description":"The name of the posture control being accepted.\n"},"description":{"type":"string","description":"A description of the risk acceptance.\n"},"endTime":{"type":"string"},"expiresAt":{"type":"string"},"expiresIn":{"type":"string"},"filter":{"type":"string","description":"A filter for identifying the resources affected by the acceptance.\n"},"isExpired":{"type":"boolean"},"isSystem":{"type":"boolean"},"reason":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureAcceptRiskTimeouts:SecurePostureAcceptRiskTimeouts"},"type":{"type":"string"},"username":{"type":"string"},"zoneName":{"type":"string","description":"The zone associated with the risk acceptance.\n"}},"type":"object","required":["acceptPeriod","acceptanceDate","controlName","description","expiresAt","expiresIn","isExpired","isSystem","reason","type","username"],"inputProperties":{"controlName":{"type":"string","description":"The name of the posture control being accepted.\n"},"description":{"type":"string","description":"A description of the risk acceptance.\n"},"endTime":{"type":"string"},"expiresIn":{"type":"string"},"filter":{"type":"string","description":"A filter for identifying the resources affected by the acceptance.\n"},"reason":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureAcceptRiskTimeouts:SecurePostureAcceptRiskTimeouts"},"zoneName":{"type":"string","description":"The zone associated with the risk acceptance.\n"}},"requiredInputs":["controlName","description","expiresIn","reason"],"stateInputs":{"description":"Input properties used for looking up and filtering SecurePostureAcceptRisk resources.\n","properties":{"acceptPeriod":{"type":"string"},"acceptanceDate":{"type":"number"},"controlName":{"type":"string","description":"The name of the posture control being accepted.\n"},"description":{"type":"string","description":"A description of the risk acceptance.\n"},"endTime":{"type":"string"},"expiresAt":{"type":"string"},"expiresIn":{"type":"string"},"filter":{"type":"string","description":"A filter for identifying the resources affected by the acceptance.\n"},"isExpired":{"type":"boolean"},"isSystem":{"type":"boolean"},"reason":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureAcceptRiskTimeouts:SecurePostureAcceptRiskTimeouts"},"type":{"type":"string"},"username":{"type":"string"},"zoneName":{"type":"string","description":"The zone associated with the risk acceptance.\n"}},"type":"object"}},"sysdig:index/securePostureControl:SecurePostureControl":{"description":"## Example Usage\n\n## Import\n\nPosture custom control can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/securePostureControl:SecurePostureControl example 12345\n```\n","properties":{"description":{"type":"string","description":"The description of the Posture Control, eg. `EC2 - Instances should not have a public IP address`\n"},"name":{"type":"string","description":"The name of the Posture Control. The name must be unique, e.g. `EC2 - Instances should not have a public IP address`\n"},"rego":{"type":"string","description":"The Posture control Rego. `package sysdig\\ndefault risky = false\\nrisky {\\n    input.NetworkInterfaces[_].Association.PublicIp\\n    input.      NetworkInterfaces[_].Association.PublicIp != \\\"\\\"\\n}`\n"},"remediationDetails":{"type":"string","description":"The Posture control Remediation details. `Use a non-default VPC so that your instance is not assigned a public IP address by default`\n"},"resourceKind":{"type":"string","description":"The resource type this control evaluates. Must be a supported resource kind string matching\na resource type in the Sysdig CSPM inventory. The format varies by platform:\n\n- **AWS**: `AWS_S3_BUCKET`, `AWS_EC2_INSTANCE`, `AWS_IAM_ROLE`, `AWS_LAMBDA_FUNCTION`, ...\n- **GCP**: `GCP_STORAGE_GOOGLEAPIS_COM_BUCKET`, `GCP_COMPUTE_GOOGLEAPIS_COM_INSTANCE`, ...\n- **Azure**: `AZURE_MICROSOFT_COMPUTE_VIRTUALMACHINES`, `AZURE_MICROSOFT_STORAGE_STORAGEACCOUNTS`, ...\n- **Kubernetes**: `DEPLOYMENT`, `SERVICE`, `NAMESPACE`, `CLUSTERROLE`, ...\n- **IBM Cloud**: `IBM_USER-MANAGEMENT_USER`, `IBM_IS_VPC_INSTANCE`, `IBM_CLOUD-OBJECT-STORAGE_BUCKET`, ...\n- **Host** (Linux/Windows/Docker): \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e\n\nTo list all valid values, query the CSPM API:\n```\nGET /api/cspm/v1/policy/controls/resource-template/kinds\n```\nSee the [Sysdig API Swagger docs](https://docs.sysdig.com/en/docs/developer-tools/sysdig-api/#swagger-documentation) and\nthe [posture controls API documentation](https://docs.sysdig.com/en/sysdig-secure/posture_controls/#sysdig-api-endpoint) for more details.\n"},"severity":{"type":"string","description":"The Posture Control Severity [`High`, `Medium`, `Low`], case sensitive, e.g., `High`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureControlTimeouts:SecurePostureControlTimeouts"}},"type":"object","required":["description","name","rego","remediationDetails","resourceKind","severity"],"inputProperties":{"description":{"type":"string","description":"The description of the Posture Control, eg. `EC2 - Instances should not have a public IP address`\n"},"name":{"type":"string","description":"The name of the Posture Control. The name must be unique, e.g. `EC2 - Instances should not have a public IP address`\n"},"rego":{"type":"string","description":"The Posture control Rego. `package sysdig\\ndefault risky = false\\nrisky {\\n    input.NetworkInterfaces[_].Association.PublicIp\\n    input.      NetworkInterfaces[_].Association.PublicIp != \\\"\\\"\\n}`\n"},"remediationDetails":{"type":"string","description":"The Posture control Remediation details. `Use a non-default VPC so that your instance is not assigned a public IP address by default`\n"},"resourceKind":{"type":"string","description":"The resource type this control evaluates. Must be a supported resource kind string matching\na resource type in the Sysdig CSPM inventory. The format varies by platform:\n\n- **AWS**: `AWS_S3_BUCKET`, `AWS_EC2_INSTANCE`, `AWS_IAM_ROLE`, `AWS_LAMBDA_FUNCTION`, ...\n- **GCP**: `GCP_STORAGE_GOOGLEAPIS_COM_BUCKET`, `GCP_COMPUTE_GOOGLEAPIS_COM_INSTANCE`, ...\n- **Azure**: `AZURE_MICROSOFT_COMPUTE_VIRTUALMACHINES`, `AZURE_MICROSOFT_STORAGE_STORAGEACCOUNTS`, ...\n- **Kubernetes**: `DEPLOYMENT`, `SERVICE`, `NAMESPACE`, `CLUSTERROLE`, ...\n- **IBM Cloud**: `IBM_USER-MANAGEMENT_USER`, `IBM_IS_VPC_INSTANCE`, `IBM_CLOUD-OBJECT-STORAGE_BUCKET`, ...\n- **Host** (Linux/Windows/Docker): \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e\n\nTo list all valid values, query the CSPM API:\n```\nGET /api/cspm/v1/policy/controls/resource-template/kinds\n```\nSee the [Sysdig API Swagger docs](https://docs.sysdig.com/en/docs/developer-tools/sysdig-api/#swagger-documentation) and\nthe [posture controls API documentation](https://docs.sysdig.com/en/sysdig-secure/posture_controls/#sysdig-api-endpoint) for more details.\n"},"severity":{"type":"string","description":"The Posture Control Severity [`High`, `Medium`, `Low`], case sensitive, e.g., `High`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureControlTimeouts:SecurePostureControlTimeouts"}},"requiredInputs":["description","rego","remediationDetails","resourceKind","severity"],"stateInputs":{"description":"Input properties used for looking up and filtering SecurePostureControl resources.\n","properties":{"description":{"type":"string","description":"The description of the Posture Control, eg. `EC2 - Instances should not have a public IP address`\n"},"name":{"type":"string","description":"The name of the Posture Control. The name must be unique, e.g. `EC2 - Instances should not have a public IP address`\n"},"rego":{"type":"string","description":"The Posture control Rego. `package sysdig\\ndefault risky = false\\nrisky {\\n    input.NetworkInterfaces[_].Association.PublicIp\\n    input.      NetworkInterfaces[_].Association.PublicIp != \\\"\\\"\\n}`\n"},"remediationDetails":{"type":"string","description":"The Posture control Remediation details. `Use a non-default VPC so that your instance is not assigned a public IP address by default`\n"},"resourceKind":{"type":"string","description":"The resource type this control evaluates. Must be a supported resource kind string matching\na resource type in the Sysdig CSPM inventory. The format varies by platform:\n\n- **AWS**: `AWS_S3_BUCKET`, `AWS_EC2_INSTANCE`, `AWS_IAM_ROLE`, `AWS_LAMBDA_FUNCTION`, ...\n- **GCP**: `GCP_STORAGE_GOOGLEAPIS_COM_BUCKET`, `GCP_COMPUTE_GOOGLEAPIS_COM_INSTANCE`, ...\n- **Azure**: `AZURE_MICROSOFT_COMPUTE_VIRTUALMACHINES`, `AZURE_MICROSOFT_STORAGE_STORAGEACCOUNTS`, ...\n- **Kubernetes**: `DEPLOYMENT`, `SERVICE`, `NAMESPACE`, `CLUSTERROLE`, ...\n- **IBM Cloud**: `IBM_USER-MANAGEMENT_USER`, `IBM_IS_VPC_INSTANCE`, `IBM_CLOUD-OBJECT-STORAGE_BUCKET`, ...\n- **Host** (Linux/Windows/Docker): \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e\n\nTo list all valid values, query the CSPM API:\n```\nGET /api/cspm/v1/policy/controls/resource-template/kinds\n```\nSee the [Sysdig API Swagger docs](https://docs.sysdig.com/en/docs/developer-tools/sysdig-api/#swagger-documentation) and\nthe [posture controls API documentation](https://docs.sysdig.com/en/sysdig-secure/posture_controls/#sysdig-api-endpoint) for more details.\n"},"severity":{"type":"string","description":"The Posture Control Severity [`High`, `Medium`, `Low`], case sensitive, e.g., `High`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureControlTimeouts:SecurePostureControlTimeouts"}},"type":"object"}},"sysdig:index/securePosturePolicy:SecurePosturePolicy":{"description":"## Example Usage\n\n## Import\n\nPosture policy can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/securePosturePolicy:SecurePosturePolicy example p 12345\n```\n\n","properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroup:SecurePosturePolicyGroup"},"description":"Group block defines list of groups attached to Policy\n"},"isActive":{"type":"boolean"},"link":{"type":"string","description":"Policy link\n"},"maxKubeVersion":{"type":"number"},"minKubeVersion":{"type":"number"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"platform":{"type":"string"},"targets":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyTarget:SecurePosturePolicyTarget"},"description":"Specifies target platforms and version ranges. This field should replace Platform, MinKubeVersion, and MaxKubeVersion for more flexible and detailed policy descriptions.\n\nNote: The fields Platform, MinKubeVersion, and MaxKubeVersion will be deprecated in the future. We recommend using the targets field now to describe policy platform and version constraints\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyTimeouts:SecurePosturePolicyTimeouts"},"type":{"type":"string","description":"Policy type:\n- AWS - \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e\n- GCP - \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e\n- Azure - \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n- Kubernetes - \u003cspan pulumi-lang-nodejs=\"`kubernetes`\" pulumi-lang-dotnet=\"`Kubernetes`\" pulumi-lang-go=\"`kubernetes`\" pulumi-lang-python=\"`kubernetes`\" pulumi-lang-yaml=\"`kubernetes`\" pulumi-lang-java=\"`kubernetes`\"\u003e`kubernetes`\u003c/span\u003e\n- Linux - \u003cspan pulumi-lang-nodejs=\"`linux`\" pulumi-lang-dotnet=\"`Linux`\" pulumi-lang-go=\"`linux`\" pulumi-lang-python=\"`linux`\" pulumi-lang-yaml=\"`linux`\" pulumi-lang-java=\"`linux`\"\u003e`linux`\u003c/span\u003e\n- Docker - \u003cspan pulumi-lang-nodejs=\"`docker`\" pulumi-lang-dotnet=\"`Docker`\" pulumi-lang-go=\"`docker`\" pulumi-lang-python=\"`docker`\" pulumi-lang-yaml=\"`docker`\" pulumi-lang-java=\"`docker`\"\u003e`docker`\u003c/span\u003e\n- OCI - \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e\n"}},"type":"object","required":["description","name"],"inputProperties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroup:SecurePosturePolicyGroup"},"description":"Group block defines list of groups attached to Policy\n"},"isActive":{"type":"boolean"},"link":{"type":"string","description":"Policy link\n"},"maxKubeVersion":{"type":"number"},"minKubeVersion":{"type":"number"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"platform":{"type":"string"},"targets":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyTarget:SecurePosturePolicyTarget"},"description":"Specifies target platforms and version ranges. This field should replace Platform, MinKubeVersion, and MaxKubeVersion for more flexible and detailed policy descriptions.\n\nNote: The fields Platform, MinKubeVersion, and MaxKubeVersion will be deprecated in the future. We recommend using the targets field now to describe policy platform and version constraints\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyTimeouts:SecurePosturePolicyTimeouts"},"type":{"type":"string","description":"Policy type:\n- AWS - \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e\n- GCP - \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e\n- Azure - \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n- Kubernetes - \u003cspan pulumi-lang-nodejs=\"`kubernetes`\" pulumi-lang-dotnet=\"`Kubernetes`\" pulumi-lang-go=\"`kubernetes`\" pulumi-lang-python=\"`kubernetes`\" pulumi-lang-yaml=\"`kubernetes`\" pulumi-lang-java=\"`kubernetes`\"\u003e`kubernetes`\u003c/span\u003e\n- Linux - \u003cspan pulumi-lang-nodejs=\"`linux`\" pulumi-lang-dotnet=\"`Linux`\" pulumi-lang-go=\"`linux`\" pulumi-lang-python=\"`linux`\" pulumi-lang-yaml=\"`linux`\" pulumi-lang-java=\"`linux`\"\u003e`linux`\u003c/span\u003e\n- Docker - \u003cspan pulumi-lang-nodejs=\"`docker`\" pulumi-lang-dotnet=\"`Docker`\" pulumi-lang-go=\"`docker`\" pulumi-lang-python=\"`docker`\" pulumi-lang-yaml=\"`docker`\" pulumi-lang-java=\"`docker`\"\u003e`docker`\u003c/span\u003e\n- OCI - \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e\n"}},"requiredInputs":["description"],"stateInputs":{"description":"Input properties used for looking up and filtering SecurePosturePolicy resources.\n","properties":{"description":{"type":"string","description":"The description of the Posture Poliy,  eg. `CIS Docker Benchmark`\n"},"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyGroup:SecurePosturePolicyGroup"},"description":"Group block defines list of groups attached to Policy\n"},"isActive":{"type":"boolean"},"link":{"type":"string","description":"Policy link\n"},"maxKubeVersion":{"type":"number"},"minKubeVersion":{"type":"number"},"name":{"type":"string","description":"The name of the Posture Policy, eg. `CIS Docker Benchmark`\n"},"platform":{"type":"string"},"targets":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyTarget:SecurePosturePolicyTarget"},"description":"Specifies target platforms and version ranges. This field should replace Platform, MinKubeVersion, and MaxKubeVersion for more flexible and detailed policy descriptions.\n\nNote: The fields Platform, MinKubeVersion, and MaxKubeVersion will be deprecated in the future. We recommend using the targets field now to describe policy platform and version constraints\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePosturePolicyTimeouts:SecurePosturePolicyTimeouts"},"type":{"type":"string","description":"Policy type:\n- AWS - \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e\n- GCP - \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e\n- Azure - \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n- Kubernetes - \u003cspan pulumi-lang-nodejs=\"`kubernetes`\" pulumi-lang-dotnet=\"`Kubernetes`\" pulumi-lang-go=\"`kubernetes`\" pulumi-lang-python=\"`kubernetes`\" pulumi-lang-yaml=\"`kubernetes`\" pulumi-lang-java=\"`kubernetes`\"\u003e`kubernetes`\u003c/span\u003e\n- Linux - \u003cspan pulumi-lang-nodejs=\"`linux`\" pulumi-lang-dotnet=\"`Linux`\" pulumi-lang-go=\"`linux`\" pulumi-lang-python=\"`linux`\" pulumi-lang-yaml=\"`linux`\" pulumi-lang-java=\"`linux`\"\u003e`linux`\u003c/span\u003e\n- Docker - \u003cspan pulumi-lang-nodejs=\"`docker`\" pulumi-lang-dotnet=\"`Docker`\" pulumi-lang-go=\"`docker`\" pulumi-lang-python=\"`docker`\" pulumi-lang-yaml=\"`docker`\" pulumi-lang-java=\"`docker`\"\u003e`docker`\u003c/span\u003e\n- OCI - \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e\n"}},"type":"object"}},"sysdig:index/securePostureZone:SecurePostureZone":{"description":"## Example Usage\n\n## Import\n\nPosture zone can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/securePostureZone:SecurePostureZone example 12345\n```\n","properties":{"author":{"type":"string","description":"(Computed) The zone author.\n"},"description":{"type":"string","description":"The description of the Posture Zone.\n"},"lastModifiedBy":{"type":"string","description":"(Computed) By whom is last modification made.\n"},"lastUpdated":{"type":"string","description":"(Computed) Timestamp of last modification of zone.\n"},"name":{"type":"string","description":"The name of the Posture Zone.\n"},"policyIds":{"type":"array","items":{"type":"number"},"description":"The list of Posture Policy IDs attached to Zone.\n"},"scopes":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneScopes:SecurePostureZoneScopes","description":"Scopes block defines list of scopes attached to Zone.\n"},"securePostureZoneId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneTimeouts:SecurePostureZoneTimeouts"}},"type":"object","required":["author","lastModifiedBy","lastUpdated","name","securePostureZoneId"],"inputProperties":{"description":{"type":"string","description":"The description of the Posture Zone.\n"},"name":{"type":"string","description":"The name of the Posture Zone.\n"},"policyIds":{"type":"array","items":{"type":"number"},"description":"The list of Posture Policy IDs attached to Zone.\n"},"scopes":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneScopes:SecurePostureZoneScopes","description":"Scopes block defines list of scopes attached to Zone.\n"},"securePostureZoneId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneTimeouts:SecurePostureZoneTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecurePostureZone resources.\n","properties":{"author":{"type":"string","description":"(Computed) The zone author.\n"},"description":{"type":"string","description":"The description of the Posture Zone.\n"},"lastModifiedBy":{"type":"string","description":"(Computed) By whom is last modification made.\n"},"lastUpdated":{"type":"string","description":"(Computed) Timestamp of last modification of zone.\n"},"name":{"type":"string","description":"The name of the Posture Zone.\n"},"policyIds":{"type":"array","items":{"type":"number"},"description":"The list of Posture Policy IDs attached to Zone.\n"},"scopes":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneScopes:SecurePostureZoneScopes","description":"Scopes block defines list of scopes attached to Zone.\n"},"securePostureZoneId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecurePostureZoneTimeouts:SecurePostureZoneTimeouts"}},"type":"object"}},"sysdig:index/secureRuleContainer:SecureRuleContainer":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureRuleContainer(\"sample\", {\n    name: \"Nginx container spawned\",\n    description: \"A container withthe nginx image spawned in the cluster.\",\n    tags: [\n        \"container\",\n        \"cis\",\n    ],\n    matching: true,\n    containers: [\"nginx\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureRuleContainer(\"sample\",\n    name=\"Nginx container spawned\",\n    description=\"A container withthe nginx image spawned in the cluster.\",\n    tags=[\n        \"container\",\n        \"cis\",\n    ],\n    matching=True,\n    containers=[\"nginx\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureRuleContainer(\"sample\", new()\n    {\n        Name = \"Nginx container spawned\",\n        Description = \"A container withthe nginx image spawned in the cluster.\",\n        Tags = new[]\n        {\n            \"container\",\n            \"cis\",\n        },\n        Matching = true,\n        Containers = new[]\n        {\n            \"nginx\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureRuleContainer(ctx, \"sample\", \u0026sysdig.SecureRuleContainerArgs{\n\t\t\tName:        pulumi.String(\"Nginx container spawned\"),\n\t\t\tDescription: pulumi.String(\"A container withthe nginx image spawned in the cluster.\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"container\"),\n\t\t\t\tpulumi.String(\"cis\"),\n\t\t\t},\n\t\t\tMatching: pulumi.Bool(true),\n\t\t\tContainers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"nginx\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleContainer;\nimport com.pulumi.sysdig.SecureRuleContainerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureRuleContainer(\"sample\", SecureRuleContainerArgs.builder()\n            .name(\"Nginx container spawned\")\n            .description(\"A container withthe nginx image spawned in the cluster.\")\n            .tags(            \n                \"container\",\n                \"cis\")\n            .matching(true)\n            .containers(\"nginx\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureRuleContainer\n    properties:\n      name: Nginx container spawned\n      description: A container withthe nginx image spawned in the cluster.\n      tags:\n        - container\n        - cis\n      matching: true # default\n      containers:\n        - nginx\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure container runtime rules can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureRuleContainer:SecureRuleContainer example 12345\n```\n","properties":{"containers":{"type":"array","items":{"type":"string"}},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleContainerId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleContainerTimeouts:SecureRuleContainerTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["name","secureRuleContainerId","version"],"inputProperties":{"containers":{"type":"array","items":{"type":"string"}},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleContainerId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleContainerTimeouts:SecureRuleContainerTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleContainer resources.\n","properties":{"containers":{"type":"array","items":{"type":"string"}},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleContainerId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleContainerTimeouts:SecureRuleContainerTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureRuleFalco:SecureRuleFalco":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.SecureRuleFalco(\"example\", {\n    name: \"Terminal shell in container\",\n    description: \"A shell was used as the entrypoint/exec point into a container with an attached terminal.\",\n    tags: [\n        \"container\",\n        \"shell\",\n        \"mitre_execution\",\n    ],\n    condition: \"spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint\",\n    output: \"A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)\",\n    priority: \"notice\",\n    source: \"syscall\",\n    exceptions: [\n        {\n            name: \"proc_names\",\n            fields: [\"proc.name\"],\n            comps: [\"in\"],\n            values: JSON.stringify([[[\n                \"python\",\n                \"python2\",\n                \"python3\",\n            ]]]),\n        },\n        {\n            name: \"container_proc_name\",\n            fields: [\n                \"container.id\",\n                \"proc.name\",\n            ],\n            comps: [\n                \"=\",\n                \"in\",\n            ],\n            values: JSON.stringify([[\n                \"host\",\n                [\n                    \"docker_binaries\",\n                    \"k8s_binaries\",\n                    \"lxd_binaries\",\n                    \"nsenter\",\n                ],\n            ]]),\n        },\n        {\n            name: \"proc_cmdline\",\n            fields: [\n                \"proc.name\",\n                \"proc.cmdline\",\n            ],\n            comps: [\n                \"in\",\n                \"contains\",\n            ],\n            values: JSON.stringify([\n                [\n                    [\n                        \"python\",\n                        \"python2\",\n                        \"python3\",\n                    ],\n                    \"/opt/draios/bin/sdchecks\",\n                ],\n                [\n                    [\"java\"],\n                    \"sdjagent.jar\",\n                ],\n            ]),\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.SecureRuleFalco(\"example\",\n    name=\"Terminal shell in container\",\n    description=\"A shell was used as the entrypoint/exec point into a container with an attached terminal.\",\n    tags=[\n        \"container\",\n        \"shell\",\n        \"mitre_execution\",\n    ],\n    condition=\"spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint\",\n    output=\"A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)\",\n    priority=\"notice\",\n    source=\"syscall\",\n    exceptions=[\n        {\n            \"name\": \"proc_names\",\n            \"fields\": [\"proc.name\"],\n            \"comps\": [\"in\"],\n            \"values\": json.dumps([[[\n                \"python\",\n                \"python2\",\n                \"python3\",\n            ]]]),\n        },\n        {\n            \"name\": \"container_proc_name\",\n            \"fields\": [\n                \"container.id\",\n                \"proc.name\",\n            ],\n            \"comps\": [\n                \"=\",\n                \"in\",\n            ],\n            \"values\": json.dumps([[\n                \"host\",\n                [\n                    \"docker_binaries\",\n                    \"k8s_binaries\",\n                    \"lxd_binaries\",\n                    \"nsenter\",\n                ],\n            ]]),\n        },\n        {\n            \"name\": \"proc_cmdline\",\n            \"fields\": [\n                \"proc.name\",\n                \"proc.cmdline\",\n            ],\n            \"comps\": [\n                \"in\",\n                \"contains\",\n            ],\n            \"values\": json.dumps([\n                [\n                    [\n                        \"python\",\n                        \"python2\",\n                        \"python3\",\n                    ],\n                    \"/opt/draios/bin/sdchecks\",\n                ],\n                [\n                    [\"java\"],\n                    \"sdjagent.jar\",\n                ],\n            ]),\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.SecureRuleFalco(\"example\", new()\n    {\n        Name = \"Terminal shell in container\",\n        Description = \"A shell was used as the entrypoint/exec point into a container with an attached terminal.\",\n        Tags = new[]\n        {\n            \"container\",\n            \"shell\",\n            \"mitre_execution\",\n        },\n        Condition = \"spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint\",\n        Output = \"A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)\",\n        Priority = \"notice\",\n        Source = \"syscall\",\n        Exceptions = new[]\n        {\n            new Sysdig.Inputs.SecureRuleFalcoExceptionArgs\n            {\n                Name = \"proc_names\",\n                Fields = new[]\n                {\n                    \"proc.name\",\n                },\n                Comps = new[]\n                {\n                    \"in\",\n                },\n                Values = JsonSerializer.Serialize(new[]\n                {\n                    new[]\n                    {\n                        new[]\n                        {\n                            \"python\",\n                            \"python2\",\n                            \"python3\",\n                        },\n                    },\n                }),\n            },\n            new Sysdig.Inputs.SecureRuleFalcoExceptionArgs\n            {\n                Name = \"container_proc_name\",\n                Fields = new[]\n                {\n                    \"container.id\",\n                    \"proc.name\",\n                },\n                Comps = new[]\n                {\n                    \"=\",\n                    \"in\",\n                },\n                Values = JsonSerializer.Serialize(new[]\n                {\n                    new object?[]\n                    {\n                        \"host\",\n                        new[]\n                        {\n                            \"docker_binaries\",\n                            \"k8s_binaries\",\n                            \"lxd_binaries\",\n                            \"nsenter\",\n                        },\n                    },\n                }),\n            },\n            new Sysdig.Inputs.SecureRuleFalcoExceptionArgs\n            {\n                Name = \"proc_cmdline\",\n                Fields = new[]\n                {\n                    \"proc.name\",\n                    \"proc.cmdline\",\n                },\n                Comps = new[]\n                {\n                    \"in\",\n                    \"contains\",\n                },\n                Values = JsonSerializer.Serialize(new object?[]\n                {\n                    new object?[]\n                    {\n                        new[]\n                        {\n                            \"python\",\n                            \"python2\",\n                            \"python3\",\n                        },\n                        \"/opt/draios/bin/sdchecks\",\n                    },\n                    new object?[]\n                    {\n                        new[]\n                        {\n                            \"java\",\n                        },\n                        \"sdjagent.jar\",\n                    },\n                }),\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttmpJSON0, err := json.Marshal([][][]string{\n\t\t\t[][]string{\n\t\t\t\t[]string{\n\t\t\t\t\t\"python\",\n\t\t\t\t\t\"python2\",\n\t\t\t\t\t\"python3\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\ttmpJSON1, err := json.Marshal([][]interface{}{\n\t\t\t[]interface{}{\n\t\t\t\t\"host\",\n\t\t\t\t[]string{\n\t\t\t\t\t\"docker_binaries\",\n\t\t\t\t\t\"k8s_binaries\",\n\t\t\t\t\t\"lxd_binaries\",\n\t\t\t\t\t\"nsenter\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\ttmpJSON2, err := json.Marshal([]interface{}{\n\t\t\t[]interface{}{\n\t\t\t\t[]string{\n\t\t\t\t\t\"python\",\n\t\t\t\t\t\"python2\",\n\t\t\t\t\t\"python3\",\n\t\t\t\t},\n\t\t\t\t\"/opt/draios/bin/sdchecks\",\n\t\t\t},\n\t\t\t[]interface{}{\n\t\t\t\t[]string{\n\t\t\t\t\t\"java\",\n\t\t\t\t},\n\t\t\t\t\"sdjagent.jar\",\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson2 := string(tmpJSON2)\n\t\t_, err = sysdig.NewSecureRuleFalco(ctx, \"example\", \u0026sysdig.SecureRuleFalcoArgs{\n\t\t\tName:        pulumi.String(\"Terminal shell in container\"),\n\t\t\tDescription: pulumi.String(\"A shell was used as the entrypoint/exec point into a container with an attached terminal.\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"container\"),\n\t\t\t\tpulumi.String(\"shell\"),\n\t\t\t\tpulumi.String(\"mitre_execution\"),\n\t\t\t},\n\t\t\tCondition: pulumi.String(\"spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint\"),\n\t\t\tOutput:    pulumi.String(\"A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)\"),\n\t\t\tPriority:  pulumi.String(\"notice\"),\n\t\t\tSource:    pulumi.String(\"syscall\"),\n\t\t\tExceptions: sysdig.SecureRuleFalcoExceptionArray{\n\t\t\t\t\u0026sysdig.SecureRuleFalcoExceptionArgs{\n\t\t\t\t\tName: pulumi.String(\"proc_names\"),\n\t\t\t\t\tFields: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"proc.name\"),\n\t\t\t\t\t},\n\t\t\t\t\tComps: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"in\"),\n\t\t\t\t\t},\n\t\t\t\t\tValues: pulumi.String(json0),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureRuleFalcoExceptionArgs{\n\t\t\t\t\tName: pulumi.String(\"container_proc_name\"),\n\t\t\t\t\tFields: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"container.id\"),\n\t\t\t\t\t\tpulumi.String(\"proc.name\"),\n\t\t\t\t\t},\n\t\t\t\t\tComps: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"=\"),\n\t\t\t\t\t\tpulumi.String(\"in\"),\n\t\t\t\t\t},\n\t\t\t\t\tValues: pulumi.String(json1),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureRuleFalcoExceptionArgs{\n\t\t\t\t\tName: pulumi.String(\"proc_cmdline\"),\n\t\t\t\t\tFields: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"proc.name\"),\n\t\t\t\t\t\tpulumi.String(\"proc.cmdline\"),\n\t\t\t\t\t},\n\t\t\t\t\tComps: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"in\"),\n\t\t\t\t\t\tpulumi.String(\"contains\"),\n\t\t\t\t\t},\n\t\t\t\t\tValues: pulumi.String(json2),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleFalco;\nimport com.pulumi.sysdig.SecureRuleFalcoArgs;\nimport com.pulumi.sysdig.inputs.SecureRuleFalcoExceptionArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new SecureRuleFalco(\"example\", SecureRuleFalcoArgs.builder()\n            .name(\"Terminal shell in container\")\n            .description(\"A shell was used as the entrypoint/exec point into a container with an attached terminal.\")\n            .tags(            \n                \"container\",\n                \"shell\",\n                \"mitre_execution\")\n            .condition(\"spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint\")\n            .output(\"A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)\")\n            .priority(\"notice\")\n            .source(\"syscall\")\n            .exceptions(            \n                SecureRuleFalcoExceptionArgs.builder()\n                    .name(\"proc_names\")\n                    .fields(\"proc.name\")\n                    .comps(\"in\")\n                    .values(serializeJson(\n                        jsonArray(jsonArray(jsonArray(\n                            \"python\", \n                            \"python2\", \n                            \"python3\"\n                        )))))\n                    .build(),\n                SecureRuleFalcoExceptionArgs.builder()\n                    .name(\"container_proc_name\")\n                    .fields(                    \n                        \"container.id\",\n                        \"proc.name\")\n                    .comps(                    \n                        \"=\",\n                        \"in\")\n                    .values(serializeJson(\n                        jsonArray(jsonArray(\n                            \"host\", \n                            jsonArray(\n                                \"docker_binaries\", \n                                \"k8s_binaries\", \n                                \"lxd_binaries\", \n                                \"nsenter\"\n                            )\n                        ))))\n                    .build(),\n                SecureRuleFalcoExceptionArgs.builder()\n                    .name(\"proc_cmdline\")\n                    .fields(                    \n                        \"proc.name\",\n                        \"proc.cmdline\")\n                    .comps(                    \n                        \"in\",\n                        \"contains\")\n                    .values(serializeJson(\n                        jsonArray(\n                            jsonArray(\n                                jsonArray(\n                                    \"python\", \n                                    \"python2\", \n                                    \"python3\"\n                                ), \n                                \"/opt/draios/bin/sdchecks\"\n                            ), \n                            jsonArray(\n                                jsonArray(\"java\"), \n                                \"sdjagent.jar\"\n                            )\n                        )))\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:SecureRuleFalco\n    properties:\n      name: Terminal shell in container\n      description: A shell was used as the entrypoint/exec point into a container with an attached terminal.\n      tags:\n        - container\n        - shell\n        - mitre_execution\n      condition: spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint\n      output: A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)\n      priority: notice\n      source: syscall\n      exceptions:\n        - name: proc_names\n          fields:\n            - proc.name\n          comps:\n            - in\n          values:\n            fn::toJSON:\n              - - - python\n                  - python2\n                  - python3\n        - name: container_proc_name\n          fields:\n            - container.id\n            - proc.name\n          comps:\n            - =\n            - in\n          values:\n            fn::toJSON:\n              - - host\n                - - docker_binaries\n                  - k8s_binaries\n                  - lxd_binaries\n                  - nsenter\n        - name: proc_cmdline\n          fields:\n            - proc.name\n            - proc.cmdline\n          comps:\n            - in\n            - contains\n          values:\n            fn::toJSON:\n              - - - python\n                  - python2\n                  - python3\n                - /opt/draios/bin/sdchecks\n              - - - java\n                - sdjagent.jar\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure Falco runtime rules can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureRuleFalco:SecureRuleFalco example 12345\n```\n","properties":{"append":{"type":"boolean","description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided\nrule. By default this is false. Appending to user-created rules is not supported by the API.\n"},"condition":{"type":"string","description":"A [Falco condition](https://falco.org/docs/rules/) is simply a Boolean predicate on Sysdig events expressed using the Sysdig [filter syntax](http://www.sysdig.org/wiki/sysdig-user-guide/#filtering) and macro terms.\n"},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFalcoException:SecureRuleFalcoException"},"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the rule requires a minimum engine version. This\ncan allow you to add rules that would not normally pass validation with older agents in your environment. The rule\nwill only be processed by agents that support the\u003cspan pulumi-lang-nodejs=\" minimumEngineVersion \" pulumi-lang-dotnet=\" MinimumEngineVersion \" pulumi-lang-go=\" minimumEngineVersion \" pulumi-lang-python=\" minimum_engine_version \" pulumi-lang-yaml=\" minimumEngineVersion \" pulumi-lang-java=\" minimumEngineVersion \"\u003e minimum_engine_version \u003c/span\u003especified.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"output":{"type":"string","description":"Add additional information to each Falco notification's output. Required if append is false.\n"},"priority":{"type":"string","description":"The priority of the Falco rule. It can be: \"emergency\", \"alert\", \"critical\", \"error\", \"warning\", \"notice\", \"info\" or \"debug\". By default is \"warning\".\n"},"secureRuleFalcoId":{"type":"string"},"source":{"type":"string","description":"The source of the event. It can be either \"syscall\", \u003cspan pulumi-lang-nodejs=\"\"k8sAudit\"\" pulumi-lang-dotnet=\"\"K8sAudit\"\" pulumi-lang-go=\"\"k8sAudit\"\" pulumi-lang-python=\"\"k8s_audit\"\" pulumi-lang-yaml=\"\"k8sAudit\"\" pulumi-lang-java=\"\"k8sAudit\"\"\u003e\"k8s_audit\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"awsCloudtrail\"\" pulumi-lang-dotnet=\"\"AwsCloudtrail\"\" pulumi-lang-go=\"\"awsCloudtrail\"\" pulumi-lang-python=\"\"aws_cloudtrail\"\" pulumi-lang-yaml=\"\"awsCloudtrail\"\" pulumi-lang-java=\"\"awsCloudtrail\"\"\u003e\"aws_cloudtrail\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"gcpAuditlog\"\" pulumi-lang-dotnet=\"\"GcpAuditlog\"\" pulumi-lang-go=\"\"gcpAuditlog\"\" pulumi-lang-python=\"\"gcp_auditlog\"\" pulumi-lang-yaml=\"\"gcpAuditlog\"\" pulumi-lang-java=\"\"gcpAuditlog\"\"\u003e\"gcp_auditlog\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"azurePlatformlogs\"\" pulumi-lang-dotnet=\"\"AzurePlatformlogs\"\" pulumi-lang-go=\"\"azurePlatformlogs\"\" pulumi-lang-python=\"\"azure_platformlogs\"\" pulumi-lang-yaml=\"\"azurePlatformlogs\"\" pulumi-lang-java=\"\"azurePlatformlogs\"\"\u003e\"azure_platformlogs\"\u003c/span\u003e, \"awscloudtrail\", \"okta\", \"github\", or \"guardduty\". Required if append is false.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleFalcoTimeouts:SecureRuleFalcoTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["name","secureRuleFalcoId","version"],"inputProperties":{"append":{"type":"boolean","description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided\nrule. By default this is false. Appending to user-created rules is not supported by the API.\n"},"condition":{"type":"string","description":"A [Falco condition](https://falco.org/docs/rules/) is simply a Boolean predicate on Sysdig events expressed using the Sysdig [filter syntax](http://www.sysdig.org/wiki/sysdig-user-guide/#filtering) and macro terms.\n"},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFalcoException:SecureRuleFalcoException"},"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the rule requires a minimum engine version. This\ncan allow you to add rules that would not normally pass validation with older agents in your environment. The rule\nwill only be processed by agents that support the\u003cspan pulumi-lang-nodejs=\" minimumEngineVersion \" pulumi-lang-dotnet=\" MinimumEngineVersion \" pulumi-lang-go=\" minimumEngineVersion \" pulumi-lang-python=\" minimum_engine_version \" pulumi-lang-yaml=\" minimumEngineVersion \" pulumi-lang-java=\" minimumEngineVersion \"\u003e minimum_engine_version \u003c/span\u003especified.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"output":{"type":"string","description":"Add additional information to each Falco notification's output. Required if append is false.\n"},"priority":{"type":"string","description":"The priority of the Falco rule. It can be: \"emergency\", \"alert\", \"critical\", \"error\", \"warning\", \"notice\", \"info\" or \"debug\". By default is \"warning\".\n"},"secureRuleFalcoId":{"type":"string"},"source":{"type":"string","description":"The source of the event. It can be either \"syscall\", \u003cspan pulumi-lang-nodejs=\"\"k8sAudit\"\" pulumi-lang-dotnet=\"\"K8sAudit\"\" pulumi-lang-go=\"\"k8sAudit\"\" pulumi-lang-python=\"\"k8s_audit\"\" pulumi-lang-yaml=\"\"k8sAudit\"\" pulumi-lang-java=\"\"k8sAudit\"\"\u003e\"k8s_audit\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"awsCloudtrail\"\" pulumi-lang-dotnet=\"\"AwsCloudtrail\"\" pulumi-lang-go=\"\"awsCloudtrail\"\" pulumi-lang-python=\"\"aws_cloudtrail\"\" pulumi-lang-yaml=\"\"awsCloudtrail\"\" pulumi-lang-java=\"\"awsCloudtrail\"\"\u003e\"aws_cloudtrail\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"gcpAuditlog\"\" pulumi-lang-dotnet=\"\"GcpAuditlog\"\" pulumi-lang-go=\"\"gcpAuditlog\"\" pulumi-lang-python=\"\"gcp_auditlog\"\" pulumi-lang-yaml=\"\"gcpAuditlog\"\" pulumi-lang-java=\"\"gcpAuditlog\"\"\u003e\"gcp_auditlog\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"azurePlatformlogs\"\" pulumi-lang-dotnet=\"\"AzurePlatformlogs\"\" pulumi-lang-go=\"\"azurePlatformlogs\"\" pulumi-lang-python=\"\"azure_platformlogs\"\" pulumi-lang-yaml=\"\"azurePlatformlogs\"\" pulumi-lang-java=\"\"azurePlatformlogs\"\"\u003e\"azure_platformlogs\"\u003c/span\u003e, \"awscloudtrail\", \"okta\", \"github\", or \"guardduty\". Required if append is false.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleFalcoTimeouts:SecureRuleFalcoTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleFalco resources.\n","properties":{"append":{"type":"boolean","description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided\nrule. By default this is false. Appending to user-created rules is not supported by the API.\n"},"condition":{"type":"string","description":"A [Falco condition](https://falco.org/docs/rules/) is simply a Boolean predicate on Sysdig events expressed using the Sysdig [filter syntax](http://www.sysdig.org/wiki/sysdig-user-guide/#filtering) and macro terms.\n"},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFalcoException:SecureRuleFalcoException"},"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the rule requires a minimum engine version. This\ncan allow you to add rules that would not normally pass validation with older agents in your environment. The rule\nwill only be processed by agents that support the\u003cspan pulumi-lang-nodejs=\" minimumEngineVersion \" pulumi-lang-dotnet=\" MinimumEngineVersion \" pulumi-lang-go=\" minimumEngineVersion \" pulumi-lang-python=\" minimum_engine_version \" pulumi-lang-yaml=\" minimumEngineVersion \" pulumi-lang-java=\" minimumEngineVersion \"\u003e minimum_engine_version \u003c/span\u003especified.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"output":{"type":"string","description":"Add additional information to each Falco notification's output. Required if append is false.\n"},"priority":{"type":"string","description":"The priority of the Falco rule. It can be: \"emergency\", \"alert\", \"critical\", \"error\", \"warning\", \"notice\", \"info\" or \"debug\". By default is \"warning\".\n"},"secureRuleFalcoId":{"type":"string"},"source":{"type":"string","description":"The source of the event. It can be either \"syscall\", \u003cspan pulumi-lang-nodejs=\"\"k8sAudit\"\" pulumi-lang-dotnet=\"\"K8sAudit\"\" pulumi-lang-go=\"\"k8sAudit\"\" pulumi-lang-python=\"\"k8s_audit\"\" pulumi-lang-yaml=\"\"k8sAudit\"\" pulumi-lang-java=\"\"k8sAudit\"\"\u003e\"k8s_audit\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"awsCloudtrail\"\" pulumi-lang-dotnet=\"\"AwsCloudtrail\"\" pulumi-lang-go=\"\"awsCloudtrail\"\" pulumi-lang-python=\"\"aws_cloudtrail\"\" pulumi-lang-yaml=\"\"awsCloudtrail\"\" pulumi-lang-java=\"\"awsCloudtrail\"\"\u003e\"aws_cloudtrail\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"gcpAuditlog\"\" pulumi-lang-dotnet=\"\"GcpAuditlog\"\" pulumi-lang-go=\"\"gcpAuditlog\"\" pulumi-lang-python=\"\"gcp_auditlog\"\" pulumi-lang-yaml=\"\"gcpAuditlog\"\" pulumi-lang-java=\"\"gcpAuditlog\"\"\u003e\"gcp_auditlog\"\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"\"azurePlatformlogs\"\" pulumi-lang-dotnet=\"\"AzurePlatformlogs\"\" pulumi-lang-go=\"\"azurePlatformlogs\"\" pulumi-lang-python=\"\"azure_platformlogs\"\" pulumi-lang-yaml=\"\"azurePlatformlogs\"\" pulumi-lang-java=\"\"azurePlatformlogs\"\"\u003e\"azure_platformlogs\"\u003c/span\u003e, \"awscloudtrail\", \"okta\", \"github\", or \"guardduty\". Required if append is false.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleFalcoTimeouts:SecureRuleFalcoTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureRuleFilesystem:SecureRuleFilesystem":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.SecureRuleFilesystem(\"example\", {\n    name: \"Apache writing to non allowed directory\",\n    description: \"Attempt to write to directories that should be immutable\",\n    tags: [\n        \"filesystem\",\n        \"cis\",\n    ],\n    readOnlies: [{\n        matching: true,\n        paths: [\"/etc\"],\n    }],\n    readWrites: [{\n        matching: true,\n        paths: [\n            \"/var/log/apache2\",\n            \"/dev/tty\",\n        ],\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.SecureRuleFilesystem(\"example\",\n    name=\"Apache writing to non allowed directory\",\n    description=\"Attempt to write to directories that should be immutable\",\n    tags=[\n        \"filesystem\",\n        \"cis\",\n    ],\n    read_onlies=[{\n        \"matching\": True,\n        \"paths\": [\"/etc\"],\n    }],\n    read_writes=[{\n        \"matching\": True,\n        \"paths\": [\n            \"/var/log/apache2\",\n            \"/dev/tty\",\n        ],\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.SecureRuleFilesystem(\"example\", new()\n    {\n        Name = \"Apache writing to non allowed directory\",\n        Description = \"Attempt to write to directories that should be immutable\",\n        Tags = new[]\n        {\n            \"filesystem\",\n            \"cis\",\n        },\n        ReadOnlies = new[]\n        {\n            new Sysdig.Inputs.SecureRuleFilesystemReadOnlyArgs\n            {\n                Matching = true,\n                Paths = new[]\n                {\n                    \"/etc\",\n                },\n            },\n        },\n        ReadWrites = new[]\n        {\n            new Sysdig.Inputs.SecureRuleFilesystemReadWriteArgs\n            {\n                Matching = true,\n                Paths = new[]\n                {\n                    \"/var/log/apache2\",\n                    \"/dev/tty\",\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureRuleFilesystem(ctx, \"example\", \u0026sysdig.SecureRuleFilesystemArgs{\n\t\t\tName:        pulumi.String(\"Apache writing to non allowed directory\"),\n\t\t\tDescription: pulumi.String(\"Attempt to write to directories that should be immutable\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"filesystem\"),\n\t\t\t\tpulumi.String(\"cis\"),\n\t\t\t},\n\t\t\tReadOnlies: sysdig.SecureRuleFilesystemReadOnlyArray{\n\t\t\t\t\u0026sysdig.SecureRuleFilesystemReadOnlyArgs{\n\t\t\t\t\tMatching: pulumi.Bool(true),\n\t\t\t\t\tPaths: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"/etc\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tReadWrites: sysdig.SecureRuleFilesystemReadWriteArray{\n\t\t\t\t\u0026sysdig.SecureRuleFilesystemReadWriteArgs{\n\t\t\t\t\tMatching: pulumi.Bool(true),\n\t\t\t\t\tPaths: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"/var/log/apache2\"),\n\t\t\t\t\t\tpulumi.String(\"/dev/tty\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleFilesystem;\nimport com.pulumi.sysdig.SecureRuleFilesystemArgs;\nimport com.pulumi.sysdig.inputs.SecureRuleFilesystemReadOnlyArgs;\nimport com.pulumi.sysdig.inputs.SecureRuleFilesystemReadWriteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new SecureRuleFilesystem(\"example\", SecureRuleFilesystemArgs.builder()\n            .name(\"Apache writing to non allowed directory\")\n            .description(\"Attempt to write to directories that should be immutable\")\n            .tags(            \n                \"filesystem\",\n                \"cis\")\n            .readOnlies(SecureRuleFilesystemReadOnlyArgs.builder()\n                .matching(true)\n                .paths(\"/etc\")\n                .build())\n            .readWrites(SecureRuleFilesystemReadWriteArgs.builder()\n                .matching(true)\n                .paths(                \n                    \"/var/log/apache2\",\n                    \"/dev/tty\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:SecureRuleFilesystem\n    properties:\n      name: Apache writing to non allowed directory\n      description: Attempt to write to directories that should be immutable\n      tags:\n        - filesystem\n        - cis\n      readOnlies:\n        - matching: true\n          paths:\n            - /etc\n      readWrites:\n        - matching: true\n          paths:\n            - /var/log/apache2\n            - /dev/tty\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure filesystem runtime rules can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureRuleFilesystem:SecureRuleFilesystem example 12345\n```\n","properties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"readOnlies":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemReadOnly:SecureRuleFilesystemReadOnly"}},"readWrites":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemReadWrite:SecureRuleFilesystemReadWrite"}},"secureRuleFilesystemId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemTimeouts:SecureRuleFilesystemTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["name","secureRuleFilesystemId","version"],"inputProperties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"readOnlies":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemReadOnly:SecureRuleFilesystemReadOnly"}},"readWrites":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemReadWrite:SecureRuleFilesystemReadWrite"}},"secureRuleFilesystemId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemTimeouts:SecureRuleFilesystemTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleFilesystem resources.\n","properties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"readOnlies":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemReadOnly:SecureRuleFilesystemReadOnly"}},"readWrites":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemReadWrite:SecureRuleFilesystemReadWrite"}},"secureRuleFilesystemId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleFilesystemTimeouts:SecureRuleFilesystemTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureRuleNetwork:SecureRuleNetwork":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.SecureRuleNetwork(\"example\", {\n    name: \"Disallowed SSH Connection\",\n    description: \"Detect any new ssh connection to a host other than those in an allowed group of hosts\",\n    tags: [\n        \"network\",\n        \"mitre_remote_service\",\n    ],\n    blockInbound: true,\n    blockOutbound: true,\n    tcps: [{\n        matching: true,\n        ports: [22],\n    }],\n    udps: [{\n        matching: true,\n        ports: [22],\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.SecureRuleNetwork(\"example\",\n    name=\"Disallowed SSH Connection\",\n    description=\"Detect any new ssh connection to a host other than those in an allowed group of hosts\",\n    tags=[\n        \"network\",\n        \"mitre_remote_service\",\n    ],\n    block_inbound=True,\n    block_outbound=True,\n    tcps=[{\n        \"matching\": True,\n        \"ports\": [22],\n    }],\n    udps=[{\n        \"matching\": True,\n        \"ports\": [22],\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.SecureRuleNetwork(\"example\", new()\n    {\n        Name = \"Disallowed SSH Connection\",\n        Description = \"Detect any new ssh connection to a host other than those in an allowed group of hosts\",\n        Tags = new[]\n        {\n            \"network\",\n            \"mitre_remote_service\",\n        },\n        BlockInbound = true,\n        BlockOutbound = true,\n        Tcps = new[]\n        {\n            new Sysdig.Inputs.SecureRuleNetworkTcpArgs\n            {\n                Matching = true,\n                Ports = new[]\n                {\n                    22,\n                },\n            },\n        },\n        Udps = new[]\n        {\n            new Sysdig.Inputs.SecureRuleNetworkUdpArgs\n            {\n                Matching = true,\n                Ports = new[]\n                {\n                    22,\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureRuleNetwork(ctx, \"example\", \u0026sysdig.SecureRuleNetworkArgs{\n\t\t\tName:        pulumi.String(\"Disallowed SSH Connection\"),\n\t\t\tDescription: pulumi.String(\"Detect any new ssh connection to a host other than those in an allowed group of hosts\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"network\"),\n\t\t\t\tpulumi.String(\"mitre_remote_service\"),\n\t\t\t},\n\t\t\tBlockInbound:  pulumi.Bool(true),\n\t\t\tBlockOutbound: pulumi.Bool(true),\n\t\t\tTcps: sysdig.SecureRuleNetworkTcpArray{\n\t\t\t\t\u0026sysdig.SecureRuleNetworkTcpArgs{\n\t\t\t\t\tMatching: pulumi.Bool(true),\n\t\t\t\t\tPorts: pulumi.Float64Array{\n\t\t\t\t\t\tpulumi.Float64(22),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tUdps: sysdig.SecureRuleNetworkUdpArray{\n\t\t\t\t\u0026sysdig.SecureRuleNetworkUdpArgs{\n\t\t\t\t\tMatching: pulumi.Bool(true),\n\t\t\t\t\tPorts: pulumi.Float64Array{\n\t\t\t\t\t\tpulumi.Float64(22),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleNetwork;\nimport com.pulumi.sysdig.SecureRuleNetworkArgs;\nimport com.pulumi.sysdig.inputs.SecureRuleNetworkTcpArgs;\nimport com.pulumi.sysdig.inputs.SecureRuleNetworkUdpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new SecureRuleNetwork(\"example\", SecureRuleNetworkArgs.builder()\n            .name(\"Disallowed SSH Connection\")\n            .description(\"Detect any new ssh connection to a host other than those in an allowed group of hosts\")\n            .tags(            \n                \"network\",\n                \"mitre_remote_service\")\n            .blockInbound(true)\n            .blockOutbound(true)\n            .tcps(SecureRuleNetworkTcpArgs.builder()\n                .matching(true)\n                .ports(22.0)\n                .build())\n            .udps(SecureRuleNetworkUdpArgs.builder()\n                .matching(true)\n                .ports(22.0)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:SecureRuleNetwork\n    properties:\n      name: Disallowed SSH Connection\n      description: Detect any new ssh connection to a host other than those in an allowed group of hosts\n      tags:\n        - network\n        - mitre_remote_service\n      blockInbound: true\n      blockOutbound: true\n      tcps:\n        - matching: true\n          ports:\n            - 22\n      udps:\n        - matching: true\n          ports:\n            - 22\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure network runtime rules can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureRuleNetwork:SecureRuleNetwork example 12345\n```\n","properties":{"blockInbound":{"type":"boolean"},"blockOutbound":{"type":"boolean"},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleNetworkId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"tcps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkTcp:SecureRuleNetworkTcp"}},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkTimeouts:SecureRuleNetworkTimeouts"},"udps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkUdp:SecureRuleNetworkUdp"}},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["blockInbound","blockOutbound","name","secureRuleNetworkId","version"],"inputProperties":{"blockInbound":{"type":"boolean"},"blockOutbound":{"type":"boolean"},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleNetworkId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"tcps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkTcp:SecureRuleNetworkTcp"}},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkTimeouts:SecureRuleNetworkTimeouts"},"udps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkUdp:SecureRuleNetworkUdp"}}},"requiredInputs":["blockInbound","blockOutbound"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleNetwork resources.\n","properties":{"blockInbound":{"type":"boolean"},"blockOutbound":{"type":"boolean"},"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleNetworkId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"tcps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkTcp:SecureRuleNetworkTcp"}},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkTimeouts:SecureRuleNetworkTimeouts"},"udps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleNetworkUdp:SecureRuleNetworkUdp"}},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureRuleProcess:SecureRuleProcess":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureRuleProcess(\"sample\", {\n    name: \"Launch Suspicious Network Tool in Container\",\n    description: \"Detect network tools launched inside container\",\n    matching: true,\n    processes: [\n        \"nc\",\n        \"ncat\",\n        \"nmap\",\n        \"dig\",\n        \"tcpdump\",\n        \"tshark\",\n        \"ngrep\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureRuleProcess(\"sample\",\n    name=\"Launch Suspicious Network Tool in Container\",\n    description=\"Detect network tools launched inside container\",\n    matching=True,\n    processes=[\n        \"nc\",\n        \"ncat\",\n        \"nmap\",\n        \"dig\",\n        \"tcpdump\",\n        \"tshark\",\n        \"ngrep\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureRuleProcess(\"sample\", new()\n    {\n        Name = \"Launch Suspicious Network Tool in Container\",\n        Description = \"Detect network tools launched inside container\",\n        Matching = true,\n        Processes = new[]\n        {\n            \"nc\",\n            \"ncat\",\n            \"nmap\",\n            \"dig\",\n            \"tcpdump\",\n            \"tshark\",\n            \"ngrep\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureRuleProcess(ctx, \"sample\", \u0026sysdig.SecureRuleProcessArgs{\n\t\t\tName:        pulumi.String(\"Launch Suspicious Network Tool in Container\"),\n\t\t\tDescription: pulumi.String(\"Detect network tools launched inside container\"),\n\t\t\tMatching:    pulumi.Bool(true),\n\t\t\tProcesses: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"nc\"),\n\t\t\t\tpulumi.String(\"ncat\"),\n\t\t\t\tpulumi.String(\"nmap\"),\n\t\t\t\tpulumi.String(\"dig\"),\n\t\t\t\tpulumi.String(\"tcpdump\"),\n\t\t\t\tpulumi.String(\"tshark\"),\n\t\t\t\tpulumi.String(\"ngrep\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleProcess;\nimport com.pulumi.sysdig.SecureRuleProcessArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureRuleProcess(\"sample\", SecureRuleProcessArgs.builder()\n            .name(\"Launch Suspicious Network Tool in Container\")\n            .description(\"Detect network tools launched inside container\")\n            .matching(true)\n            .processes(            \n                \"nc\",\n                \"ncat\",\n                \"nmap\",\n                \"dig\",\n                \"tcpdump\",\n                \"tshark\",\n                \"ngrep\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureRuleProcess\n    properties:\n      name: Launch Suspicious Network Tool in Container\n      description: Detect network tools launched inside container\n      matching: true # default\n      processes:\n        - nc\n        - ncat\n        - nmap\n        - dig\n        - tcpdump\n        - tshark\n        - ngrep\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure process runtime rules can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureRuleProcess:SecureRuleProcess example 12345\n```\n","properties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"processes":{"type":"array","items":{"type":"string"}},"secureRuleProcessId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleProcessTimeouts:SecureRuleProcessTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["name","secureRuleProcessId","version"],"inputProperties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"processes":{"type":"array","items":{"type":"string"}},"secureRuleProcessId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleProcessTimeouts:SecureRuleProcessTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleProcess resources.\n","properties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"processes":{"type":"array","items":{"type":"string"}},"secureRuleProcessId":{"type":"string"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleProcessTimeouts:SecureRuleProcessTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureRuleStateful:SecureRuleStateful":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst statefulRule = new sysdig.SecureRuleStateful(\"stateful_rule\", {\n    name: \"API Gateway Enumeration Detected\",\n    source: \"awscloudtrail_stateful\",\n    ruletype: \"STATEFUL_SEQUENCE\",\n    exceptions: [{\n        values: JSON.stringify([[\n            \"user_abc\",\n            [\"12345\"],\n        ]]),\n        name: \"user_accountid\",\n    }],\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_sysdig as sysdig\n\nstateful_rule = sysdig.SecureRuleStateful(\"stateful_rule\",\n    name=\"API Gateway Enumeration Detected\",\n    source=\"awscloudtrail_stateful\",\n    ruletype=\"STATEFUL_SEQUENCE\",\n    exceptions=[{\n        \"values\": json.dumps([[\n            \"user_abc\",\n            [\"12345\"],\n        ]]),\n        \"name\": \"user_accountid\",\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var statefulRule = new Sysdig.SecureRuleStateful(\"stateful_rule\", new()\n    {\n        Name = \"API Gateway Enumeration Detected\",\n        Source = \"awscloudtrail_stateful\",\n        Ruletype = \"STATEFUL_SEQUENCE\",\n        Exceptions = new[]\n        {\n            new Sysdig.Inputs.SecureRuleStatefulExceptionArgs\n            {\n                Values = JsonSerializer.Serialize(new[]\n                {\n                    new object?[]\n                    {\n                        \"user_abc\",\n                        new[]\n                        {\n                            \"12345\",\n                        },\n                    },\n                }),\n                Name = \"user_accountid\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttmpJSON0, err := json.Marshal([][]interface{}{\n\t\t\t[]interface{}{\n\t\t\t\t\"user_abc\",\n\t\t\t\t[]string{\n\t\t\t\t\t\"12345\",\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = sysdig.NewSecureRuleStateful(ctx, \"stateful_rule\", \u0026sysdig.SecureRuleStatefulArgs{\n\t\t\tName:     pulumi.String(\"API Gateway Enumeration Detected\"),\n\t\t\tSource:   pulumi.String(\"awscloudtrail_stateful\"),\n\t\t\tRuletype: pulumi.String(\"STATEFUL_SEQUENCE\"),\n\t\t\tExceptions: sysdig.SecureRuleStatefulExceptionArray{\n\t\t\t\t\u0026sysdig.SecureRuleStatefulExceptionArgs{\n\t\t\t\t\tValues: pulumi.String(json0),\n\t\t\t\t\tName:   pulumi.String(\"user_accountid\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleStateful;\nimport com.pulumi.sysdig.SecureRuleStatefulArgs;\nimport com.pulumi.sysdig.inputs.SecureRuleStatefulExceptionArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var statefulRule = new SecureRuleStateful(\"statefulRule\", SecureRuleStatefulArgs.builder()\n            .name(\"API Gateway Enumeration Detected\")\n            .source(\"awscloudtrail_stateful\")\n            .ruletype(\"STATEFUL_SEQUENCE\")\n            .exceptions(SecureRuleStatefulExceptionArgs.builder()\n                .values(serializeJson(\n                    jsonArray(jsonArray(\n                        \"user_abc\", \n                        jsonArray(\"12345\")\n                    ))))\n                .name(\"user_accountid\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  statefulRule:\n    type: sysdig:SecureRuleStateful\n    name: stateful_rule\n    properties:\n      name: API Gateway Enumeration Detected\n      source: awscloudtrail_stateful\n      ruletype: STATEFUL_SEQUENCE\n      exceptions:\n        - values:\n            fn::toJSON:\n              - - user_abc\n                - - '12345'\n          name: user_accountid\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"append":{"type":"boolean","description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided. For stateful rules, the default value is true.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleStatefulException:SecureRuleStatefulException"},"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n"},"name":{"type":"string","description":"The name of the Stateful rule that the exception is being appended to.\n"},"ruletype":{"type":"string","description":"The type of Stateful rule being appended to. We currently support \"STATEFUL_SEQUENCE\", \"STATEFUL_COUNT\", and \"STATEFUL_UNIQ_PERCENT\".\n"},"secureRuleStatefulId":{"type":"string"},"source":{"type":"string","description":"The source of the event. We currently support the \u003cspan pulumi-lang-nodejs=\"\"awscloudtrailStateful\"\" pulumi-lang-dotnet=\"\"AwscloudtrailStateful\"\" pulumi-lang-go=\"\"awscloudtrailStateful\"\" pulumi-lang-python=\"\"awscloudtrail_stateful\"\" pulumi-lang-yaml=\"\"awscloudtrailStateful\"\" pulumi-lang-java=\"\"awscloudtrailStateful\"\"\u003e\"awscloudtrail_stateful\"\u003c/span\u003e source.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleStatefulTimeouts:SecureRuleStatefulTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["exceptions","name","ruletype","secureRuleStatefulId","source","version"],"inputProperties":{"append":{"type":"boolean","description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided. For stateful rules, the default value is true.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleStatefulException:SecureRuleStatefulException"},"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n"},"name":{"type":"string","description":"The name of the Stateful rule that the exception is being appended to.\n"},"ruletype":{"type":"string","description":"The type of Stateful rule being appended to. We currently support \"STATEFUL_SEQUENCE\", \"STATEFUL_COUNT\", and \"STATEFUL_UNIQ_PERCENT\".\n"},"secureRuleStatefulId":{"type":"string"},"source":{"type":"string","description":"The source of the event. We currently support the \u003cspan pulumi-lang-nodejs=\"\"awscloudtrailStateful\"\" pulumi-lang-dotnet=\"\"AwscloudtrailStateful\"\" pulumi-lang-go=\"\"awscloudtrailStateful\"\" pulumi-lang-python=\"\"awscloudtrail_stateful\"\" pulumi-lang-yaml=\"\"awscloudtrailStateful\"\" pulumi-lang-java=\"\"awscloudtrailStateful\"\"\u003e\"awscloudtrail_stateful\"\u003c/span\u003e source.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleStatefulTimeouts:SecureRuleStatefulTimeouts"}},"requiredInputs":["exceptions","ruletype","source"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleStateful resources.\n","properties":{"append":{"type":"boolean","description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided. For stateful rules, the default value is true.\n"},"exceptions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureRuleStatefulException:SecureRuleStatefulException"},"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n"},"name":{"type":"string","description":"The name of the Stateful rule that the exception is being appended to.\n"},"ruletype":{"type":"string","description":"The type of Stateful rule being appended to. We currently support \"STATEFUL_SEQUENCE\", \"STATEFUL_COUNT\", and \"STATEFUL_UNIQ_PERCENT\".\n"},"secureRuleStatefulId":{"type":"string"},"source":{"type":"string","description":"The source of the event. We currently support the \u003cspan pulumi-lang-nodejs=\"\"awscloudtrailStateful\"\" pulumi-lang-dotnet=\"\"AwscloudtrailStateful\"\" pulumi-lang-go=\"\"awscloudtrailStateful\"\" pulumi-lang-python=\"\"awscloudtrail_stateful\"\" pulumi-lang-yaml=\"\"awscloudtrailStateful\"\" pulumi-lang-java=\"\"awscloudtrailStateful\"\"\u003e\"awscloudtrail_stateful\"\u003c/span\u003e source.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleStatefulTimeouts:SecureRuleStatefulTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureRuleSyscall:SecureRuleSyscall":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst foo = new sysdig.SecureRuleSyscall(\"foo\", {\n    name: \"Unexpected mount syscall\",\n    description: \"Syscall 'mount' detected\",\n    matching: true,\n    syscalls: [\"mount\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nfoo = sysdig.SecureRuleSyscall(\"foo\",\n    name=\"Unexpected mount syscall\",\n    description=\"Syscall 'mount' detected\",\n    matching=True,\n    syscalls=[\"mount\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var foo = new Sysdig.SecureRuleSyscall(\"foo\", new()\n    {\n        Name = \"Unexpected mount syscall\",\n        Description = \"Syscall 'mount' detected\",\n        Matching = true,\n        Syscalls = new[]\n        {\n            \"mount\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureRuleSyscall(ctx, \"foo\", \u0026sysdig.SecureRuleSyscallArgs{\n\t\t\tName:        pulumi.String(\"Unexpected mount syscall\"),\n\t\t\tDescription: pulumi.String(\"Syscall 'mount' detected\"),\n\t\t\tMatching:    pulumi.Bool(true),\n\t\t\tSyscalls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"mount\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureRuleSyscall;\nimport com.pulumi.sysdig.SecureRuleSyscallArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var foo = new SecureRuleSyscall(\"foo\", SecureRuleSyscallArgs.builder()\n            .name(\"Unexpected mount syscall\")\n            .description(\"Syscall 'mount' detected\")\n            .matching(true)\n            .syscalls(\"mount\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  foo:\n    type: sysdig:SecureRuleSyscall\n    properties:\n      name: Unexpected mount syscall\n      description: Syscall 'mount' detected\n      matching: true # default\n      syscalls:\n        - mount\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure syscall runtime rules can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureRuleSyscall:SecureRuleSyscall example 12345\n```\n","properties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleSyscallId":{"type":"string"},"syscalls":{"type":"array","items":{"type":"string"}},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleSyscallTimeouts:SecureRuleSyscallTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object","required":["name","secureRuleSyscallId","version"],"inputProperties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleSyscallId":{"type":"string"},"syscalls":{"type":"array","items":{"type":"string"}},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleSyscallTimeouts:SecureRuleSyscallTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureRuleSyscall resources.\n","properties":{"description":{"type":"string","description":"The description of Secure rule. By default is empty.\n"},"matching":{"type":"boolean"},"name":{"type":"string","description":"The name of the Secure rule. It must be unique.\n"},"secureRuleSyscallId":{"type":"string"},"syscalls":{"type":"array","items":{"type":"string"}},"tags":{"type":"array","items":{"type":"string"},"description":"A list of tags for this rule.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureRuleSyscallTimeouts:SecureRuleSyscallTimeouts"},"version":{"type":"number","description":"Current version of the resource in Sysdig Secure.\n"}},"type":"object"}},"sysdig:index/secureTeam:SecureTeam":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst me = sysdig.getCurrentUser({});\nconst customRole = sysdig.getCustomRole({\n    name: \"CustomRoleName\",\n});\nconst devops = new sysdig.SecureTeam(\"devops\", {\n    name: \"DevOps team\",\n    userRoles: [\n        {\n            email: me.then(me =\u003e me.email),\n            role: \"ROLE_TEAM_MANAGER\",\n        },\n        {\n            email: \"john.doe@example.com\",\n            role: \"ROLE_TEAM_STANDARD\",\n        },\n        {\n            email: \"john.smith@example.com\",\n            role: customRole.then(customRole =\u003e customRole.id),\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nme = sysdig.get_current_user()\ncustom_role = sysdig.get_custom_role(name=\"CustomRoleName\")\ndevops = sysdig.SecureTeam(\"devops\",\n    name=\"DevOps team\",\n    user_roles=[\n        {\n            \"email\": me.email,\n            \"role\": \"ROLE_TEAM_MANAGER\",\n        },\n        {\n            \"email\": \"john.doe@example.com\",\n            \"role\": \"ROLE_TEAM_STANDARD\",\n        },\n        {\n            \"email\": \"john.smith@example.com\",\n            \"role\": custom_role.id,\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var me = Sysdig.GetCurrentUser.Invoke();\n\n    var customRole = Sysdig.GetCustomRole.Invoke(new()\n    {\n        Name = \"CustomRoleName\",\n    });\n\n    var devops = new Sysdig.SecureTeam(\"devops\", new()\n    {\n        Name = \"DevOps team\",\n        UserRoles = new[]\n        {\n            new Sysdig.Inputs.SecureTeamUserRoleArgs\n            {\n                Email = me.Apply(getCurrentUserResult =\u003e getCurrentUserResult.Email),\n                Role = \"ROLE_TEAM_MANAGER\",\n            },\n            new Sysdig.Inputs.SecureTeamUserRoleArgs\n            {\n                Email = \"john.doe@example.com\",\n                Role = \"ROLE_TEAM_STANDARD\",\n            },\n            new Sysdig.Inputs.SecureTeamUserRoleArgs\n            {\n                Email = \"john.smith@example.com\",\n                Role = customRole.Apply(getCustomRoleResult =\u003e getCustomRoleResult.Id),\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tme, err := sysdig.GetCurrentUser(ctx, \u0026sysdig.GetCurrentUserArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcustomRole, err := sysdig.LookupCustomRole(ctx, \u0026sysdig.LookupCustomRoleArgs{\n\t\t\tName: \"CustomRoleName\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureTeam(ctx, \"devops\", \u0026sysdig.SecureTeamArgs{\n\t\t\tName: pulumi.String(\"DevOps team\"),\n\t\t\tUserRoles: sysdig.SecureTeamUserRoleArray{\n\t\t\t\t\u0026sysdig.SecureTeamUserRoleArgs{\n\t\t\t\t\tEmail: pulumi.String(me.Email),\n\t\t\t\t\tRole:  pulumi.String(\"ROLE_TEAM_MANAGER\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureTeamUserRoleArgs{\n\t\t\t\t\tEmail: pulumi.String(\"john.doe@example.com\"),\n\t\t\t\t\tRole:  pulumi.String(\"ROLE_TEAM_STANDARD\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureTeamUserRoleArgs{\n\t\t\t\t\tEmail: pulumi.String(\"john.smith@example.com\"),\n\t\t\t\t\tRole:  pulumi.String(customRole.Id),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetCurrentUserArgs;\nimport com.pulumi.sysdig.inputs.GetCustomRoleArgs;\nimport com.pulumi.sysdig.SecureTeam;\nimport com.pulumi.sysdig.SecureTeamArgs;\nimport com.pulumi.sysdig.inputs.SecureTeamUserRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var me = SysdigFunctions.getCurrentUser(GetCurrentUserArgs.builder()\n            .build());\n\n        final var customRole = SysdigFunctions.getCustomRole(GetCustomRoleArgs.builder()\n            .name(\"CustomRoleName\")\n            .build());\n\n        var devops = new SecureTeam(\"devops\", SecureTeamArgs.builder()\n            .name(\"DevOps team\")\n            .userRoles(            \n                SecureTeamUserRoleArgs.builder()\n                    .email(me.email())\n                    .role(\"ROLE_TEAM_MANAGER\")\n                    .build(),\n                SecureTeamUserRoleArgs.builder()\n                    .email(\"john.doe@example.com\")\n                    .role(\"ROLE_TEAM_STANDARD\")\n                    .build(),\n                SecureTeamUserRoleArgs.builder()\n                    .email(\"john.smith@example.com\")\n                    .role(customRole.id())\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  devops:\n    type: sysdig:SecureTeam\n    properties:\n      name: DevOps team\n      userRoles:\n        - email: ${me.email}\n          role: ROLE_TEAM_MANAGER\n        - email: john.doe@example.com\n          role: ROLE_TEAM_STANDARD\n        - email: john.smith@example.com\n          role: ${customRole.id}\nvariables:\n  me:\n    fn::invoke:\n      function: sysdig:getCurrentUser\n      arguments: {}\n  customRole:\n    fn::invoke:\n      function: sysdig:getCustomRole\n      arguments:\n        name: CustomRoleName\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure Teams can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureTeam:SecureTeam example 12345\n```\n","properties":{"allZones":{"type":"boolean","description":"Attach all zones to the team. If this argument is enabled then \u003cspan pulumi-lang-nodejs=\"`zoneIds`\" pulumi-lang-dotnet=\"`ZoneIds`\" pulumi-lang-go=\"`zoneIds`\" pulumi-lang-python=\"`zone_ids`\" pulumi-lang-yaml=\"`zoneIds`\" pulumi-lang-java=\"`zoneIds`\"\u003e`zone_ids`\u003c/span\u003e needs to be omitted.\n"},"canUseAgentCli":{"type":"boolean","description":"Enable this option to give this team access to Using the Agent Console. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"canUseRapidResponse":{"type":"boolean","description":"Enable this option to give this Secure team access to Rapid Response. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"defaultTeam":{"type":"boolean"},"description":{"type":"string","description":"A description of the team.\n"},"filter":{"type":"string","description":"If the team can only see some resources,\nwrite down a filter of such resources.\n"},"name":{"type":"string","description":"The name of the Secure Team. It must be unique and must not exist in Monitor.\n"},"scopeBy":{"type":"string","description":"Scope for the team, either \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. Default: \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e. If set to \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e, team members can see all host-level and container-level information. If set to \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e, team members can see only Container-level information.\n"},"secureTeamId":{"type":"string","description":"ID of the created team.\n"},"theme":{"type":"string","description":"Colour of the team. Default: `#73A1F7`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureTeamTimeouts:SecureTeamTimeouts"},"useSysdigCapture":{"type":"boolean","description":"Defines if the team is able to create Sysdig Capture files. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"userRoles":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureTeamUserRole:SecureTeamUserRole"}},"version":{"type":"number","description":"Current version of the resource.\n"},"zoneIds":{"type":"array","items":{"type":"number"},"description":"List of zone IDs attached to the team. If \u003cspan pulumi-lang-nodejs=\"`allZones`\" pulumi-lang-dotnet=\"`AllZones`\" pulumi-lang-go=\"`allZones`\" pulumi-lang-python=\"`all_zones`\" pulumi-lang-yaml=\"`allZones`\" pulumi-lang-java=\"`allZones`\"\u003e`all_zones`\u003c/span\u003e is specified this argument needs to be omitted.\n"}},"type":"object","required":["name","secureTeamId","version"],"inputProperties":{"allZones":{"type":"boolean","description":"Attach all zones to the team. If this argument is enabled then \u003cspan pulumi-lang-nodejs=\"`zoneIds`\" pulumi-lang-dotnet=\"`ZoneIds`\" pulumi-lang-go=\"`zoneIds`\" pulumi-lang-python=\"`zone_ids`\" pulumi-lang-yaml=\"`zoneIds`\" pulumi-lang-java=\"`zoneIds`\"\u003e`zone_ids`\u003c/span\u003e needs to be omitted.\n"},"canUseAgentCli":{"type":"boolean","description":"Enable this option to give this team access to Using the Agent Console. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"canUseRapidResponse":{"type":"boolean","description":"Enable this option to give this Secure team access to Rapid Response. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"defaultTeam":{"type":"boolean"},"description":{"type":"string","description":"A description of the team.\n"},"filter":{"type":"string","description":"If the team can only see some resources,\nwrite down a filter of such resources.\n"},"name":{"type":"string","description":"The name of the Secure Team. It must be unique and must not exist in Monitor.\n"},"scopeBy":{"type":"string","description":"Scope for the team, either \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. Default: \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e. If set to \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e, team members can see all host-level and container-level information. If set to \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e, team members can see only Container-level information.\n"},"secureTeamId":{"type":"string","description":"ID of the created team.\n"},"theme":{"type":"string","description":"Colour of the team. Default: `#73A1F7`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureTeamTimeouts:SecureTeamTimeouts"},"useSysdigCapture":{"type":"boolean","description":"Defines if the team is able to create Sysdig Capture files. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"userRoles":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureTeamUserRole:SecureTeamUserRole"}},"zoneIds":{"type":"array","items":{"type":"number"},"description":"List of zone IDs attached to the team. If \u003cspan pulumi-lang-nodejs=\"`allZones`\" pulumi-lang-dotnet=\"`AllZones`\" pulumi-lang-go=\"`allZones`\" pulumi-lang-python=\"`all_zones`\" pulumi-lang-yaml=\"`allZones`\" pulumi-lang-java=\"`allZones`\"\u003e`all_zones`\u003c/span\u003e is specified this argument needs to be omitted.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering SecureTeam resources.\n","properties":{"allZones":{"type":"boolean","description":"Attach all zones to the team. If this argument is enabled then \u003cspan pulumi-lang-nodejs=\"`zoneIds`\" pulumi-lang-dotnet=\"`ZoneIds`\" pulumi-lang-go=\"`zoneIds`\" pulumi-lang-python=\"`zone_ids`\" pulumi-lang-yaml=\"`zoneIds`\" pulumi-lang-java=\"`zoneIds`\"\u003e`zone_ids`\u003c/span\u003e needs to be omitted.\n"},"canUseAgentCli":{"type":"boolean","description":"Enable this option to give this team access to Using the Agent Console. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"canUseRapidResponse":{"type":"boolean","description":"Enable this option to give this Secure team access to Rapid Response. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"defaultTeam":{"type":"boolean"},"description":{"type":"string","description":"A description of the team.\n"},"filter":{"type":"string","description":"If the team can only see some resources,\nwrite down a filter of such resources.\n"},"name":{"type":"string","description":"The name of the Secure Team. It must be unique and must not exist in Monitor.\n"},"scopeBy":{"type":"string","description":"Scope for the team, either \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e. Default: \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e. If set to \u003cspan pulumi-lang-nodejs=\"`host`\" pulumi-lang-dotnet=\"`Host`\" pulumi-lang-go=\"`host`\" pulumi-lang-python=\"`host`\" pulumi-lang-yaml=\"`host`\" pulumi-lang-java=\"`host`\"\u003e`host`\u003c/span\u003e, team members can see all host-level and container-level information. If set to \u003cspan pulumi-lang-nodejs=\"`container`\" pulumi-lang-dotnet=\"`Container`\" pulumi-lang-go=\"`container`\" pulumi-lang-python=\"`container`\" pulumi-lang-yaml=\"`container`\" pulumi-lang-java=\"`container`\"\u003e`container`\u003c/span\u003e, team members can see only Container-level information.\n"},"secureTeamId":{"type":"string","description":"ID of the created team.\n"},"theme":{"type":"string","description":"Colour of the team. Default: `#73A1F7`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureTeamTimeouts:SecureTeamTimeouts"},"useSysdigCapture":{"type":"boolean","description":"Defines if the team is able to create Sysdig Capture files. Default: \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"userRoles":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureTeamUserRole:SecureTeamUserRole"}},"version":{"type":"number","description":"Current version of the resource.\n"},"zoneIds":{"type":"array","items":{"type":"number"},"description":"List of zone IDs attached to the team. If \u003cspan pulumi-lang-nodejs=\"`allZones`\" pulumi-lang-dotnet=\"`AllZones`\" pulumi-lang-go=\"`allZones`\" pulumi-lang-python=\"`all_zones`\" pulumi-lang-yaml=\"`allZones`\" pulumi-lang-java=\"`allZones`\"\u003e`all_zones`\u003c/span\u003e is specified this argument needs to be omitted.\n"}},"type":"object"}},"sysdig:index/secureVulnerabilityAcceptRisk:SecureVulnerabilityAcceptRisk":{"description":"## Example Usage\n\n### Image risk acceptance\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst acceptResourceImageExact = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_exact\", {\n    image: \"docker.io/library/nginx:1.21.0\",\n    description: \"Accept risk for exact NGINX image\",\n    reason: \"RiskOwned\",\n    stages: [\n        \"pipeline\",\n        \"runtime\",\n    ],\n});\nconst acceptResourceImagePrefix = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_prefix\", {\n    image: \"docker.io/company/app:*\",\n    description: \"Accept risk for all versions of app image\",\n    reason: \"RiskMitigated\",\n    stages: [\"pipeline\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceImageSuffix = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_suffix\", {\n    image: \"*:1.0.0\",\n    description: \"Accept risk for version 1.0.0 images\",\n    reason: \"RiskTransferred\",\n    stages: [\"runtime\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceImageContains = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_contains\", {\n    image: \"*nodejs*\",\n    description: \"Accept risk for any image containing 'nodejs'\",\n    reason: \"RiskNotRelevant\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\naccept_resource_image_exact = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_exact\",\n    image=\"docker.io/library/nginx:1.21.0\",\n    description=\"Accept risk for exact NGINX image\",\n    reason=\"RiskOwned\",\n    stages=[\n        \"pipeline\",\n        \"runtime\",\n    ])\naccept_resource_image_prefix = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_prefix\",\n    image=\"docker.io/company/app:*\",\n    description=\"Accept risk for all versions of app image\",\n    reason=\"RiskMitigated\",\n    stages=[\"pipeline\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_image_suffix = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_suffix\",\n    image=\"*:1.0.0\",\n    description=\"Accept risk for version 1.0.0 images\",\n    reason=\"RiskTransferred\",\n    stages=[\"runtime\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_image_contains = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_contains\",\n    image=\"*nodejs*\",\n    description=\"Accept risk for any image containing 'nodejs'\",\n    reason=\"RiskNotRelevant\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var acceptResourceImageExact = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_exact\", new()\n    {\n        Image = \"docker.io/library/nginx:1.21.0\",\n        Description = \"Accept risk for exact NGINX image\",\n        Reason = \"RiskOwned\",\n        Stages = new[]\n        {\n            \"pipeline\",\n            \"runtime\",\n        },\n    });\n\n    var acceptResourceImagePrefix = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_prefix\", new()\n    {\n        Image = \"docker.io/company/app:*\",\n        Description = \"Accept risk for all versions of app image\",\n        Reason = \"RiskMitigated\",\n        Stages = new[]\n        {\n            \"pipeline\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceImageSuffix = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_suffix\", new()\n    {\n        Image = \"*:1.0.0\",\n        Description = \"Accept risk for version 1.0.0 images\",\n        Reason = \"RiskTransferred\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceImageContains = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_image_contains\", new()\n    {\n        Image = \"*nodejs*\",\n        Description = \"Accept risk for any image containing 'nodejs'\",\n        Reason = \"RiskNotRelevant\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_image_exact\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tImage:       pulumi.String(\"docker.io/library/nginx:1.21.0\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for exact NGINX image\"),\n\t\t\tReason:      pulumi.String(\"RiskOwned\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_image_prefix\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tImage:       pulumi.String(\"docker.io/company/app:*\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for all versions of app image\"),\n\t\t\tReason:      pulumi.String(\"RiskMitigated\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_image_suffix\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tImage:       pulumi.String(\"*:1.0.0\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for version 1.0.0 images\"),\n\t\t\tReason:      pulumi.String(\"RiskTransferred\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_image_contains\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tImage:          pulumi.String(\"*nodejs*\"),\n\t\t\tDescription:    pulumi.String(\"Accept risk for any image containing 'nodejs'\"),\n\t\t\tReason:         pulumi.String(\"RiskNotRelevant\"),\n\t\t\tStages:         pulumi.StringArray{},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRisk;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRiskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var acceptResourceImageExact = new SecureVulnerabilityAcceptRisk(\"acceptResourceImageExact\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .image(\"docker.io/library/nginx:1.21.0\")\n            .description(\"Accept risk for exact NGINX image\")\n            .reason(\"RiskOwned\")\n            .stages(            \n                \"pipeline\",\n                \"runtime\")\n            .build());\n\n        var acceptResourceImagePrefix = new SecureVulnerabilityAcceptRisk(\"acceptResourceImagePrefix\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .image(\"docker.io/company/app:*\")\n            .description(\"Accept risk for all versions of app image\")\n            .reason(\"RiskMitigated\")\n            .stages(\"pipeline\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceImageSuffix = new SecureVulnerabilityAcceptRisk(\"acceptResourceImageSuffix\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .image(\"*:1.0.0\")\n            .description(\"Accept risk for version 1.0.0 images\")\n            .reason(\"RiskTransferred\")\n            .stages(\"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceImageContains = new SecureVulnerabilityAcceptRisk(\"acceptResourceImageContains\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .image(\"*nodejs*\")\n            .description(\"Accept risk for any image containing 'nodejs'\")\n            .reason(\"RiskNotRelevant\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  acceptResourceImageExact:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_image_exact\n    properties:\n      image: docker.io/library/nginx:1.21.0\n      description: Accept risk for exact NGINX image\n      reason: RiskOwned\n      stages:\n        - pipeline\n        - runtime\n  acceptResourceImagePrefix:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_image_prefix\n    properties:\n      image: docker.io/company/app:*\n      description: Accept risk for all versions of app image\n      reason: RiskMitigated\n      stages:\n        - pipeline\n      expirationDate: 2025-01-02\n  acceptResourceImageSuffix:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_image_suffix\n    properties:\n      image: '*:1.0.0'\n      description: Accept risk for version 1.0.0 images\n      reason: RiskTransferred\n      stages:\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceImageContains:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_image_contains\n    properties:\n      image: '*nodejs*'\n      description: Accept risk for any image containing 'nodejs'\n      reason: RiskNotRelevant\n      stages: []\n      expirationDate: 2025-01-02\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Hostname risk acceptance\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst acceptResourceHostnameExact = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_hostname_exact\", {\n    hostname: \"webserver-prod-01.mydomain.com\",\n    description: \"Accept risk for production webserver\",\n    reason: \"RiskOwned\",\n    stages: [\"runtime\"],\n});\nconst acceptResourceHostnameContains = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_hostname_contains\", {\n    hostnameContains: \"staging-\",\n    description: \"Accept risk for all staging hosts\",\n    reason: \"RiskMitigated\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\naccept_resource_hostname_exact = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_hostname_exact\",\n    hostname=\"webserver-prod-01.mydomain.com\",\n    description=\"Accept risk for production webserver\",\n    reason=\"RiskOwned\",\n    stages=[\"runtime\"])\naccept_resource_hostname_contains = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_hostname_contains\",\n    hostname_contains=\"staging-\",\n    description=\"Accept risk for all staging hosts\",\n    reason=\"RiskMitigated\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var acceptResourceHostnameExact = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_hostname_exact\", new()\n    {\n        Hostname = \"webserver-prod-01.mydomain.com\",\n        Description = \"Accept risk for production webserver\",\n        Reason = \"RiskOwned\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n    });\n\n    var acceptResourceHostnameContains = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_hostname_contains\", new()\n    {\n        HostnameContains = \"staging-\",\n        Description = \"Accept risk for all staging hosts\",\n        Reason = \"RiskMitigated\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_hostname_exact\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tHostname:    pulumi.String(\"webserver-prod-01.mydomain.com\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for production webserver\"),\n\t\t\tReason:      pulumi.String(\"RiskOwned\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_hostname_contains\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tHostnameContains: pulumi.String(\"staging-\"),\n\t\t\tDescription:      pulumi.String(\"Accept risk for all staging hosts\"),\n\t\t\tReason:           pulumi.String(\"RiskMitigated\"),\n\t\t\tStages:           pulumi.StringArray{},\n\t\t\tExpirationDate:   pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRisk;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRiskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var acceptResourceHostnameExact = new SecureVulnerabilityAcceptRisk(\"acceptResourceHostnameExact\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .hostname(\"webserver-prod-01.mydomain.com\")\n            .description(\"Accept risk for production webserver\")\n            .reason(\"RiskOwned\")\n            .stages(\"runtime\")\n            .build());\n\n        var acceptResourceHostnameContains = new SecureVulnerabilityAcceptRisk(\"acceptResourceHostnameContains\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .hostnameContains(\"staging-\")\n            .description(\"Accept risk for all staging hosts\")\n            .reason(\"RiskMitigated\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  acceptResourceHostnameExact:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_hostname_exact\n    properties:\n      hostname: webserver-prod-01.mydomain.com\n      description: Accept risk for production webserver\n      reason: RiskOwned\n      stages:\n        - runtime\n  acceptResourceHostnameContains:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_hostname_contains\n    properties:\n      hostnameContains: staging-\n      description: Accept risk for all staging hosts\n      reason: RiskMitigated\n      stages: []\n      expirationDate: 2025-01-02\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### CVE Risk acceptance\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst acceptResourceCveGlobally = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_globally\", {\n    cve: \"CVE-2021-44228\",\n    description: \"Accept risk for CVE-2021-44228 globally\",\n    reason: \"RiskMitigated\",\n    stages: [\"runtime\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCveImageExact = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_exact\", {\n    cve: \"CVE-2022-1234\",\n    image: \"docker.io/library/python:3.9\",\n    description: \"Accept risk for Python 3.9 image\",\n    reason: \"RiskOwned\",\n    stages: [\"pipeline\"],\n});\nconst acceptResourceCveImagePrefix = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_prefix\", {\n    cve: \"CVE-2023-4567\",\n    image: \"docker.io/company/frontend:*\",\n    description: \"Accept risk for all frontend image versions\",\n    reason: \"RiskAvoided\",\n    stages: [\"runtime\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCveImageSuffix = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_suffix\", {\n    cve: \"CVE-2020-5678\",\n    image: \"*:stable\",\n    description: \"Accept risk for stable tag images\",\n    reason: \"RiskNotRelevant\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCveImageContains = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_contains\", {\n    cve: \"CVE-2019-7890\",\n    image: \"*golang*\",\n    description: \"Accept risk for Go-based images\",\n    reason: \"Custom\",\n    stages: [\"pipeline\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCveHostnameExact = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_hostname_exact\", {\n    cve: \"CVE-2022-8901\",\n    hostname: \"api-prod-01.mydomain.com\",\n    description: \"Accept risk for production API server\",\n    reason: \"RiskTransferred\",\n    stages: [\"runtime\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCveHostnameContains = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_hostname_contains\", {\n    cve: \"CVE-2021-5678\",\n    hostnameContains: \"cache\",\n    description: \"Accept risk for cache servers\",\n    reason: \"RiskMitigated\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCvePackage = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_package\", {\n    cve: \"CVE-2018-12345\",\n    packageName: \"openssl\",\n    description: \"Accept risk for OpenSSL package\",\n    reason: \"RiskOwned\",\n    stages: [\n        \"pipeline\",\n        \"runtime\",\n    ],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceCvePackageAndVersion = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_package_and_version\", {\n    cve: \"CVE-2017-6543\",\n    packageName: \"glibc\",\n    packageVersion: \"2.17\",\n    description: \"Accept risk for glibc 2.17 package\",\n    reason: \"RiskAvoided\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\naccept_resource_cve_globally = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_globally\",\n    cve=\"CVE-2021-44228\",\n    description=\"Accept risk for CVE-2021-44228 globally\",\n    reason=\"RiskMitigated\",\n    stages=[\"runtime\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_image_exact = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_exact\",\n    cve=\"CVE-2022-1234\",\n    image=\"docker.io/library/python:3.9\",\n    description=\"Accept risk for Python 3.9 image\",\n    reason=\"RiskOwned\",\n    stages=[\"pipeline\"])\naccept_resource_cve_image_prefix = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_prefix\",\n    cve=\"CVE-2023-4567\",\n    image=\"docker.io/company/frontend:*\",\n    description=\"Accept risk for all frontend image versions\",\n    reason=\"RiskAvoided\",\n    stages=[\"runtime\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_image_suffix = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_suffix\",\n    cve=\"CVE-2020-5678\",\n    image=\"*:stable\",\n    description=\"Accept risk for stable tag images\",\n    reason=\"RiskNotRelevant\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_image_contains = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_contains\",\n    cve=\"CVE-2019-7890\",\n    image=\"*golang*\",\n    description=\"Accept risk for Go-based images\",\n    reason=\"Custom\",\n    stages=[\"pipeline\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_hostname_exact = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_hostname_exact\",\n    cve=\"CVE-2022-8901\",\n    hostname=\"api-prod-01.mydomain.com\",\n    description=\"Accept risk for production API server\",\n    reason=\"RiskTransferred\",\n    stages=[\"runtime\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_hostname_contains = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_hostname_contains\",\n    cve=\"CVE-2021-5678\",\n    hostname_contains=\"cache\",\n    description=\"Accept risk for cache servers\",\n    reason=\"RiskMitigated\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_package = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_package\",\n    cve=\"CVE-2018-12345\",\n    package_name=\"openssl\",\n    description=\"Accept risk for OpenSSL package\",\n    reason=\"RiskOwned\",\n    stages=[\n        \"pipeline\",\n        \"runtime\",\n    ],\n    expiration_date=\"2025-01-02\")\naccept_resource_cve_package_and_version = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_package_and_version\",\n    cve=\"CVE-2017-6543\",\n    package_name=\"glibc\",\n    package_version=\"2.17\",\n    description=\"Accept risk for glibc 2.17 package\",\n    reason=\"RiskAvoided\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var acceptResourceCveGlobally = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_globally\", new()\n    {\n        Cve = \"CVE-2021-44228\",\n        Description = \"Accept risk for CVE-2021-44228 globally\",\n        Reason = \"RiskMitigated\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCveImageExact = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_exact\", new()\n    {\n        Cve = \"CVE-2022-1234\",\n        Image = \"docker.io/library/python:3.9\",\n        Description = \"Accept risk for Python 3.9 image\",\n        Reason = \"RiskOwned\",\n        Stages = new[]\n        {\n            \"pipeline\",\n        },\n    });\n\n    var acceptResourceCveImagePrefix = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_prefix\", new()\n    {\n        Cve = \"CVE-2023-4567\",\n        Image = \"docker.io/company/frontend:*\",\n        Description = \"Accept risk for all frontend image versions\",\n        Reason = \"RiskAvoided\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCveImageSuffix = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_suffix\", new()\n    {\n        Cve = \"CVE-2020-5678\",\n        Image = \"*:stable\",\n        Description = \"Accept risk for stable tag images\",\n        Reason = \"RiskNotRelevant\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCveImageContains = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_image_contains\", new()\n    {\n        Cve = \"CVE-2019-7890\",\n        Image = \"*golang*\",\n        Description = \"Accept risk for Go-based images\",\n        Reason = \"Custom\",\n        Stages = new[]\n        {\n            \"pipeline\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCveHostnameExact = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_hostname_exact\", new()\n    {\n        Cve = \"CVE-2022-8901\",\n        Hostname = \"api-prod-01.mydomain.com\",\n        Description = \"Accept risk for production API server\",\n        Reason = \"RiskTransferred\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCveHostnameContains = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_hostname_contains\", new()\n    {\n        Cve = \"CVE-2021-5678\",\n        HostnameContains = \"cache\",\n        Description = \"Accept risk for cache servers\",\n        Reason = \"RiskMitigated\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCvePackage = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_package\", new()\n    {\n        Cve = \"CVE-2018-12345\",\n        PackageName = \"openssl\",\n        Description = \"Accept risk for OpenSSL package\",\n        Reason = \"RiskOwned\",\n        Stages = new[]\n        {\n            \"pipeline\",\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceCvePackageAndVersion = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_cve_package_and_version\", new()\n    {\n        Cve = \"CVE-2017-6543\",\n        PackageName = \"glibc\",\n        PackageVersion = \"2.17\",\n        Description = \"Accept risk for glibc 2.17 package\",\n        Reason = \"RiskAvoided\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_globally\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:         pulumi.String(\"CVE-2021-44228\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for CVE-2021-44228 globally\"),\n\t\t\tReason:      pulumi.String(\"RiskMitigated\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_image_exact\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:         pulumi.String(\"CVE-2022-1234\"),\n\t\t\tImage:       pulumi.String(\"docker.io/library/python:3.9\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for Python 3.9 image\"),\n\t\t\tReason:      pulumi.String(\"RiskOwned\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_image_prefix\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:         pulumi.String(\"CVE-2023-4567\"),\n\t\t\tImage:       pulumi.String(\"docker.io/company/frontend:*\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for all frontend image versions\"),\n\t\t\tReason:      pulumi.String(\"RiskAvoided\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_image_suffix\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:            pulumi.String(\"CVE-2020-5678\"),\n\t\t\tImage:          pulumi.String(\"*:stable\"),\n\t\t\tDescription:    pulumi.String(\"Accept risk for stable tag images\"),\n\t\t\tReason:         pulumi.String(\"RiskNotRelevant\"),\n\t\t\tStages:         pulumi.StringArray{},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_image_contains\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:         pulumi.String(\"CVE-2019-7890\"),\n\t\t\tImage:       pulumi.String(\"*golang*\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for Go-based images\"),\n\t\t\tReason:      pulumi.String(\"Custom\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_hostname_exact\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:         pulumi.String(\"CVE-2022-8901\"),\n\t\t\tHostname:    pulumi.String(\"api-prod-01.mydomain.com\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for production API server\"),\n\t\t\tReason:      pulumi.String(\"RiskTransferred\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_hostname_contains\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:              pulumi.String(\"CVE-2021-5678\"),\n\t\t\tHostnameContains: pulumi.String(\"cache\"),\n\t\t\tDescription:      pulumi.String(\"Accept risk for cache servers\"),\n\t\t\tReason:           pulumi.String(\"RiskMitigated\"),\n\t\t\tStages:           pulumi.StringArray{},\n\t\t\tExpirationDate:   pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_package\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:         pulumi.String(\"CVE-2018-12345\"),\n\t\t\tPackageName: pulumi.String(\"openssl\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for OpenSSL package\"),\n\t\t\tReason:      pulumi.String(\"RiskOwned\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_cve_package_and_version\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tCve:            pulumi.String(\"CVE-2017-6543\"),\n\t\t\tPackageName:    pulumi.String(\"glibc\"),\n\t\t\tPackageVersion: pulumi.String(\"2.17\"),\n\t\t\tDescription:    pulumi.String(\"Accept risk for glibc 2.17 package\"),\n\t\t\tReason:         pulumi.String(\"RiskAvoided\"),\n\t\t\tStages:         pulumi.StringArray{},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRisk;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRiskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var acceptResourceCveGlobally = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveGlobally\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2021-44228\")\n            .description(\"Accept risk for CVE-2021-44228 globally\")\n            .reason(\"RiskMitigated\")\n            .stages(\"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCveImageExact = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveImageExact\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2022-1234\")\n            .image(\"docker.io/library/python:3.9\")\n            .description(\"Accept risk for Python 3.9 image\")\n            .reason(\"RiskOwned\")\n            .stages(\"pipeline\")\n            .build());\n\n        var acceptResourceCveImagePrefix = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveImagePrefix\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2023-4567\")\n            .image(\"docker.io/company/frontend:*\")\n            .description(\"Accept risk for all frontend image versions\")\n            .reason(\"RiskAvoided\")\n            .stages(\"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCveImageSuffix = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveImageSuffix\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2020-5678\")\n            .image(\"*:stable\")\n            .description(\"Accept risk for stable tag images\")\n            .reason(\"RiskNotRelevant\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCveImageContains = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveImageContains\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2019-7890\")\n            .image(\"*golang*\")\n            .description(\"Accept risk for Go-based images\")\n            .reason(\"Custom\")\n            .stages(\"pipeline\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCveHostnameExact = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveHostnameExact\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2022-8901\")\n            .hostname(\"api-prod-01.mydomain.com\")\n            .description(\"Accept risk for production API server\")\n            .reason(\"RiskTransferred\")\n            .stages(\"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCveHostnameContains = new SecureVulnerabilityAcceptRisk(\"acceptResourceCveHostnameContains\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2021-5678\")\n            .hostnameContains(\"cache\")\n            .description(\"Accept risk for cache servers\")\n            .reason(\"RiskMitigated\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCvePackage = new SecureVulnerabilityAcceptRisk(\"acceptResourceCvePackage\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2018-12345\")\n            .packageName(\"openssl\")\n            .description(\"Accept risk for OpenSSL package\")\n            .reason(\"RiskOwned\")\n            .stages(            \n                \"pipeline\",\n                \"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceCvePackageAndVersion = new SecureVulnerabilityAcceptRisk(\"acceptResourceCvePackageAndVersion\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .cve(\"CVE-2017-6543\")\n            .packageName(\"glibc\")\n            .packageVersion(\"2.17\")\n            .description(\"Accept risk for glibc 2.17 package\")\n            .reason(\"RiskAvoided\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  acceptResourceCveGlobally:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_globally\n    properties:\n      cve: CVE-2021-44228\n      description: Accept risk for CVE-2021-44228 globally\n      reason: RiskMitigated\n      stages:\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceCveImageExact:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_image_exact\n    properties:\n      cve: CVE-2022-1234\n      image: docker.io/library/python:3.9\n      description: Accept risk for Python 3.9 image\n      reason: RiskOwned\n      stages:\n        - pipeline\n  acceptResourceCveImagePrefix:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_image_prefix\n    properties:\n      cve: CVE-2023-4567\n      image: docker.io/company/frontend:*\n      description: Accept risk for all frontend image versions\n      reason: RiskAvoided\n      stages:\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceCveImageSuffix:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_image_suffix\n    properties:\n      cve: CVE-2020-5678\n      image: '*:stable'\n      description: Accept risk for stable tag images\n      reason: RiskNotRelevant\n      stages: []\n      expirationDate: 2025-01-02\n  acceptResourceCveImageContains:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_image_contains\n    properties:\n      cve: CVE-2019-7890\n      image: '*golang*'\n      description: Accept risk for Go-based images\n      reason: Custom\n      stages:\n        - pipeline\n      expirationDate: 2025-01-02\n  acceptResourceCveHostnameExact:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_hostname_exact\n    properties:\n      cve: CVE-2022-8901\n      hostname: api-prod-01.mydomain.com\n      description: Accept risk for production API server\n      reason: RiskTransferred\n      stages:\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceCveHostnameContains:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_hostname_contains\n    properties:\n      cve: CVE-2021-5678\n      hostnameContains: cache\n      description: Accept risk for cache servers\n      reason: RiskMitigated\n      stages: []\n      expirationDate: 2025-01-02\n  acceptResourceCvePackage:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_package\n    properties:\n      cve: CVE-2018-12345\n      packageName: openssl\n      description: Accept risk for OpenSSL package\n      reason: RiskOwned\n      stages:\n        - pipeline\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceCvePackageAndVersion:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_cve_package_and_version\n    properties:\n      cve: CVE-2017-6543\n      packageName: glibc\n      packageVersion: '2.17'\n      description: Accept risk for glibc 2.17 package\n      reason: RiskAvoided\n      stages: []\n      expirationDate: 2025-01-02\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Rule risk acceptance\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst acceptResourceRuleGlobally = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_globally\", {\n    ruleId: \"12345\",\n    description: \"Accept risk for rule globally\",\n    reason: \"Custom\",\n    stages: [\n        \"pipeline\",\n        \"runtime\",\n    ],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceRuleImageExact = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_exact\", {\n    ruleId: \"12345\",\n    image: \"docker.io/library/mysql:8.0\",\n    description: \"Accept risk for MySQL 8.0 image\",\n    reason: \"RiskAvoided\",\n    stages: [\"pipeline\"],\n});\nconst acceptResourceRuleImagePrefix = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_prefix\", {\n    ruleId: \"12345\",\n    image: \"docker.io/company/backend:*\",\n    description: \"Accept risk for backend images\",\n    reason: \"RiskMitigated\",\n    stages: [\"runtime\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceRuleImageSuffix = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_suffix\", {\n    ruleId: \"12345\",\n    image: \"*:latest\",\n    description: \"Accept risk for images tagged as 'latest'\",\n    reason: \"RiskOwned\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceRuleImageContains = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_contains\", {\n    ruleId: \"12345\",\n    image: \"*redis*\",\n    description: \"Accept risk for Redis images\",\n    reason: \"RiskNotRelevant\",\n    stages: [\"pipeline\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceRuleHostnameExact = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_hostname_exact\", {\n    ruleId: \"12345\",\n    hostname: \"db-prod-01.mydomain.com\",\n    description: \"Accept risk for production database host\",\n    reason: \"RiskTransferred\",\n    stages: [\"runtime\"],\n    expirationDate: \"2025-01-02\",\n});\nconst acceptResourceRuleHostnameContains = new sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_hostname_contains\", {\n    ruleId: \"12345\",\n    hostnameContains: \"worker\",\n    description: \"Accept risk for worker nodes\",\n    reason: \"Custom\",\n    stages: [],\n    expirationDate: \"2025-01-02\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\naccept_resource_rule_globally = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_globally\",\n    rule_id=\"12345\",\n    description=\"Accept risk for rule globally\",\n    reason=\"Custom\",\n    stages=[\n        \"pipeline\",\n        \"runtime\",\n    ],\n    expiration_date=\"2025-01-02\")\naccept_resource_rule_image_exact = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_exact\",\n    rule_id=\"12345\",\n    image=\"docker.io/library/mysql:8.0\",\n    description=\"Accept risk for MySQL 8.0 image\",\n    reason=\"RiskAvoided\",\n    stages=[\"pipeline\"])\naccept_resource_rule_image_prefix = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_prefix\",\n    rule_id=\"12345\",\n    image=\"docker.io/company/backend:*\",\n    description=\"Accept risk for backend images\",\n    reason=\"RiskMitigated\",\n    stages=[\"runtime\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_rule_image_suffix = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_suffix\",\n    rule_id=\"12345\",\n    image=\"*:latest\",\n    description=\"Accept risk for images tagged as 'latest'\",\n    reason=\"RiskOwned\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\naccept_resource_rule_image_contains = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_contains\",\n    rule_id=\"12345\",\n    image=\"*redis*\",\n    description=\"Accept risk for Redis images\",\n    reason=\"RiskNotRelevant\",\n    stages=[\"pipeline\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_rule_hostname_exact = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_hostname_exact\",\n    rule_id=\"12345\",\n    hostname=\"db-prod-01.mydomain.com\",\n    description=\"Accept risk for production database host\",\n    reason=\"RiskTransferred\",\n    stages=[\"runtime\"],\n    expiration_date=\"2025-01-02\")\naccept_resource_rule_hostname_contains = sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_hostname_contains\",\n    rule_id=\"12345\",\n    hostname_contains=\"worker\",\n    description=\"Accept risk for worker nodes\",\n    reason=\"Custom\",\n    stages=[],\n    expiration_date=\"2025-01-02\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var acceptResourceRuleGlobally = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_globally\", new()\n    {\n        RuleId = \"12345\",\n        Description = \"Accept risk for rule globally\",\n        Reason = \"Custom\",\n        Stages = new[]\n        {\n            \"pipeline\",\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceRuleImageExact = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_exact\", new()\n    {\n        RuleId = \"12345\",\n        Image = \"docker.io/library/mysql:8.0\",\n        Description = \"Accept risk for MySQL 8.0 image\",\n        Reason = \"RiskAvoided\",\n        Stages = new[]\n        {\n            \"pipeline\",\n        },\n    });\n\n    var acceptResourceRuleImagePrefix = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_prefix\", new()\n    {\n        RuleId = \"12345\",\n        Image = \"docker.io/company/backend:*\",\n        Description = \"Accept risk for backend images\",\n        Reason = \"RiskMitigated\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceRuleImageSuffix = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_suffix\", new()\n    {\n        RuleId = \"12345\",\n        Image = \"*:latest\",\n        Description = \"Accept risk for images tagged as 'latest'\",\n        Reason = \"RiskOwned\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceRuleImageContains = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_image_contains\", new()\n    {\n        RuleId = \"12345\",\n        Image = \"*redis*\",\n        Description = \"Accept risk for Redis images\",\n        Reason = \"RiskNotRelevant\",\n        Stages = new[]\n        {\n            \"pipeline\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceRuleHostnameExact = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_hostname_exact\", new()\n    {\n        RuleId = \"12345\",\n        Hostname = \"db-prod-01.mydomain.com\",\n        Description = \"Accept risk for production database host\",\n        Reason = \"RiskTransferred\",\n        Stages = new[]\n        {\n            \"runtime\",\n        },\n        ExpirationDate = \"2025-01-02\",\n    });\n\n    var acceptResourceRuleHostnameContains = new Sysdig.SecureVulnerabilityAcceptRisk(\"accept_resource_rule_hostname_contains\", new()\n    {\n        RuleId = \"12345\",\n        HostnameContains = \"worker\",\n        Description = \"Accept risk for worker nodes\",\n        Reason = \"Custom\",\n        Stages = new[] {},\n        ExpirationDate = \"2025-01-02\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_globally\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:      pulumi.String(\"12345\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for rule globally\"),\n\t\t\tReason:      pulumi.String(\"Custom\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_image_exact\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:      pulumi.String(\"12345\"),\n\t\t\tImage:       pulumi.String(\"docker.io/library/mysql:8.0\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for MySQL 8.0 image\"),\n\t\t\tReason:      pulumi.String(\"RiskAvoided\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_image_prefix\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:      pulumi.String(\"12345\"),\n\t\t\tImage:       pulumi.String(\"docker.io/company/backend:*\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for backend images\"),\n\t\t\tReason:      pulumi.String(\"RiskMitigated\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_image_suffix\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:         pulumi.String(\"12345\"),\n\t\t\tImage:          pulumi.String(\"*:latest\"),\n\t\t\tDescription:    pulumi.String(\"Accept risk for images tagged as 'latest'\"),\n\t\t\tReason:         pulumi.String(\"RiskOwned\"),\n\t\t\tStages:         pulumi.StringArray{},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_image_contains\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:      pulumi.String(\"12345\"),\n\t\t\tImage:       pulumi.String(\"*redis*\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for Redis images\"),\n\t\t\tReason:      pulumi.String(\"RiskNotRelevant\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"pipeline\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_hostname_exact\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:      pulumi.String(\"12345\"),\n\t\t\tHostname:    pulumi.String(\"db-prod-01.mydomain.com\"),\n\t\t\tDescription: pulumi.String(\"Accept risk for production database host\"),\n\t\t\tReason:      pulumi.String(\"RiskTransferred\"),\n\t\t\tStages: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"runtime\"),\n\t\t\t},\n\t\t\tExpirationDate: pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSecureVulnerabilityAcceptRisk(ctx, \"accept_resource_rule_hostname_contains\", \u0026sysdig.SecureVulnerabilityAcceptRiskArgs{\n\t\t\tRuleId:           pulumi.String(\"12345\"),\n\t\t\tHostnameContains: pulumi.String(\"worker\"),\n\t\t\tDescription:      pulumi.String(\"Accept risk for worker nodes\"),\n\t\t\tReason:           pulumi.String(\"Custom\"),\n\t\t\tStages:           pulumi.StringArray{},\n\t\t\tExpirationDate:   pulumi.String(\"2025-01-02\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRisk;\nimport com.pulumi.sysdig.SecureVulnerabilityAcceptRiskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var acceptResourceRuleGlobally = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleGlobally\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .description(\"Accept risk for rule globally\")\n            .reason(\"Custom\")\n            .stages(            \n                \"pipeline\",\n                \"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceRuleImageExact = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleImageExact\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .image(\"docker.io/library/mysql:8.0\")\n            .description(\"Accept risk for MySQL 8.0 image\")\n            .reason(\"RiskAvoided\")\n            .stages(\"pipeline\")\n            .build());\n\n        var acceptResourceRuleImagePrefix = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleImagePrefix\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .image(\"docker.io/company/backend:*\")\n            .description(\"Accept risk for backend images\")\n            .reason(\"RiskMitigated\")\n            .stages(\"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceRuleImageSuffix = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleImageSuffix\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .image(\"*:latest\")\n            .description(\"Accept risk for images tagged as 'latest'\")\n            .reason(\"RiskOwned\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceRuleImageContains = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleImageContains\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .image(\"*redis*\")\n            .description(\"Accept risk for Redis images\")\n            .reason(\"RiskNotRelevant\")\n            .stages(\"pipeline\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceRuleHostnameExact = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleHostnameExact\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .hostname(\"db-prod-01.mydomain.com\")\n            .description(\"Accept risk for production database host\")\n            .reason(\"RiskTransferred\")\n            .stages(\"runtime\")\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n        var acceptResourceRuleHostnameContains = new SecureVulnerabilityAcceptRisk(\"acceptResourceRuleHostnameContains\", SecureVulnerabilityAcceptRiskArgs.builder()\n            .ruleId(\"12345\")\n            .hostnameContains(\"worker\")\n            .description(\"Accept risk for worker nodes\")\n            .reason(\"Custom\")\n            .stages()\n            .expirationDate(\"2025-01-02\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  acceptResourceRuleGlobally:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_globally\n    properties:\n      ruleId: 12345\n      description: Accept risk for rule globally\n      reason: Custom\n      stages:\n        - pipeline\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceRuleImageExact:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_image_exact\n    properties:\n      ruleId: 12345\n      image: docker.io/library/mysql:8.0\n      description: Accept risk for MySQL 8.0 image\n      reason: RiskAvoided\n      stages:\n        - pipeline\n  acceptResourceRuleImagePrefix:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_image_prefix\n    properties:\n      ruleId: 12345\n      image: docker.io/company/backend:*\n      description: Accept risk for backend images\n      reason: RiskMitigated\n      stages:\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceRuleImageSuffix:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_image_suffix\n    properties:\n      ruleId: 12345\n      image: '*:latest'\n      description: Accept risk for images tagged as 'latest'\n      reason: RiskOwned\n      stages: []\n      expirationDate: 2025-01-02\n  acceptResourceRuleImageContains:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_image_contains\n    properties:\n      ruleId: 12345\n      image: '*redis*'\n      description: Accept risk for Redis images\n      reason: RiskNotRelevant\n      stages:\n        - pipeline\n      expirationDate: 2025-01-02\n  acceptResourceRuleHostnameExact:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_hostname_exact\n    properties:\n      ruleId: 12345\n      hostname: db-prod-01.mydomain.com\n      description: Accept risk for production database host\n      reason: RiskTransferred\n      stages:\n        - runtime\n      expirationDate: 2025-01-02\n  acceptResourceRuleHostnameContains:\n    type: sysdig:SecureVulnerabilityAcceptRisk\n    name: accept_resource_rule_hostname_contains\n    properties:\n      ruleId: 12345\n      hostnameContains: worker\n      description: Accept risk for worker nodes\n      reason: Custom\n      stages: []\n      expirationDate: 2025-01-02\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe vulnerability accept risk can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureVulnerabilityAcceptRisk:SecureVulnerabilityAcceptRisk example 12345\n```\n","properties":{"cve":{"type":"string"},"description":{"type":"string"},"expirationDate":{"type":"string"},"hostname":{"type":"string"},"hostnameContains":{"type":"string"},"image":{"type":"string"},"packageName":{"type":"string"},"packageVersion":{"type":"string"},"reason":{"type":"string"},"ruleId":{"type":"string"},"secureVulnerabilityAcceptRiskId":{"type":"string","description":"(Computed) The ID of the Accept Risk.\n"},"stages":{"type":"array","items":{"type":"string"}}},"type":"object","required":["description","reason","secureVulnerabilityAcceptRiskId"],"inputProperties":{"cve":{"type":"string"},"description":{"type":"string"},"expirationDate":{"type":"string"},"hostname":{"type":"string"},"hostnameContains":{"type":"string"},"image":{"type":"string"},"packageName":{"type":"string"},"packageVersion":{"type":"string"},"reason":{"type":"string"},"ruleId":{"type":"string"},"secureVulnerabilityAcceptRiskId":{"type":"string","description":"(Computed) The ID of the Accept Risk.\n"},"stages":{"type":"array","items":{"type":"string"}}},"requiredInputs":["description","reason"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureVulnerabilityAcceptRisk resources.\n","properties":{"cve":{"type":"string"},"description":{"type":"string"},"expirationDate":{"type":"string"},"hostname":{"type":"string"},"hostnameContains":{"type":"string"},"image":{"type":"string"},"packageName":{"type":"string"},"packageVersion":{"type":"string"},"reason":{"type":"string"},"ruleId":{"type":"string"},"secureVulnerabilityAcceptRiskId":{"type":"string","description":"(Computed) The ID of the Accept Risk.\n"},"stages":{"type":"array","items":{"type":"string"}}},"type":"object"}},"sysdig:index/secureVulnerabilityPolicy:SecureVulnerabilityPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst vulnerabilityPolicyExample = new sysdig.SecureVulnerabilityPolicy(\"vulnerability_policy_example\", {\n    name: \"Vulnerability Policy Name\",\n    description: \"Vulnerability Policy Description\",\n    bundles: [\"1\"],\n    stages: [\n        {\n            name: \"pipeline\",\n            configurations: [{\n                scope: \"container.image != ''\",\n            }],\n        },\n        {\n            name: \"admission_control\",\n            configurations: [{\n                scope: \"kubernetes.cluster.name = 'my-cluster'\",\n                failureAction: \"reject\",\n                unknownImageAction: \"rejectAndScan\",\n            }],\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nvulnerability_policy_example = sysdig.SecureVulnerabilityPolicy(\"vulnerability_policy_example\",\n    name=\"Vulnerability Policy Name\",\n    description=\"Vulnerability Policy Description\",\n    bundles=[\"1\"],\n    stages=[\n        {\n            \"name\": \"pipeline\",\n            \"configurations\": [{\n                \"scope\": \"container.image != ''\",\n            }],\n        },\n        {\n            \"name\": \"admission_control\",\n            \"configurations\": [{\n                \"scope\": \"kubernetes.cluster.name = 'my-cluster'\",\n                \"failure_action\": \"reject\",\n                \"unknown_image_action\": \"rejectAndScan\",\n            }],\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var vulnerabilityPolicyExample = new Sysdig.SecureVulnerabilityPolicy(\"vulnerability_policy_example\", new()\n    {\n        Name = \"Vulnerability Policy Name\",\n        Description = \"Vulnerability Policy Description\",\n        Bundles = new[]\n        {\n            \"1\",\n        },\n        Stages = new[]\n        {\n            new Sysdig.Inputs.SecureVulnerabilityPolicyStageArgs\n            {\n                Name = \"pipeline\",\n                Configurations = new[]\n                {\n                    new Sysdig.Inputs.SecureVulnerabilityPolicyStageConfigurationArgs\n                    {\n                        Scope = \"container.image != ''\",\n                    },\n                },\n            },\n            new Sysdig.Inputs.SecureVulnerabilityPolicyStageArgs\n            {\n                Name = \"admission_control\",\n                Configurations = new[]\n                {\n                    new Sysdig.Inputs.SecureVulnerabilityPolicyStageConfigurationArgs\n                    {\n                        Scope = \"kubernetes.cluster.name = 'my-cluster'\",\n                        FailureAction = \"reject\",\n                        UnknownImageAction = \"rejectAndScan\",\n                    },\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityPolicy(ctx, \"vulnerability_policy_example\", \u0026sysdig.SecureVulnerabilityPolicyArgs{\n\t\t\tName:        pulumi.String(\"Vulnerability Policy Name\"),\n\t\t\tDescription: pulumi.String(\"Vulnerability Policy Description\"),\n\t\t\tBundles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"1\"),\n\t\t\t},\n\t\t\tStages: sysdig.SecureVulnerabilityPolicyStageArray{\n\t\t\t\t\u0026sysdig.SecureVulnerabilityPolicyStageArgs{\n\t\t\t\t\tName: pulumi.String(\"pipeline\"),\n\t\t\t\t\tConfigurations: sysdig.SecureVulnerabilityPolicyStageConfigurationArray{\n\t\t\t\t\t\t\u0026sysdig.SecureVulnerabilityPolicyStageConfigurationArgs{\n\t\t\t\t\t\t\tScope: pulumi.String(\"container.image != ''\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureVulnerabilityPolicyStageArgs{\n\t\t\t\t\tName: pulumi.String(\"admission_control\"),\n\t\t\t\t\tConfigurations: sysdig.SecureVulnerabilityPolicyStageConfigurationArray{\n\t\t\t\t\t\t\u0026sysdig.SecureVulnerabilityPolicyStageConfigurationArgs{\n\t\t\t\t\t\t\tScope:              pulumi.String(\"kubernetes.cluster.name = 'my-cluster'\"),\n\t\t\t\t\t\t\tFailureAction:      pulumi.String(\"reject\"),\n\t\t\t\t\t\t\tUnknownImageAction: pulumi.String(\"rejectAndScan\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityPolicy;\nimport com.pulumi.sysdig.SecureVulnerabilityPolicyArgs;\nimport com.pulumi.sysdig.inputs.SecureVulnerabilityPolicyStageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var vulnerabilityPolicyExample = new SecureVulnerabilityPolicy(\"vulnerabilityPolicyExample\", SecureVulnerabilityPolicyArgs.builder()\n            .name(\"Vulnerability Policy Name\")\n            .description(\"Vulnerability Policy Description\")\n            .bundles(\"1\")\n            .stages(            \n                SecureVulnerabilityPolicyStageArgs.builder()\n                    .name(\"pipeline\")\n                    .configurations(SecureVulnerabilityPolicyStageConfigurationArgs.builder()\n                        .scope(\"container.image != ''\")\n                        .build())\n                    .build(),\n                SecureVulnerabilityPolicyStageArgs.builder()\n                    .name(\"admission_control\")\n                    .configurations(SecureVulnerabilityPolicyStageConfigurationArgs.builder()\n                        .scope(\"kubernetes.cluster.name = 'my-cluster'\")\n                        .failureAction(\"reject\")\n                        .unknownImageAction(\"rejectAndScan\")\n                        .build())\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  vulnerabilityPolicyExample:\n    type: sysdig:SecureVulnerabilityPolicy\n    name: vulnerability_policy_example\n    properties:\n      name: Vulnerability Policy Name\n      description: Vulnerability Policy Description\n      bundles:\n        - '1'\n      stages:\n        - name: pipeline\n          configurations:\n            - scope: container.image != ''\n        - name: admission_control\n          configurations:\n            - scope: kubernetes.cluster.name = 'my-cluster'\n              failureAction: reject\n              unknownImageAction: rejectAndScan\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSecure vulnerability policies can be imported using the policy ID, e.g.:\n\n```sh\n$ pulumi import sysdig:index/secureVulnerabilityPolicy:SecureVulnerabilityPolicy example policy_123456\n```\n","properties":{"bundles":{"type":"array","items":{"type":"string"},"description":"Set of bundle IDs associated with the policy.\n"},"description":{"type":"string","description":"A description of the vulnerability policy.\n"},"identifier":{"type":"string","description":"The external identifier computed after creation.\n"},"name":{"type":"string","description":"The unique name of the vulnerability policy.\n"},"secureVulnerabilityPolicyId":{"type":"string"},"stages":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyStage:SecureVulnerabilityPolicyStage"},"description":"Set defining stages of vulnerability detection.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyTimeouts:SecureVulnerabilityPolicyTimeouts"}},"type":"object","required":["bundles","identifier","name","secureVulnerabilityPolicyId"],"inputProperties":{"bundles":{"type":"array","items":{"type":"string"},"description":"Set of bundle IDs associated with the policy.\n"},"description":{"type":"string","description":"A description of the vulnerability policy.\n"},"name":{"type":"string","description":"The unique name of the vulnerability policy.\n"},"secureVulnerabilityPolicyId":{"type":"string"},"stages":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyStage:SecureVulnerabilityPolicyStage"},"description":"Set defining stages of vulnerability detection.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyTimeouts:SecureVulnerabilityPolicyTimeouts"}},"requiredInputs":["bundles"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureVulnerabilityPolicy resources.\n","properties":{"bundles":{"type":"array","items":{"type":"string"},"description":"Set of bundle IDs associated with the policy.\n"},"description":{"type":"string","description":"A description of the vulnerability policy.\n"},"identifier":{"type":"string","description":"The external identifier computed after creation.\n"},"name":{"type":"string","description":"The unique name of the vulnerability policy.\n"},"secureVulnerabilityPolicyId":{"type":"string"},"stages":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyStage:SecureVulnerabilityPolicyStage"},"description":"Set defining stages of vulnerability detection.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityPolicyTimeouts:SecureVulnerabilityPolicyTimeouts"}},"type":"object"}},"sysdig:index/secureVulnerabilityRuleBundle:SecureVulnerabilityRuleBundle":{"description":"## Example Usage\n\n### Image Label Example\n\nThis example defines a rule bundle that checks for the presence or absence of specific image labels.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst exampleImageLabel = new sysdig.SecureVulnerabilityRuleBundle(\"example_image_label\", {\n    name: \"Example Rule Bundle - Image Label\",\n    rules: [\n        {\n            imageLabel: {\n                labelMustExist: \"required-label\",\n            },\n        },\n        {\n            imageLabel: {\n                labelMustNotExist: \"forbidden-label\",\n            },\n        },\n        {\n            imageLabel: {\n                labelMustExistAndContainValues: [{\n                    requiredLabel: \"required-label\",\n                    requiredValue: \"required-value\",\n                }],\n            },\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample_image_label = sysdig.SecureVulnerabilityRuleBundle(\"example_image_label\",\n    name=\"Example Rule Bundle - Image Label\",\n    rules=[\n        {\n            \"image_label\": {\n                \"label_must_exist\": \"required-label\",\n            },\n        },\n        {\n            \"image_label\": {\n                \"label_must_not_exist\": \"forbidden-label\",\n            },\n        },\n        {\n            \"image_label\": {\n                \"label_must_exist_and_contain_values\": [{\n                    \"required_label\": \"required-label\",\n                    \"required_value\": \"required-value\",\n                }],\n            },\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var exampleImageLabel = new Sysdig.SecureVulnerabilityRuleBundle(\"example_image_label\", new()\n    {\n        Name = \"Example Rule Bundle - Image Label\",\n        Rules = new[]\n        {\n            new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleArgs\n            {\n                ImageLabel = new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleImageLabelArgs\n                {\n                    LabelMustExist = \"required-label\",\n                },\n            },\n            new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleArgs\n            {\n                ImageLabel = new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleImageLabelArgs\n                {\n                    LabelMustNotExist = \"forbidden-label\",\n                },\n            },\n            new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleArgs\n            {\n                ImageLabel = new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleImageLabelArgs\n                {\n                    LabelMustExistAndContainValues = new[]\n                    {\n                        new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValueArgs\n                        {\n                            RequiredLabel = \"required-label\",\n                            RequiredValue = \"required-value\",\n                        },\n                    },\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityRuleBundle(ctx, \"example_image_label\", \u0026sysdig.SecureVulnerabilityRuleBundleArgs{\n\t\t\tName: pulumi.String(\"Example Rule Bundle - Image Label\"),\n\t\t\tRules: sysdig.SecureVulnerabilityRuleBundleRuleArray{\n\t\t\t\t\u0026sysdig.SecureVulnerabilityRuleBundleRuleArgs{\n\t\t\t\t\tImageLabel: \u0026sysdig.SecureVulnerabilityRuleBundleRuleImageLabelArgs{\n\t\t\t\t\t\tLabelMustExist: pulumi.String(\"required-label\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureVulnerabilityRuleBundleRuleArgs{\n\t\t\t\t\tImageLabel: \u0026sysdig.SecureVulnerabilityRuleBundleRuleImageLabelArgs{\n\t\t\t\t\t\tLabelMustNotExist: pulumi.String(\"forbidden-label\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureVulnerabilityRuleBundleRuleArgs{\n\t\t\t\t\tImageLabel: \u0026sysdig.SecureVulnerabilityRuleBundleRuleImageLabelArgs{\n\t\t\t\t\t\tLabelMustExistAndContainValues: sysdig.SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValueArray{\n\t\t\t\t\t\t\t\u0026sysdig.SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValueArgs{\n\t\t\t\t\t\t\t\tRequiredLabel: pulumi.String(\"required-label\"),\n\t\t\t\t\t\t\t\tRequiredValue: pulumi.String(\"required-value\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityRuleBundle;\nimport com.pulumi.sysdig.SecureVulnerabilityRuleBundleArgs;\nimport com.pulumi.sysdig.inputs.SecureVulnerabilityRuleBundleRuleArgs;\nimport com.pulumi.sysdig.inputs.SecureVulnerabilityRuleBundleRuleImageLabelArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var exampleImageLabel = new SecureVulnerabilityRuleBundle(\"exampleImageLabel\", SecureVulnerabilityRuleBundleArgs.builder()\n            .name(\"Example Rule Bundle - Image Label\")\n            .rules(            \n                SecureVulnerabilityRuleBundleRuleArgs.builder()\n                    .imageLabel(SecureVulnerabilityRuleBundleRuleImageLabelArgs.builder()\n                        .labelMustExist(\"required-label\")\n                        .build())\n                    .build(),\n                SecureVulnerabilityRuleBundleRuleArgs.builder()\n                    .imageLabel(SecureVulnerabilityRuleBundleRuleImageLabelArgs.builder()\n                        .labelMustNotExist(\"forbidden-label\")\n                        .build())\n                    .build(),\n                SecureVulnerabilityRuleBundleRuleArgs.builder()\n                    .imageLabel(SecureVulnerabilityRuleBundleRuleImageLabelArgs.builder()\n                        .labelMustExistAndContainValues(SecureVulnerabilityRuleBundleRuleImageLabelLabelMustExistAndContainValueArgs.builder()\n                            .requiredLabel(\"required-label\")\n                            .requiredValue(\"required-value\")\n                            .build())\n                        .build())\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  exampleImageLabel:\n    type: sysdig:SecureVulnerabilityRuleBundle\n    name: example_image_label\n    properties:\n      name: Example Rule Bundle - Image Label\n      rules:\n        - imageLabel:\n            labelMustExist: required-label\n        - imageLabel:\n            labelMustNotExist: forbidden-label\n        - imageLabel:\n            labelMustExistAndContainValues:\n              - requiredLabel: required-label\n                requiredValue: required-value\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Severities and Threats Example\n\nThis example creates a comprehensive rule bundle that evaluates vulnerabilities based on severity, threat intelligence, and other risk factors.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst exampleSeverities = new sysdig.SecureVulnerabilityRuleBundle(\"example_severities\", {\n    name: \"Example Rule Bundle - Severities \u0026 Threats\",\n    description: \"Bundle with rules for high-priority vulnerabilities\",\n    rules: [{\n        severitiesAndThreats: {\n            severityAtLeast: \"high\",\n            disclosureOlderThanDays: 90,\n            packageType: \"os\",\n            inUse: true,\n            fixAvailableSinceDays: 30,\n            publicExploitAvailableSinceDays: 15,\n            exploitNoAdminPrivileges: true,\n            exploitNoUserInteraction: true,\n            exploitNetworkAttackVector: true,\n            cisaKevInRansomwareCampaign: true,\n            cisaKevAvailableSinceDays: 10,\n            cisaKevDueDateInDays: 21,\n            epssScoreAtLeastPercentage: 80,\n            epssPercentileAtLeastPercentage: 90,\n        },\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample_severities = sysdig.SecureVulnerabilityRuleBundle(\"example_severities\",\n    name=\"Example Rule Bundle - Severities \u0026 Threats\",\n    description=\"Bundle with rules for high-priority vulnerabilities\",\n    rules=[{\n        \"severities_and_threats\": {\n            \"severity_at_least\": \"high\",\n            \"disclosure_older_than_days\": 90,\n            \"package_type\": \"os\",\n            \"in_use\": True,\n            \"fix_available_since_days\": 30,\n            \"public_exploit_available_since_days\": 15,\n            \"exploit_no_admin_privileges\": True,\n            \"exploit_no_user_interaction\": True,\n            \"exploit_network_attack_vector\": True,\n            \"cisa_kev_in_ransomware_campaign\": True,\n            \"cisa_kev_available_since_days\": 10,\n            \"cisa_kev_due_date_in_days\": 21,\n            \"epss_score_at_least_percentage\": 80,\n            \"epss_percentile_at_least_percentage\": 90,\n        },\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var exampleSeverities = new Sysdig.SecureVulnerabilityRuleBundle(\"example_severities\", new()\n    {\n        Name = \"Example Rule Bundle - Severities \u0026 Threats\",\n        Description = \"Bundle with rules for high-priority vulnerabilities\",\n        Rules = new[]\n        {\n            new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleArgs\n            {\n                SeveritiesAndThreats = new Sysdig.Inputs.SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsArgs\n                {\n                    SeverityAtLeast = \"high\",\n                    DisclosureOlderThanDays = 90,\n                    PackageType = \"os\",\n                    InUse = true,\n                    FixAvailableSinceDays = 30,\n                    PublicExploitAvailableSinceDays = 15,\n                    ExploitNoAdminPrivileges = true,\n                    ExploitNoUserInteraction = true,\n                    ExploitNetworkAttackVector = true,\n                    CisaKevInRansomwareCampaign = true,\n                    CisaKevAvailableSinceDays = 10,\n                    CisaKevDueDateInDays = 21,\n                    EpssScoreAtLeastPercentage = 80,\n                    EpssPercentileAtLeastPercentage = 90,\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureVulnerabilityRuleBundle(ctx, \"example_severities\", \u0026sysdig.SecureVulnerabilityRuleBundleArgs{\n\t\t\tName:        pulumi.String(\"Example Rule Bundle - Severities \u0026 Threats\"),\n\t\t\tDescription: pulumi.String(\"Bundle with rules for high-priority vulnerabilities\"),\n\t\t\tRules: sysdig.SecureVulnerabilityRuleBundleRuleArray{\n\t\t\t\t\u0026sysdig.SecureVulnerabilityRuleBundleRuleArgs{\n\t\t\t\t\tSeveritiesAndThreats: \u0026sysdig.SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsArgs{\n\t\t\t\t\t\tSeverityAtLeast:                 pulumi.String(\"high\"),\n\t\t\t\t\t\tDisclosureOlderThanDays:         pulumi.Float64(90),\n\t\t\t\t\t\tPackageType:                     pulumi.String(\"os\"),\n\t\t\t\t\t\tInUse:                           pulumi.Bool(true),\n\t\t\t\t\t\tFixAvailableSinceDays:           pulumi.Float64(30),\n\t\t\t\t\t\tPublicExploitAvailableSinceDays: pulumi.Float64(15),\n\t\t\t\t\t\tExploitNoAdminPrivileges:        pulumi.Bool(true),\n\t\t\t\t\t\tExploitNoUserInteraction:        pulumi.Bool(true),\n\t\t\t\t\t\tExploitNetworkAttackVector:      pulumi.Bool(true),\n\t\t\t\t\t\tCisaKevInRansomwareCampaign:     pulumi.Bool(true),\n\t\t\t\t\t\tCisaKevAvailableSinceDays:       pulumi.Float64(10),\n\t\t\t\t\t\tCisaKevDueDateInDays:            pulumi.Float64(21),\n\t\t\t\t\t\tEpssScoreAtLeastPercentage:      pulumi.Float64(80),\n\t\t\t\t\t\tEpssPercentileAtLeastPercentage: pulumi.Float64(90),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureVulnerabilityRuleBundle;\nimport com.pulumi.sysdig.SecureVulnerabilityRuleBundleArgs;\nimport com.pulumi.sysdig.inputs.SecureVulnerabilityRuleBundleRuleArgs;\nimport com.pulumi.sysdig.inputs.SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var exampleSeverities = new SecureVulnerabilityRuleBundle(\"exampleSeverities\", SecureVulnerabilityRuleBundleArgs.builder()\n            .name(\"Example Rule Bundle - Severities \u0026 Threats\")\n            .description(\"Bundle with rules for high-priority vulnerabilities\")\n            .rules(SecureVulnerabilityRuleBundleRuleArgs.builder()\n                .severitiesAndThreats(SecureVulnerabilityRuleBundleRuleSeveritiesAndThreatsArgs.builder()\n                    .severityAtLeast(\"high\")\n                    .disclosureOlderThanDays(90.0)\n                    .packageType(\"os\")\n                    .inUse(true)\n                    .fixAvailableSinceDays(30.0)\n                    .publicExploitAvailableSinceDays(15.0)\n                    .exploitNoAdminPrivileges(true)\n                    .exploitNoUserInteraction(true)\n                    .exploitNetworkAttackVector(true)\n                    .cisaKevInRansomwareCampaign(true)\n                    .cisaKevAvailableSinceDays(10.0)\n                    .cisaKevDueDateInDays(21.0)\n                    .epssScoreAtLeastPercentage(80.0)\n                    .epssPercentileAtLeastPercentage(90.0)\n                    .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  exampleSeverities:\n    type: sysdig:SecureVulnerabilityRuleBundle\n    name: example_severities\n    properties:\n      name: Example Rule Bundle - Severities \u0026 Threats\n      description: Bundle with rules for high-priority vulnerabilities\n      rules:\n        - severitiesAndThreats:\n            severityAtLeast: high\n            disclosureOlderThanDays: 90\n            packageType: os\n            inUse: true\n            fixAvailableSinceDays: 30\n            publicExploitAvailableSinceDays: 15\n            exploitNoAdminPrivileges: true\n            exploitNoUserInteraction: true\n            exploitNetworkAttackVector: true\n            cisaKevInRansomwareCampaign: true\n            cisaKevAvailableSinceDays: 10\n            cisaKevDueDateInDays: 21\n            epssScoreAtLeastPercentage: 80\n            epssPercentileAtLeastPercentage: 90\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nVulnerability rule bundles can be imported using their bundle ID, for example:\n\n```sh\n$ pulumi import sysdig:index/secureVulnerabilityRuleBundle:SecureVulnerabilityRuleBundle example 12345\n```\n\n","properties":{"description":{"type":"string","description":"A description for the rule bundle.\n"},"identifier":{"type":"string","description":"The external identifier of the vulnerability rule bundle.\n"},"name":{"type":"string","description":"The name of the vulnerability rule bundle.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRule:SecureVulnerabilityRuleBundleRule"},"description":"A list of rule definitions. Each \u003cspan pulumi-lang-nodejs=\"`rule`\" pulumi-lang-dotnet=\"`Rule`\" pulumi-lang-go=\"`rule`\" pulumi-lang-python=\"`rule`\" pulumi-lang-yaml=\"`rule`\" pulumi-lang-java=\"`rule`\"\u003e`rule`\u003c/span\u003e block must define exactly one of the available rule types. For more details on rule types, see the [Rules documentation](https://docs.sysdig.com/en/sysdig-secure/policies/vulnerability_policies/rules).\n"},"secureVulnerabilityRuleBundleId":{"type":"string","description":"The internal identifier of the vulnerability rule bundle. This is the ID to be used in the `sysdig_secure_vulnerability_policy.bundles` field.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleTimeouts:SecureVulnerabilityRuleBundleTimeouts"}},"type":"object","required":["identifier","name","rules","secureVulnerabilityRuleBundleId"],"inputProperties":{"description":{"type":"string","description":"A description for the rule bundle.\n"},"name":{"type":"string","description":"The name of the vulnerability rule bundle.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRule:SecureVulnerabilityRuleBundleRule"},"description":"A list of rule definitions. Each \u003cspan pulumi-lang-nodejs=\"`rule`\" pulumi-lang-dotnet=\"`Rule`\" pulumi-lang-go=\"`rule`\" pulumi-lang-python=\"`rule`\" pulumi-lang-yaml=\"`rule`\" pulumi-lang-java=\"`rule`\"\u003e`rule`\u003c/span\u003e block must define exactly one of the available rule types. For more details on rule types, see the [Rules documentation](https://docs.sysdig.com/en/sysdig-secure/policies/vulnerability_policies/rules).\n"},"secureVulnerabilityRuleBundleId":{"type":"string","description":"The internal identifier of the vulnerability rule bundle. This is the ID to be used in the `sysdig_secure_vulnerability_policy.bundles` field.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleTimeouts:SecureVulnerabilityRuleBundleTimeouts"}},"requiredInputs":["rules"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureVulnerabilityRuleBundle resources.\n","properties":{"description":{"type":"string","description":"A description for the rule bundle.\n"},"identifier":{"type":"string","description":"The external identifier of the vulnerability rule bundle.\n"},"name":{"type":"string","description":"The name of the vulnerability rule bundle.\n"},"rules":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleRule:SecureVulnerabilityRuleBundleRule"},"description":"A list of rule definitions. Each \u003cspan pulumi-lang-nodejs=\"`rule`\" pulumi-lang-dotnet=\"`Rule`\" pulumi-lang-go=\"`rule`\" pulumi-lang-python=\"`rule`\" pulumi-lang-yaml=\"`rule`\" pulumi-lang-java=\"`rule`\"\u003e`rule`\u003c/span\u003e block must define exactly one of the available rule types. For more details on rule types, see the [Rules documentation](https://docs.sysdig.com/en/sysdig-secure/policies/vulnerability_policies/rules).\n"},"secureVulnerabilityRuleBundleId":{"type":"string","description":"The internal identifier of the vulnerability rule bundle. This is the ID to be used in the `sysdig_secure_vulnerability_policy.bundles` field.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSecureVulnerabilityRuleBundleTimeouts:SecureVulnerabilityRuleBundleTimeouts"}},"type":"object"}},"sysdig:index/secureZone:SecureZone":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.SecureZone(\"example\", {\n    name: \"example-zone\",\n    description: \"An example Sysdig zone\",\n    scopes: [\n        {\n            targetType: \"aws\",\n            rules: \"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\",\n        },\n        {\n            targetType: \"azure\",\n            rules: \"organization contains \\\"o1\\\"\",\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.SecureZone(\"example\",\n    name=\"example-zone\",\n    description=\"An example Sysdig zone\",\n    scopes=[\n        {\n            \"target_type\": \"aws\",\n            \"rules\": \"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\",\n        },\n        {\n            \"target_type\": \"azure\",\n            \"rules\": \"organization contains \\\"o1\\\"\",\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.SecureZone(\"example\", new()\n    {\n        Name = \"example-zone\",\n        Description = \"An example Sysdig zone\",\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.SecureZoneScopeArgs\n            {\n                TargetType = \"aws\",\n                Rules = \"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\",\n            },\n            new Sysdig.Inputs.SecureZoneScopeArgs\n            {\n                TargetType = \"azure\",\n                Rules = \"organization contains \\\"o1\\\"\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSecureZone(ctx, \"example\", \u0026sysdig.SecureZoneArgs{\n\t\t\tName:        pulumi.String(\"example-zone\"),\n\t\t\tDescription: pulumi.String(\"An example Sysdig zone\"),\n\t\t\tScopes: sysdig.SecureZoneScopeArray{\n\t\t\t\t\u0026sysdig.SecureZoneScopeArgs{\n\t\t\t\t\tTargetType: pulumi.String(\"aws\"),\n\t\t\t\t\tRules:      pulumi.String(\"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\"),\n\t\t\t\t},\n\t\t\t\t\u0026sysdig.SecureZoneScopeArgs{\n\t\t\t\t\tTargetType: pulumi.String(\"azure\"),\n\t\t\t\t\tRules:      pulumi.String(\"organization contains \\\"o1\\\"\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureZone;\nimport com.pulumi.sysdig.SecureZoneArgs;\nimport com.pulumi.sysdig.inputs.SecureZoneScopeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new SecureZone(\"example\", SecureZoneArgs.builder()\n            .name(\"example-zone\")\n            .description(\"An example Sysdig zone\")\n            .scopes(            \n                SecureZoneScopeArgs.builder()\n                    .targetType(\"aws\")\n                    .rules(\"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\")\n                    .build(),\n                SecureZoneScopeArgs.builder()\n                    .targetType(\"azure\")\n                    .rules(\"organization contains \\\"o1\\\"\")\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:SecureZone\n    properties:\n      name: example-zone\n      description: An example Sysdig zone\n      scopes:\n        - targetType: aws\n          rules: organization in (\"o1\", \"o2\") and account in (\"a1\", \"a2\")\n        - targetType: azure\n          rules: organization contains \"o1\"\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nZone can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/secureZone:SecureZone example 12345\n```\n","properties":{"author":{"type":"string","description":"(Computed) The zone author.\n"},"description":{"type":"string","description":"The description of the Zone.\n"},"isSystem":{"type":"boolean","description":"(Computed) Whether the Zone is a system zone.\n"},"lastModifiedBy":{"type":"string","description":"(Computed) By whom is last modification made.\n"},"lastUpdated":{"type":"string","description":"(Computed) Timestamp of last modification of zone.\n"},"name":{"type":"string","description":"The name of the Zone.\n"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureZoneScope:SecureZoneScope"}},"secureZoneId":{"type":"string","description":"(Computed) The ID of the Zone.\n"}},"type":"object","required":["author","isSystem","lastModifiedBy","lastUpdated","name","scopes","secureZoneId"],"inputProperties":{"description":{"type":"string","description":"The description of the Zone.\n"},"name":{"type":"string","description":"The name of the Zone.\n"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureZoneScope:SecureZoneScope"}},"secureZoneId":{"type":"string","description":"(Computed) The ID of the Zone.\n"}},"requiredInputs":["scopes"],"stateInputs":{"description":"Input properties used for looking up and filtering SecureZone resources.\n","properties":{"author":{"type":"string","description":"(Computed) The zone author.\n"},"description":{"type":"string","description":"The description of the Zone.\n"},"isSystem":{"type":"boolean","description":"(Computed) Whether the Zone is a system zone.\n"},"lastModifiedBy":{"type":"string","description":"(Computed) By whom is last modification made.\n"},"lastUpdated":{"type":"string","description":"(Computed) Timestamp of last modification of zone.\n"},"name":{"type":"string","description":"The name of the Zone.\n"},"scopes":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FSecureZoneScope:SecureZoneScope"}},"secureZoneId":{"type":"string","description":"(Computed) The ID of the Zone.\n"}},"type":"object"}},"sysdig:index/ssoGlobalSettings:SsoGlobalSettings":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst monitor = new sysdig.SsoGlobalSettings(\"monitor\", {\n    product: \"monitor\",\n    isPasswordLoginEnabled: true,\n});\nconst secure = new sysdig.SsoGlobalSettings(\"secure\", {\n    product: \"secure\",\n    isPasswordLoginEnabled: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nmonitor = sysdig.SsoGlobalSettings(\"monitor\",\n    product=\"monitor\",\n    is_password_login_enabled=True)\nsecure = sysdig.SsoGlobalSettings(\"secure\",\n    product=\"secure\",\n    is_password_login_enabled=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var monitor = new Sysdig.SsoGlobalSettings(\"monitor\", new()\n    {\n        Product = \"monitor\",\n        IsPasswordLoginEnabled = true,\n    });\n\n    var secure = new Sysdig.SsoGlobalSettings(\"secure\", new()\n    {\n        Product = \"secure\",\n        IsPasswordLoginEnabled = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoGlobalSettings(ctx, \"monitor\", \u0026sysdig.SsoGlobalSettingsArgs{\n\t\t\tProduct:                pulumi.String(\"monitor\"),\n\t\t\tIsPasswordLoginEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewSsoGlobalSettings(ctx, \"secure\", \u0026sysdig.SsoGlobalSettingsArgs{\n\t\t\tProduct:                pulumi.String(\"secure\"),\n\t\t\tIsPasswordLoginEnabled: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoGlobalSettings;\nimport com.pulumi.sysdig.SsoGlobalSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var monitor = new SsoGlobalSettings(\"monitor\", SsoGlobalSettingsArgs.builder()\n            .product(\"monitor\")\n            .isPasswordLoginEnabled(true)\n            .build());\n\n        var secure = new SsoGlobalSettings(\"secure\", SsoGlobalSettingsArgs.builder()\n            .product(\"secure\")\n            .isPasswordLoginEnabled(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  monitor:\n    type: sysdig:SsoGlobalSettings\n    properties:\n      product: monitor\n      isPasswordLoginEnabled: true\n  secure:\n    type: sysdig:SsoGlobalSettings\n    properties:\n      product: secure\n      isPasswordLoginEnabled: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSSO global settings can be imported using the product name:\n\n```sh\n$ pulumi import sysdig:index/ssoGlobalSettings:SsoGlobalSettings monitor monitor\n```\n\n```sh\n$ pulumi import sysdig:index/ssoGlobalSettings:SsoGlobalSettings secure secure\n```\n\n","properties":{"isPasswordLoginEnabled":{"type":"boolean","description":"Whether password-based login is enabled alongside SSO for this product.\n"},"product":{"type":"string","description":"The Sysdig product. Valid values: \u003cspan pulumi-lang-nodejs=\"`monitor`\" pulumi-lang-dotnet=\"`Monitor`\" pulumi-lang-go=\"`monitor`\" pulumi-lang-python=\"`monitor`\" pulumi-lang-yaml=\"`monitor`\" pulumi-lang-java=\"`monitor`\"\u003e`monitor`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`secure`\" pulumi-lang-dotnet=\"`Secure`\" pulumi-lang-go=\"`secure`\" pulumi-lang-python=\"`secure`\" pulumi-lang-yaml=\"`secure`\" pulumi-lang-java=\"`secure`\"\u003e`secure`\u003c/span\u003e. Changing this forces creation of a new resource.\n"},"ssoGlobalSettingsId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGlobalSettingsTimeouts:SsoGlobalSettingsTimeouts"}},"type":"object","required":["isPasswordLoginEnabled","product","ssoGlobalSettingsId"],"inputProperties":{"isPasswordLoginEnabled":{"type":"boolean","description":"Whether password-based login is enabled alongside SSO for this product.\n"},"product":{"type":"string","description":"The Sysdig product. Valid values: \u003cspan pulumi-lang-nodejs=\"`monitor`\" pulumi-lang-dotnet=\"`Monitor`\" pulumi-lang-go=\"`monitor`\" pulumi-lang-python=\"`monitor`\" pulumi-lang-yaml=\"`monitor`\" pulumi-lang-java=\"`monitor`\"\u003e`monitor`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`secure`\" pulumi-lang-dotnet=\"`Secure`\" pulumi-lang-go=\"`secure`\" pulumi-lang-python=\"`secure`\" pulumi-lang-yaml=\"`secure`\" pulumi-lang-java=\"`secure`\"\u003e`secure`\u003c/span\u003e. Changing this forces creation of a new resource.\n"},"ssoGlobalSettingsId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGlobalSettingsTimeouts:SsoGlobalSettingsTimeouts"}},"requiredInputs":["isPasswordLoginEnabled","product"],"stateInputs":{"description":"Input properties used for looking up and filtering SsoGlobalSettings resources.\n","properties":{"isPasswordLoginEnabled":{"type":"boolean","description":"Whether password-based login is enabled alongside SSO for this product.\n"},"product":{"type":"string","description":"The Sysdig product. Valid values: \u003cspan pulumi-lang-nodejs=\"`monitor`\" pulumi-lang-dotnet=\"`Monitor`\" pulumi-lang-go=\"`monitor`\" pulumi-lang-python=\"`monitor`\" pulumi-lang-yaml=\"`monitor`\" pulumi-lang-java=\"`monitor`\"\u003e`monitor`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`secure`\" pulumi-lang-dotnet=\"`Secure`\" pulumi-lang-go=\"`secure`\" pulumi-lang-python=\"`secure`\" pulumi-lang-yaml=\"`secure`\" pulumi-lang-java=\"`secure`\"\u003e`secure`\u003c/span\u003e. Changing this forces creation of a new resource.\n"},"ssoGlobalSettingsId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGlobalSettingsTimeouts:SsoGlobalSettingsTimeouts"}},"type":"object"}},"sysdig:index/ssoGroupMapping:SsoGroupMapping":{"description":"## Example Usage\n\n### Standard role for all teams\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst allTeams = new sysdig.SsoGroupMapping(\"all_teams\", {\n    groupName: \"engineering\",\n    standardTeamRole: \"ROLE_TEAM_STANDARD\",\n    isAdmin: false,\n    teamMap: {\n        isForAllTeams: true,\n    },\n    weight: 10,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nall_teams = sysdig.SsoGroupMapping(\"all_teams\",\n    group_name=\"engineering\",\n    standard_team_role=\"ROLE_TEAM_STANDARD\",\n    is_admin=False,\n    team_map={\n        \"is_for_all_teams\": True,\n    },\n    weight=10)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var allTeams = new Sysdig.SsoGroupMapping(\"all_teams\", new()\n    {\n        GroupName = \"engineering\",\n        StandardTeamRole = \"ROLE_TEAM_STANDARD\",\n        IsAdmin = false,\n        TeamMap = new Sysdig.Inputs.SsoGroupMappingTeamMapArgs\n        {\n            IsForAllTeams = true,\n        },\n        Weight = 10,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoGroupMapping(ctx, \"all_teams\", \u0026sysdig.SsoGroupMappingArgs{\n\t\t\tGroupName:        pulumi.String(\"engineering\"),\n\t\t\tStandardTeamRole: pulumi.String(\"ROLE_TEAM_STANDARD\"),\n\t\t\tIsAdmin:          pulumi.Bool(false),\n\t\t\tTeamMap: \u0026sysdig.SsoGroupMappingTeamMapArgs{\n\t\t\t\tIsForAllTeams: pulumi.Bool(true),\n\t\t\t},\n\t\t\tWeight: pulumi.Float64(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoGroupMapping;\nimport com.pulumi.sysdig.SsoGroupMappingArgs;\nimport com.pulumi.sysdig.inputs.SsoGroupMappingTeamMapArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var allTeams = new SsoGroupMapping(\"allTeams\", SsoGroupMappingArgs.builder()\n            .groupName(\"engineering\")\n            .standardTeamRole(\"ROLE_TEAM_STANDARD\")\n            .isAdmin(false)\n            .teamMap(SsoGroupMappingTeamMapArgs.builder()\n                .isForAllTeams(true)\n                .build())\n            .weight(10.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  allTeams:\n    type: sysdig:SsoGroupMapping\n    name: all_teams\n    properties:\n      groupName: engineering\n      standardTeamRole: ROLE_TEAM_STANDARD\n      isAdmin: false\n      teamMap:\n        isForAllTeams: true\n      weight: 10\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Custom role for specific teams\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst specificTeams = new sysdig.SsoGroupMapping(\"specific_teams\", {\n    groupName: \"devops\",\n    customTeamRoleId: devopsRole.id,\n    teamMap: {\n        isForAllTeams: false,\n        teamIds: [\n            myTeam.id,\n            myTeamSysdigMonitorTeam.id,\n        ],\n    },\n    weight: 20,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nspecific_teams = sysdig.SsoGroupMapping(\"specific_teams\",\n    group_name=\"devops\",\n    custom_team_role_id=devops_role[\"id\"],\n    team_map={\n        \"is_for_all_teams\": False,\n        \"team_ids\": [\n            my_team[\"id\"],\n            my_team_sysdig_monitor_team[\"id\"],\n        ],\n    },\n    weight=20)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var specificTeams = new Sysdig.SsoGroupMapping(\"specific_teams\", new()\n    {\n        GroupName = \"devops\",\n        CustomTeamRoleId = devopsRole.Id,\n        TeamMap = new Sysdig.Inputs.SsoGroupMappingTeamMapArgs\n        {\n            IsForAllTeams = false,\n            TeamIds = new[]\n            {\n                myTeam.Id,\n                myTeamSysdigMonitorTeam.Id,\n            },\n        },\n        Weight = 20,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoGroupMapping(ctx, \"specific_teams\", \u0026sysdig.SsoGroupMappingArgs{\n\t\t\tGroupName:        pulumi.String(\"devops\"),\n\t\t\tCustomTeamRoleId: pulumi.Any(devopsRole.Id),\n\t\t\tTeamMap: \u0026sysdig.SsoGroupMappingTeamMapArgs{\n\t\t\t\tIsForAllTeams: pulumi.Bool(false),\n\t\t\t\tTeamIds: pulumi.Float64Array{\n\t\t\t\t\tmyTeam.Id,\n\t\t\t\t\tmyTeamSysdigMonitorTeam.Id,\n\t\t\t\t},\n\t\t\t},\n\t\t\tWeight: pulumi.Float64(20),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoGroupMapping;\nimport com.pulumi.sysdig.SsoGroupMappingArgs;\nimport com.pulumi.sysdig.inputs.SsoGroupMappingTeamMapArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var specificTeams = new SsoGroupMapping(\"specificTeams\", SsoGroupMappingArgs.builder()\n            .groupName(\"devops\")\n            .customTeamRoleId(devopsRole.id())\n            .teamMap(SsoGroupMappingTeamMapArgs.builder()\n                .isForAllTeams(false)\n                .teamIds(                \n                    myTeam.id(),\n                    myTeamSysdigMonitorTeam.id())\n                .build())\n            .weight(20.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  specificTeams:\n    type: sysdig:SsoGroupMapping\n    name: specific_teams\n    properties:\n      groupName: devops\n      customTeamRoleId: ${devopsRole.id}\n      teamMap:\n        isForAllTeams: false\n        teamIds:\n          - ${myTeam.id}\n          - ${myTeamSysdigMonitorTeam.id}\n      weight: 20\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Admin group mapping\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst admins = new sysdig.SsoGroupMapping(\"admins\", {\n    groupName: \"platform-admins\",\n    standardTeamRole: \"ROLE_TEAM_MANAGER\",\n    isAdmin: true,\n    teamMap: {\n        isForAllTeams: true,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nadmins = sysdig.SsoGroupMapping(\"admins\",\n    group_name=\"platform-admins\",\n    standard_team_role=\"ROLE_TEAM_MANAGER\",\n    is_admin=True,\n    team_map={\n        \"is_for_all_teams\": True,\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var admins = new Sysdig.SsoGroupMapping(\"admins\", new()\n    {\n        GroupName = \"platform-admins\",\n        StandardTeamRole = \"ROLE_TEAM_MANAGER\",\n        IsAdmin = true,\n        TeamMap = new Sysdig.Inputs.SsoGroupMappingTeamMapArgs\n        {\n            IsForAllTeams = true,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoGroupMapping(ctx, \"admins\", \u0026sysdig.SsoGroupMappingArgs{\n\t\t\tGroupName:        pulumi.String(\"platform-admins\"),\n\t\t\tStandardTeamRole: pulumi.String(\"ROLE_TEAM_MANAGER\"),\n\t\t\tIsAdmin:          pulumi.Bool(true),\n\t\t\tTeamMap: \u0026sysdig.SsoGroupMappingTeamMapArgs{\n\t\t\t\tIsForAllTeams: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoGroupMapping;\nimport com.pulumi.sysdig.SsoGroupMappingArgs;\nimport com.pulumi.sysdig.inputs.SsoGroupMappingTeamMapArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var admins = new SsoGroupMapping(\"admins\", SsoGroupMappingArgs.builder()\n            .groupName(\"platform-admins\")\n            .standardTeamRole(\"ROLE_TEAM_MANAGER\")\n            .isAdmin(true)\n            .teamMap(SsoGroupMappingTeamMapArgs.builder()\n                .isForAllTeams(true)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  admins:\n    type: sysdig:SsoGroupMapping\n    properties:\n      groupName: platform-admins\n      standardTeamRole: ROLE_TEAM_MANAGER\n      isAdmin: true\n      teamMap:\n        isForAllTeams: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSSO group mapping can be imported using the ID:\n\n```sh\n$ pulumi import sysdig:index/ssoGroupMapping:SsoGroupMapping example 12345\n```\n","properties":{"customTeamRoleId":{"type":"number","description":"The ID of a custom role to assign to users. Conflicts with \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e. One of \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e must be set.\n"},"groupName":{"type":"string","description":"The SSO group name to map. Maximum 256 characters.\n"},"isAdmin":{"type":"boolean","description":"Whether group members should be Sysdig administrators. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"ssoGroupMappingId":{"type":"string","description":"The ID of the SSO group mapping.\n"},"standardTeamRole":{"type":"string","description":"The standard team role assigned to users. Conflicts with \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e. One of \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e must be set.\n"},"teamMap":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingTeamMap:SsoGroupMappingTeamMap","description":"Block defining team mapping. Maximum 1 block.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingTimeouts:SsoGroupMappingTimeouts"},"weight":{"type":"number","description":"Priority weight for conflict resolution. Lower numbers have higher priority. Must be between 1 and 32767. Default: \u003cspan pulumi-lang-nodejs=\"`32767`\" pulumi-lang-dotnet=\"`32767`\" pulumi-lang-go=\"`32767`\" pulumi-lang-python=\"`32767`\" pulumi-lang-yaml=\"`32767`\" pulumi-lang-java=\"`32767`\"\u003e`32767`\u003c/span\u003e.\n"}},"type":"object","required":["groupName","ssoGroupMappingId","teamMap"],"inputProperties":{"customTeamRoleId":{"type":"number","description":"The ID of a custom role to assign to users. Conflicts with \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e. One of \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e must be set.\n"},"groupName":{"type":"string","description":"The SSO group name to map. Maximum 256 characters.\n"},"isAdmin":{"type":"boolean","description":"Whether group members should be Sysdig administrators. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"ssoGroupMappingId":{"type":"string","description":"The ID of the SSO group mapping.\n"},"standardTeamRole":{"type":"string","description":"The standard team role assigned to users. Conflicts with \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e. One of \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e must be set.\n"},"teamMap":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingTeamMap:SsoGroupMappingTeamMap","description":"Block defining team mapping. Maximum 1 block.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingTimeouts:SsoGroupMappingTimeouts"},"weight":{"type":"number","description":"Priority weight for conflict resolution. Lower numbers have higher priority. Must be between 1 and 32767. Default: \u003cspan pulumi-lang-nodejs=\"`32767`\" pulumi-lang-dotnet=\"`32767`\" pulumi-lang-go=\"`32767`\" pulumi-lang-python=\"`32767`\" pulumi-lang-yaml=\"`32767`\" pulumi-lang-java=\"`32767`\"\u003e`32767`\u003c/span\u003e.\n"}},"requiredInputs":["groupName","teamMap"],"stateInputs":{"description":"Input properties used for looking up and filtering SsoGroupMapping resources.\n","properties":{"customTeamRoleId":{"type":"number","description":"The ID of a custom role to assign to users. Conflicts with \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e. One of \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e must be set.\n"},"groupName":{"type":"string","description":"The SSO group name to map. Maximum 256 characters.\n"},"isAdmin":{"type":"boolean","description":"Whether group members should be Sysdig administrators. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"ssoGroupMappingId":{"type":"string","description":"The ID of the SSO group mapping.\n"},"standardTeamRole":{"type":"string","description":"The standard team role assigned to users. Conflicts with \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e. One of \u003cspan pulumi-lang-nodejs=\"`standardTeamRole`\" pulumi-lang-dotnet=\"`StandardTeamRole`\" pulumi-lang-go=\"`standardTeamRole`\" pulumi-lang-python=\"`standard_team_role`\" pulumi-lang-yaml=\"`standardTeamRole`\" pulumi-lang-java=\"`standardTeamRole`\"\u003e`standard_team_role`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`customTeamRoleId`\" pulumi-lang-dotnet=\"`CustomTeamRoleId`\" pulumi-lang-go=\"`customTeamRoleId`\" pulumi-lang-python=\"`custom_team_role_id`\" pulumi-lang-yaml=\"`customTeamRoleId`\" pulumi-lang-java=\"`customTeamRoleId`\"\u003e`custom_team_role_id`\u003c/span\u003e must be set.\n"},"teamMap":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingTeamMap:SsoGroupMappingTeamMap","description":"Block defining team mapping. Maximum 1 block.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingTimeouts:SsoGroupMappingTimeouts"},"weight":{"type":"number","description":"Priority weight for conflict resolution. Lower numbers have higher priority. Must be between 1 and 32767. Default: \u003cspan pulumi-lang-nodejs=\"`32767`\" pulumi-lang-dotnet=\"`32767`\" pulumi-lang-go=\"`32767`\" pulumi-lang-python=\"`32767`\" pulumi-lang-yaml=\"`32767`\" pulumi-lang-java=\"`32767`\"\u003e`32767`\u003c/span\u003e.\n"}},"type":"object"}},"sysdig:index/ssoGroupMappingSettings:SsoGroupMappingSettings":{"description":"## Example Usage\n\n### Basic configuration\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst _default = new sysdig.SsoGroupMappingSettings(\"default\", {\n    noMappingStrategy: \"UNAUTHORIZED\",\n    differentRolesSameTeamStrategy: \"UNAUTHORIZED\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ndefault = sysdig.SsoGroupMappingSettings(\"default\",\n    no_mapping_strategy=\"UNAUTHORIZED\",\n    different_roles_same_team_strategy=\"UNAUTHORIZED\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var @default = new Sysdig.SsoGroupMappingSettings(\"default\", new()\n    {\n        NoMappingStrategy = \"UNAUTHORIZED\",\n        DifferentRolesSameTeamStrategy = \"UNAUTHORIZED\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoGroupMappingSettings(ctx, \"default\", \u0026sysdig.SsoGroupMappingSettingsArgs{\n\t\t\tNoMappingStrategy:              pulumi.String(\"UNAUTHORIZED\"),\n\t\t\tDifferentRolesSameTeamStrategy: pulumi.String(\"UNAUTHORIZED\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoGroupMappingSettings;\nimport com.pulumi.sysdig.SsoGroupMappingSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var default_ = new SsoGroupMappingSettings(\"default\", SsoGroupMappingSettingsArgs.builder()\n            .noMappingStrategy(\"UNAUTHORIZED\")\n            .differentRolesSameTeamStrategy(\"UNAUTHORIZED\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  default:\n    type: sysdig:SsoGroupMappingSettings\n    properties:\n      noMappingStrategy: UNAUTHORIZED\n      differentRolesSameTeamStrategy: UNAUTHORIZED\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### With error redirect\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst withRedirect = new sysdig.SsoGroupMappingSettings(\"with_redirect\", {\n    noMappingStrategy: \"NO_MAPPINGS_ERROR_REDIRECT\",\n    differentRolesSameTeamStrategy: \"HIGHEST_ROLE\",\n    noMappingsErrorRedirectUrl: \"https://example.com/sso-error\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nwith_redirect = sysdig.SsoGroupMappingSettings(\"with_redirect\",\n    no_mapping_strategy=\"NO_MAPPINGS_ERROR_REDIRECT\",\n    different_roles_same_team_strategy=\"HIGHEST_ROLE\",\n    no_mappings_error_redirect_url=\"https://example.com/sso-error\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var withRedirect = new Sysdig.SsoGroupMappingSettings(\"with_redirect\", new()\n    {\n        NoMappingStrategy = \"NO_MAPPINGS_ERROR_REDIRECT\",\n        DifferentRolesSameTeamStrategy = \"HIGHEST_ROLE\",\n        NoMappingsErrorRedirectUrl = \"https://example.com/sso-error\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoGroupMappingSettings(ctx, \"with_redirect\", \u0026sysdig.SsoGroupMappingSettingsArgs{\n\t\t\tNoMappingStrategy:              pulumi.String(\"NO_MAPPINGS_ERROR_REDIRECT\"),\n\t\t\tDifferentRolesSameTeamStrategy: pulumi.String(\"HIGHEST_ROLE\"),\n\t\t\tNoMappingsErrorRedirectUrl:     pulumi.String(\"https://example.com/sso-error\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoGroupMappingSettings;\nimport com.pulumi.sysdig.SsoGroupMappingSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var withRedirect = new SsoGroupMappingSettings(\"withRedirect\", SsoGroupMappingSettingsArgs.builder()\n            .noMappingStrategy(\"NO_MAPPINGS_ERROR_REDIRECT\")\n            .differentRolesSameTeamStrategy(\"HIGHEST_ROLE\")\n            .noMappingsErrorRedirectUrl(\"https://example.com/sso-error\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  withRedirect:\n    type: sysdig:SsoGroupMappingSettings\n    name: with_redirect\n    properties:\n      noMappingStrategy: NO_MAPPINGS_ERROR_REDIRECT\n      differentRolesSameTeamStrategy: HIGHEST_ROLE\n      noMappingsErrorRedirectUrl: https://example.com/sso-error\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSSO group mapping settings can be imported using the static ID `sso_group_mapping_settings`:\n\n```sh\n$ pulumi import sysdig:index/ssoGroupMappingSettings:SsoGroupMappingSettings default sso_group_mapping_settings\n```\n","properties":{"differentRolesSameTeamStrategy":{"type":"string","description":"Strategy when a user matches multiple mappings with different roles for the same team. Valid values:\n* `UNAUTHORIZED` - Deny access.\n* `HIGHEST_ROLE` - Use the highest-privilege role.\n* `LOWEST_ROLE` - Use the lowest-privilege role.\n"},"noMappingStrategy":{"type":"string","description":"Strategy when no group mapping matches a user. Valid values:\n* `UNAUTHORIZED` - Deny access.\n* `DEFAULT_TEAM_DEFAULT_ROLE` - Assign default team and role.\n* `NO_MAPPINGS_ERROR_REDIRECT` - Redirect to an error URL (requires \u003cspan pulumi-lang-nodejs=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-dotnet=\"`NoMappingsErrorRedirectUrl`\" pulumi-lang-go=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-python=\"`no_mappings_error_redirect_url`\" pulumi-lang-yaml=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-java=\"`noMappingsErrorRedirectUrl`\"\u003e`no_mappings_error_redirect_url`\u003c/span\u003e).\n"},"noMappingsErrorRedirectUrl":{"type":"string","description":"URL to redirect users when \u003cspan pulumi-lang-nodejs=\"`noMappingStrategy`\" pulumi-lang-dotnet=\"`NoMappingStrategy`\" pulumi-lang-go=\"`noMappingStrategy`\" pulumi-lang-python=\"`no_mapping_strategy`\" pulumi-lang-yaml=\"`noMappingStrategy`\" pulumi-lang-java=\"`noMappingStrategy`\"\u003e`no_mapping_strategy`\u003c/span\u003e is `NO_MAPPINGS_ERROR_REDIRECT`. Maximum 2048 characters.\n"},"ssoGroupMappingSettingsId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingSettingsTimeouts:SsoGroupMappingSettingsTimeouts"}},"type":"object","required":["differentRolesSameTeamStrategy","noMappingStrategy","ssoGroupMappingSettingsId"],"inputProperties":{"differentRolesSameTeamStrategy":{"type":"string","description":"Strategy when a user matches multiple mappings with different roles for the same team. Valid values:\n* `UNAUTHORIZED` - Deny access.\n* `HIGHEST_ROLE` - Use the highest-privilege role.\n* `LOWEST_ROLE` - Use the lowest-privilege role.\n"},"noMappingStrategy":{"type":"string","description":"Strategy when no group mapping matches a user. Valid values:\n* `UNAUTHORIZED` - Deny access.\n* `DEFAULT_TEAM_DEFAULT_ROLE` - Assign default team and role.\n* `NO_MAPPINGS_ERROR_REDIRECT` - Redirect to an error URL (requires \u003cspan pulumi-lang-nodejs=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-dotnet=\"`NoMappingsErrorRedirectUrl`\" pulumi-lang-go=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-python=\"`no_mappings_error_redirect_url`\" pulumi-lang-yaml=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-java=\"`noMappingsErrorRedirectUrl`\"\u003e`no_mappings_error_redirect_url`\u003c/span\u003e).\n"},"noMappingsErrorRedirectUrl":{"type":"string","description":"URL to redirect users when \u003cspan pulumi-lang-nodejs=\"`noMappingStrategy`\" pulumi-lang-dotnet=\"`NoMappingStrategy`\" pulumi-lang-go=\"`noMappingStrategy`\" pulumi-lang-python=\"`no_mapping_strategy`\" pulumi-lang-yaml=\"`noMappingStrategy`\" pulumi-lang-java=\"`noMappingStrategy`\"\u003e`no_mapping_strategy`\u003c/span\u003e is `NO_MAPPINGS_ERROR_REDIRECT`. Maximum 2048 characters.\n"},"ssoGroupMappingSettingsId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingSettingsTimeouts:SsoGroupMappingSettingsTimeouts"}},"requiredInputs":["differentRolesSameTeamStrategy","noMappingStrategy"],"stateInputs":{"description":"Input properties used for looking up and filtering SsoGroupMappingSettings resources.\n","properties":{"differentRolesSameTeamStrategy":{"type":"string","description":"Strategy when a user matches multiple mappings with different roles for the same team. Valid values:\n* `UNAUTHORIZED` - Deny access.\n* `HIGHEST_ROLE` - Use the highest-privilege role.\n* `LOWEST_ROLE` - Use the lowest-privilege role.\n"},"noMappingStrategy":{"type":"string","description":"Strategy when no group mapping matches a user. Valid values:\n* `UNAUTHORIZED` - Deny access.\n* `DEFAULT_TEAM_DEFAULT_ROLE` - Assign default team and role.\n* `NO_MAPPINGS_ERROR_REDIRECT` - Redirect to an error URL (requires \u003cspan pulumi-lang-nodejs=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-dotnet=\"`NoMappingsErrorRedirectUrl`\" pulumi-lang-go=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-python=\"`no_mappings_error_redirect_url`\" pulumi-lang-yaml=\"`noMappingsErrorRedirectUrl`\" pulumi-lang-java=\"`noMappingsErrorRedirectUrl`\"\u003e`no_mappings_error_redirect_url`\u003c/span\u003e).\n"},"noMappingsErrorRedirectUrl":{"type":"string","description":"URL to redirect users when \u003cspan pulumi-lang-nodejs=\"`noMappingStrategy`\" pulumi-lang-dotnet=\"`NoMappingStrategy`\" pulumi-lang-go=\"`noMappingStrategy`\" pulumi-lang-python=\"`no_mapping_strategy`\" pulumi-lang-yaml=\"`noMappingStrategy`\" pulumi-lang-java=\"`noMappingStrategy`\"\u003e`no_mapping_strategy`\u003c/span\u003e is `NO_MAPPINGS_ERROR_REDIRECT`. Maximum 2048 characters.\n"},"ssoGroupMappingSettingsId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoGroupMappingSettingsTimeouts:SsoGroupMappingSettingsTimeouts"}},"type":"object"}},"sysdig:index/ssoOpenid:SsoOpenid":{"description":"## Example Usage\n\n### Basic Configuration with Metadata Discovery\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst google = new sysdig.SsoOpenid(\"google\", {\n    issuerUrl: \"https://accounts.google.com\",\n    clientId: \"your-client-id.apps.googleusercontent.com\",\n    clientSecret: \"your-client-secret\",\n    integrationName: \"Google SSO\",\n    isActive: true,\n    isSystem: false,\n    createUserOnLogin: true,\n    isMetadataDiscoveryEnabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ngoogle = sysdig.SsoOpenid(\"google\",\n    issuer_url=\"https://accounts.google.com\",\n    client_id=\"your-client-id.apps.googleusercontent.com\",\n    client_secret=\"your-client-secret\",\n    integration_name=\"Google SSO\",\n    is_active=True,\n    is_system=False,\n    create_user_on_login=True,\n    is_metadata_discovery_enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var google = new Sysdig.SsoOpenid(\"google\", new()\n    {\n        IssuerUrl = \"https://accounts.google.com\",\n        ClientId = \"your-client-id.apps.googleusercontent.com\",\n        ClientSecret = \"your-client-secret\",\n        IntegrationName = \"Google SSO\",\n        IsActive = true,\n        IsSystem = false,\n        CreateUserOnLogin = true,\n        IsMetadataDiscoveryEnabled = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoOpenid(ctx, \"google\", \u0026sysdig.SsoOpenidArgs{\n\t\t\tIssuerUrl:                  pulumi.String(\"https://accounts.google.com\"),\n\t\t\tClientId:                   pulumi.String(\"your-client-id.apps.googleusercontent.com\"),\n\t\t\tClientSecret:               pulumi.String(\"your-client-secret\"),\n\t\t\tIntegrationName:            pulumi.String(\"Google SSO\"),\n\t\t\tIsActive:                   pulumi.Bool(true),\n\t\t\tIsSystem:                   pulumi.Bool(false),\n\t\t\tCreateUserOnLogin:          pulumi.Bool(true),\n\t\t\tIsMetadataDiscoveryEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoOpenid;\nimport com.pulumi.sysdig.SsoOpenidArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var google = new SsoOpenid(\"google\", SsoOpenidArgs.builder()\n            .issuerUrl(\"https://accounts.google.com\")\n            .clientId(\"your-client-id.apps.googleusercontent.com\")\n            .clientSecret(\"your-client-secret\")\n            .integrationName(\"Google SSO\")\n            .isActive(true)\n            .isSystem(false)\n            .createUserOnLogin(true)\n            .isMetadataDiscoveryEnabled(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  google:\n    type: sysdig:SsoOpenid\n    properties:\n      issuerUrl: https://accounts.google.com\n      clientId: your-client-id.apps.googleusercontent.com\n      clientSecret: your-client-secret\n      integrationName: Google SSO\n      isActive: true\n      isSystem: false\n      createUserOnLogin: true\n      isMetadataDiscoveryEnabled: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Configuration with Manual Metadata\n\nWhen using an identity provider that doesn't support metadata discovery, you can provide the metadata manually:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst customIdp = new sysdig.SsoOpenid(\"custom_idp\", {\n    issuerUrl: \"https://idp.example.com\",\n    clientId: \"your-client-id\",\n    clientSecret: \"your-client-secret\",\n    integrationName: \"Custom IDP\",\n    isActive: true,\n    isSystem: false,\n    isMetadataDiscoveryEnabled: false,\n    metadata: {\n        issuer: \"https://idp.example.com\",\n        authorizationEndpoint: \"https://idp.example.com/oauth2/authorize\",\n        tokenEndpoint: \"https://idp.example.com/oauth2/token\",\n        jwksUri: \"https://idp.example.com/.well-known/jwks.json\",\n        tokenAuthMethod: \"CLIENT_SECRET_BASIC\",\n        endSessionEndpoint: \"https://idp.example.com/oauth2/logout\",\n        userInfoEndpoint: \"https://idp.example.com/userinfo\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ncustom_idp = sysdig.SsoOpenid(\"custom_idp\",\n    issuer_url=\"https://idp.example.com\",\n    client_id=\"your-client-id\",\n    client_secret=\"your-client-secret\",\n    integration_name=\"Custom IDP\",\n    is_active=True,\n    is_system=False,\n    is_metadata_discovery_enabled=False,\n    metadata={\n        \"issuer\": \"https://idp.example.com\",\n        \"authorization_endpoint\": \"https://idp.example.com/oauth2/authorize\",\n        \"token_endpoint\": \"https://idp.example.com/oauth2/token\",\n        \"jwks_uri\": \"https://idp.example.com/.well-known/jwks.json\",\n        \"token_auth_method\": \"CLIENT_SECRET_BASIC\",\n        \"end_session_endpoint\": \"https://idp.example.com/oauth2/logout\",\n        \"user_info_endpoint\": \"https://idp.example.com/userinfo\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var customIdp = new Sysdig.SsoOpenid(\"custom_idp\", new()\n    {\n        IssuerUrl = \"https://idp.example.com\",\n        ClientId = \"your-client-id\",\n        ClientSecret = \"your-client-secret\",\n        IntegrationName = \"Custom IDP\",\n        IsActive = true,\n        IsSystem = false,\n        IsMetadataDiscoveryEnabled = false,\n        Metadata = new Sysdig.Inputs.SsoOpenidMetadataArgs\n        {\n            Issuer = \"https://idp.example.com\",\n            AuthorizationEndpoint = \"https://idp.example.com/oauth2/authorize\",\n            TokenEndpoint = \"https://idp.example.com/oauth2/token\",\n            JwksUri = \"https://idp.example.com/.well-known/jwks.json\",\n            TokenAuthMethod = \"CLIENT_SECRET_BASIC\",\n            EndSessionEndpoint = \"https://idp.example.com/oauth2/logout\",\n            UserInfoEndpoint = \"https://idp.example.com/userinfo\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoOpenid(ctx, \"custom_idp\", \u0026sysdig.SsoOpenidArgs{\n\t\t\tIssuerUrl:                  pulumi.String(\"https://idp.example.com\"),\n\t\t\tClientId:                   pulumi.String(\"your-client-id\"),\n\t\t\tClientSecret:               pulumi.String(\"your-client-secret\"),\n\t\t\tIntegrationName:            pulumi.String(\"Custom IDP\"),\n\t\t\tIsActive:                   pulumi.Bool(true),\n\t\t\tIsSystem:                   pulumi.Bool(false),\n\t\t\tIsMetadataDiscoveryEnabled: pulumi.Bool(false),\n\t\t\tMetadata: \u0026sysdig.SsoOpenidMetadataArgs{\n\t\t\t\tIssuer:                pulumi.String(\"https://idp.example.com\"),\n\t\t\t\tAuthorizationEndpoint: pulumi.String(\"https://idp.example.com/oauth2/authorize\"),\n\t\t\t\tTokenEndpoint:         pulumi.String(\"https://idp.example.com/oauth2/token\"),\n\t\t\t\tJwksUri:               pulumi.String(\"https://idp.example.com/.well-known/jwks.json\"),\n\t\t\t\tTokenAuthMethod:       pulumi.String(\"CLIENT_SECRET_BASIC\"),\n\t\t\t\tEndSessionEndpoint:    pulumi.String(\"https://idp.example.com/oauth2/logout\"),\n\t\t\t\tUserInfoEndpoint:      pulumi.String(\"https://idp.example.com/userinfo\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoOpenid;\nimport com.pulumi.sysdig.SsoOpenidArgs;\nimport com.pulumi.sysdig.inputs.SsoOpenidMetadataArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var customIdp = new SsoOpenid(\"customIdp\", SsoOpenidArgs.builder()\n            .issuerUrl(\"https://idp.example.com\")\n            .clientId(\"your-client-id\")\n            .clientSecret(\"your-client-secret\")\n            .integrationName(\"Custom IDP\")\n            .isActive(true)\n            .isSystem(false)\n            .isMetadataDiscoveryEnabled(false)\n            .metadata(SsoOpenidMetadataArgs.builder()\n                .issuer(\"https://idp.example.com\")\n                .authorizationEndpoint(\"https://idp.example.com/oauth2/authorize\")\n                .tokenEndpoint(\"https://idp.example.com/oauth2/token\")\n                .jwksUri(\"https://idp.example.com/.well-known/jwks.json\")\n                .tokenAuthMethod(\"CLIENT_SECRET_BASIC\")\n                .endSessionEndpoint(\"https://idp.example.com/oauth2/logout\")\n                .userInfoEndpoint(\"https://idp.example.com/userinfo\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  customIdp:\n    type: sysdig:SsoOpenid\n    name: custom_idp\n    properties:\n      issuerUrl: https://idp.example.com\n      clientId: your-client-id\n      clientSecret: your-client-secret\n      integrationName: Custom IDP\n      isActive: true\n      isSystem: false\n      isMetadataDiscoveryEnabled: false\n      metadata:\n        issuer: https://idp.example.com\n        authorizationEndpoint: https://idp.example.com/oauth2/authorize\n        tokenEndpoint: https://idp.example.com/oauth2/token\n        jwksUri: https://idp.example.com/.well-known/jwks.json\n        tokenAuthMethod: CLIENT_SECRET_BASIC\n        endSessionEndpoint: https://idp.example.com/oauth2/logout\n        userInfoEndpoint: https://idp.example.com/userinfo\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Configuration with Group Mapping and Additional Scopes\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst okta = new sysdig.SsoOpenid(\"okta\", {\n    issuerUrl: \"https://your-org.okta.com\",\n    clientId: \"your-client-id\",\n    clientSecret: \"your-client-secret\",\n    integrationName: \"Okta SSO\",\n    isActive: true,\n    isSystem: false,\n    createUserOnLogin: true,\n    isGroupMappingEnabled: true,\n    groupMappingAttributeName: \"groups\",\n    isSingleLogoutEnabled: true,\n    isAdditionalScopesCheckEnabled: true,\n    additionalScopes: [\n        \"groups\",\n        \"profile\",\n        \"email\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nokta = sysdig.SsoOpenid(\"okta\",\n    issuer_url=\"https://your-org.okta.com\",\n    client_id=\"your-client-id\",\n    client_secret=\"your-client-secret\",\n    integration_name=\"Okta SSO\",\n    is_active=True,\n    is_system=False,\n    create_user_on_login=True,\n    is_group_mapping_enabled=True,\n    group_mapping_attribute_name=\"groups\",\n    is_single_logout_enabled=True,\n    is_additional_scopes_check_enabled=True,\n    additional_scopes=[\n        \"groups\",\n        \"profile\",\n        \"email\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var okta = new Sysdig.SsoOpenid(\"okta\", new()\n    {\n        IssuerUrl = \"https://your-org.okta.com\",\n        ClientId = \"your-client-id\",\n        ClientSecret = \"your-client-secret\",\n        IntegrationName = \"Okta SSO\",\n        IsActive = true,\n        IsSystem = false,\n        CreateUserOnLogin = true,\n        IsGroupMappingEnabled = true,\n        GroupMappingAttributeName = \"groups\",\n        IsSingleLogoutEnabled = true,\n        IsAdditionalScopesCheckEnabled = true,\n        AdditionalScopes = new[]\n        {\n            \"groups\",\n            \"profile\",\n            \"email\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoOpenid(ctx, \"okta\", \u0026sysdig.SsoOpenidArgs{\n\t\t\tIssuerUrl:                      pulumi.String(\"https://your-org.okta.com\"),\n\t\t\tClientId:                       pulumi.String(\"your-client-id\"),\n\t\t\tClientSecret:                   pulumi.String(\"your-client-secret\"),\n\t\t\tIntegrationName:                pulumi.String(\"Okta SSO\"),\n\t\t\tIsActive:                       pulumi.Bool(true),\n\t\t\tIsSystem:                       pulumi.Bool(false),\n\t\t\tCreateUserOnLogin:              pulumi.Bool(true),\n\t\t\tIsGroupMappingEnabled:          pulumi.Bool(true),\n\t\t\tGroupMappingAttributeName:      pulumi.String(\"groups\"),\n\t\t\tIsSingleLogoutEnabled:          pulumi.Bool(true),\n\t\t\tIsAdditionalScopesCheckEnabled: pulumi.Bool(true),\n\t\t\tAdditionalScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"groups\"),\n\t\t\t\tpulumi.String(\"profile\"),\n\t\t\t\tpulumi.String(\"email\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoOpenid;\nimport com.pulumi.sysdig.SsoOpenidArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var okta = new SsoOpenid(\"okta\", SsoOpenidArgs.builder()\n            .issuerUrl(\"https://your-org.okta.com\")\n            .clientId(\"your-client-id\")\n            .clientSecret(\"your-client-secret\")\n            .integrationName(\"Okta SSO\")\n            .isActive(true)\n            .isSystem(false)\n            .createUserOnLogin(true)\n            .isGroupMappingEnabled(true)\n            .groupMappingAttributeName(\"groups\")\n            .isSingleLogoutEnabled(true)\n            .isAdditionalScopesCheckEnabled(true)\n            .additionalScopes(            \n                \"groups\",\n                \"profile\",\n                \"email\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  okta:\n    type: sysdig:SsoOpenid\n    properties:\n      issuerUrl: https://your-org.okta.com\n      clientId: your-client-id\n      clientSecret: your-client-secret\n      integrationName: Okta SSO\n      isActive: true\n      isSystem: false\n      createUserOnLogin: true\n      isGroupMappingEnabled: true\n      groupMappingAttributeName: groups\n      isSingleLogoutEnabled: true\n      isAdditionalScopesCheckEnabled: true\n      additionalScopes:\n        - groups\n        - profile\n        - email\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSysdig SSO OpenID configurations can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/ssoOpenid:SsoOpenid example 12345\n```\nFor system-level SSO configurations (on-prem), prefix the ID with `system/`:\n\n```sh\n$ pulumi import sysdig:index/ssoOpenid:SsoOpenid example system/12345\n```\n~\u003e __Note:__ The `client_secret` attribute cannot be imported and must be set in the configuration after import.\n\n","properties":{"additionalScopes":{"type":"array","items":{"type":"string"},"description":"Additional OAuth scopes to request"},"clientId":{"type":"string","description":"The OAuth 2.0 client ID"},"clientSecret":{"type":"string","description":"The OAuth 2.0 client secret","secret":true},"createUserOnLogin":{"type":"boolean","description":"Whether to create a new user upon first login"},"groupMappingAttributeName":{"type":"string","description":"The attribute name for group mapping"},"integrationName":{"type":"string","description":"A name to distinguish different SSO integrations (cannot be changed after creation)"},"isActive":{"type":"boolean","description":"Whether the SSO configuration is active"},"isAdditionalScopesCheckEnabled":{"type":"boolean","description":"Whether additional scopes check is enabled"},"isGroupMappingEnabled":{"type":"boolean","description":"Whether group mapping is enabled"},"isMetadataDiscoveryEnabled":{"type":"boolean","description":"Whether to use automatic metadata discovery from the issuer URL"},"isSingleLogoutEnabled":{"type":"boolean","description":"Whether single logout is enabled"},"isSystem":{"type":"boolean","description":"Whether this is a system SSO configuration (Only applicable to on-prem installations)"},"issuerUrl":{"type":"string","description":"The OpenID Connect issuer URL (e.g., https://accounts.google.com)"},"metadata":{"$ref":"#/types/sysdig:index%2FSsoOpenidMetadata:SsoOpenidMetadata","description":"Manual metadata configuration (required when\u003cspan pulumi-lang-nodejs=\" isMetadataDiscoveryEnabled \" pulumi-lang-dotnet=\" IsMetadataDiscoveryEnabled \" pulumi-lang-go=\" isMetadataDiscoveryEnabled \" pulumi-lang-python=\" is_metadata_discovery_enabled \" pulumi-lang-yaml=\" isMetadataDiscoveryEnabled \" pulumi-lang-java=\" isMetadataDiscoveryEnabled \"\u003e is_metadata_discovery_enabled \u003c/span\u003eis false)"},"product":{"type":"string","description":"The Sysdig product (monitor or secure)"},"ssoOpenidId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoOpenidTimeouts:SsoOpenidTimeouts"},"version":{"type":"number","description":"The version of the SSO configuration (used for optimistic locking).\n"}},"type":"object","required":["clientId","clientSecret","issuerUrl","ssoOpenidId","version"],"inputProperties":{"additionalScopes":{"type":"array","items":{"type":"string"},"description":"Additional OAuth scopes to request"},"clientId":{"type":"string","description":"The OAuth 2.0 client ID"},"clientSecret":{"type":"string","description":"The OAuth 2.0 client secret","secret":true},"createUserOnLogin":{"type":"boolean","description":"Whether to create a new user upon first login"},"groupMappingAttributeName":{"type":"string","description":"The attribute name for group mapping"},"integrationName":{"type":"string","description":"A name to distinguish different SSO integrations (cannot be changed after creation)"},"isActive":{"type":"boolean","description":"Whether the SSO configuration is active"},"isAdditionalScopesCheckEnabled":{"type":"boolean","description":"Whether additional scopes check is enabled"},"isGroupMappingEnabled":{"type":"boolean","description":"Whether group mapping is enabled"},"isMetadataDiscoveryEnabled":{"type":"boolean","description":"Whether to use automatic metadata discovery from the issuer URL"},"isSingleLogoutEnabled":{"type":"boolean","description":"Whether single logout is enabled"},"isSystem":{"type":"boolean","description":"Whether this is a system SSO configuration (Only applicable to on-prem installations)"},"issuerUrl":{"type":"string","description":"The OpenID Connect issuer URL (e.g., https://accounts.google.com)"},"metadata":{"$ref":"#/types/sysdig:index%2FSsoOpenidMetadata:SsoOpenidMetadata","description":"Manual metadata configuration (required when\u003cspan pulumi-lang-nodejs=\" isMetadataDiscoveryEnabled \" pulumi-lang-dotnet=\" IsMetadataDiscoveryEnabled \" pulumi-lang-go=\" isMetadataDiscoveryEnabled \" pulumi-lang-python=\" is_metadata_discovery_enabled \" pulumi-lang-yaml=\" isMetadataDiscoveryEnabled \" pulumi-lang-java=\" isMetadataDiscoveryEnabled \"\u003e is_metadata_discovery_enabled \u003c/span\u003eis false)"},"product":{"type":"string","description":"The Sysdig product (monitor or secure)"},"ssoOpenidId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoOpenidTimeouts:SsoOpenidTimeouts"}},"requiredInputs":["clientId","clientSecret","issuerUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering SsoOpenid resources.\n","properties":{"additionalScopes":{"type":"array","items":{"type":"string"},"description":"Additional OAuth scopes to request"},"clientId":{"type":"string","description":"The OAuth 2.0 client ID"},"clientSecret":{"type":"string","description":"The OAuth 2.0 client secret","secret":true},"createUserOnLogin":{"type":"boolean","description":"Whether to create a new user upon first login"},"groupMappingAttributeName":{"type":"string","description":"The attribute name for group mapping"},"integrationName":{"type":"string","description":"A name to distinguish different SSO integrations (cannot be changed after creation)"},"isActive":{"type":"boolean","description":"Whether the SSO configuration is active"},"isAdditionalScopesCheckEnabled":{"type":"boolean","description":"Whether additional scopes check is enabled"},"isGroupMappingEnabled":{"type":"boolean","description":"Whether group mapping is enabled"},"isMetadataDiscoveryEnabled":{"type":"boolean","description":"Whether to use automatic metadata discovery from the issuer URL"},"isSingleLogoutEnabled":{"type":"boolean","description":"Whether single logout is enabled"},"isSystem":{"type":"boolean","description":"Whether this is a system SSO configuration (Only applicable to on-prem installations)"},"issuerUrl":{"type":"string","description":"The OpenID Connect issuer URL (e.g., https://accounts.google.com)"},"metadata":{"$ref":"#/types/sysdig:index%2FSsoOpenidMetadata:SsoOpenidMetadata","description":"Manual metadata configuration (required when\u003cspan pulumi-lang-nodejs=\" isMetadataDiscoveryEnabled \" pulumi-lang-dotnet=\" IsMetadataDiscoveryEnabled \" pulumi-lang-go=\" isMetadataDiscoveryEnabled \" pulumi-lang-python=\" is_metadata_discovery_enabled \" pulumi-lang-yaml=\" isMetadataDiscoveryEnabled \" pulumi-lang-java=\" isMetadataDiscoveryEnabled \"\u003e is_metadata_discovery_enabled \u003c/span\u003eis false)"},"product":{"type":"string","description":"The Sysdig product (monitor or secure)"},"ssoOpenidId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoOpenidTimeouts:SsoOpenidTimeouts"},"version":{"type":"number","description":"The version of the SSO configuration (used for optimistic locking).\n"}},"type":"object"}},"sysdig:index/ssoSaml:SsoSaml":{"description":"## Example Usage\n\n### Basic example with metadata URL\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = new sysdig.SsoSaml(\"example\", {\n    metadataUrl: \"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n    emailParameter: \"email\",\n    integrationName: \"Corporate SAML SSO\",\n    isActive: true,\n    isSystem: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.SsoSaml(\"example\",\n    metadata_url=\"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n    email_parameter=\"email\",\n    integration_name=\"Corporate SAML SSO\",\n    is_active=True,\n    is_system=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Sysdig.SsoSaml(\"example\", new()\n    {\n        MetadataUrl = \"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n        EmailParameter = \"email\",\n        IntegrationName = \"Corporate SAML SSO\",\n        IsActive = true,\n        IsSystem = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoSaml(ctx, \"example\", \u0026sysdig.SsoSamlArgs{\n\t\t\tMetadataUrl:     pulumi.String(\"https://idp.example.com/app/sysdig/sso/saml/metadata\"),\n\t\t\tEmailParameter:  pulumi.String(\"email\"),\n\t\t\tIntegrationName: pulumi.String(\"Corporate SAML SSO\"),\n\t\t\tIsActive:        pulumi.Bool(true),\n\t\t\tIsSystem:        pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoSaml;\nimport com.pulumi.sysdig.SsoSamlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new SsoSaml(\"example\", SsoSamlArgs.builder()\n            .metadataUrl(\"https://idp.example.com/app/sysdig/sso/saml/metadata\")\n            .emailParameter(\"email\")\n            .integrationName(\"Corporate SAML SSO\")\n            .isActive(true)\n            .isSystem(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: sysdig:SsoSaml\n    properties:\n      metadataUrl: https://idp.example.com/app/sysdig/sso/saml/metadata\n      emailParameter: email\n      integrationName: Corporate SAML SSO\n      isActive: true\n      isSystem: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Example with inline metadata XML\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst exampleXml = new sysdig.SsoSaml(\"example_xml\", {\n    metadataXml: `\u003c?xml version=\\\\\"1.0\\\\\" encoding=\\\\\"UTF-8\\\\\"?\u003e\n\u003cEntityDescriptor xmlns=\\\\\"urn:oasis:names:tc:SAML:2.0:metadata\\\\\" entityID=\\\\\"https://idp.example.com\\\\\"\u003e\n  \u003cIDPSSODescriptor protocolSupportEnumeration=\\\\\"urn:oasis:names:tc:SAML:2.0:protocol\\\\\"\u003e\n    \u003cSingleSignOnService Binding=\\\\\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\\\\" Location=\\\\\"https://idp.example.com/sso\\\\\"/\u003e\n  \u003c/IDPSSODescriptor\u003e\n\u003c/EntityDescriptor\u003e\n`,\n    emailParameter: \"email\",\n    integrationName: \"Corporate SAML SSO\",\n    isActive: true,\n    isSystem: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample_xml = sysdig.SsoSaml(\"example_xml\",\n    metadata_xml=\"\"\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\n\u003cEntityDescriptor xmlns=\\\"urn:oasis:names:tc:SAML:2.0:metadata\\\" entityID=\\\"https://idp.example.com\\\"\u003e\n  \u003cIDPSSODescriptor protocolSupportEnumeration=\\\"urn:oasis:names:tc:SAML:2.0:protocol\\\"\u003e\n    \u003cSingleSignOnService Binding=\\\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\\" Location=\\\"https://idp.example.com/sso\\\"/\u003e\n  \u003c/IDPSSODescriptor\u003e\n\u003c/EntityDescriptor\u003e\n\"\"\",\n    email_parameter=\"email\",\n    integration_name=\"Corporate SAML SSO\",\n    is_active=True,\n    is_system=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var exampleXml = new Sysdig.SsoSaml(\"example_xml\", new()\n    {\n        MetadataXml = @\"\u003c?xml version=\\\"\"1.0\\\"\" encoding=\\\"\"UTF-8\\\"\"?\u003e\n\u003cEntityDescriptor xmlns=\\\"\"urn:oasis:names:tc:SAML:2.0:metadata\\\"\" entityID=\\\"\"https://idp.example.com\\\"\"\u003e\n  \u003cIDPSSODescriptor protocolSupportEnumeration=\\\"\"urn:oasis:names:tc:SAML:2.0:protocol\\\"\"\u003e\n    \u003cSingleSignOnService Binding=\\\"\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\\"\" Location=\\\"\"https://idp.example.com/sso\\\"\"/\u003e\n  \u003c/IDPSSODescriptor\u003e\n\u003c/EntityDescriptor\u003e\n\",\n        EmailParameter = \"email\",\n        IntegrationName = \"Corporate SAML SSO\",\n        IsActive = true,\n        IsSystem = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoSaml(ctx, \"example_xml\", \u0026sysdig.SsoSamlArgs{\n\t\t\tMetadataXml: pulumi.String(`\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\n\u003cEntityDescriptor xmlns=\\\"urn:oasis:names:tc:SAML:2.0:metadata\\\" entityID=\\\"https://idp.example.com\\\"\u003e\n  \u003cIDPSSODescriptor protocolSupportEnumeration=\\\"urn:oasis:names:tc:SAML:2.0:protocol\\\"\u003e\n    \u003cSingleSignOnService Binding=\\\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\\" Location=\\\"https://idp.example.com/sso\\\"/\u003e\n  \u003c/IDPSSODescriptor\u003e\n\u003c/EntityDescriptor\u003e\n`),\n\t\t\tEmailParameter:  pulumi.String(\"email\"),\n\t\t\tIntegrationName: pulumi.String(\"Corporate SAML SSO\"),\n\t\t\tIsActive:        pulumi.Bool(true),\n\t\t\tIsSystem:        pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoSaml;\nimport com.pulumi.sysdig.SsoSamlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var exampleXml = new SsoSaml(\"exampleXml\", SsoSamlArgs.builder()\n            .metadataXml(\"\"\"\n\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\n\u003cEntityDescriptor xmlns=\\\"urn:oasis:names:tc:SAML:2.0:metadata\\\" entityID=\\\"https://idp.example.com\\\"\u003e\n  \u003cIDPSSODescriptor protocolSupportEnumeration=\\\"urn:oasis:names:tc:SAML:2.0:protocol\\\"\u003e\n    \u003cSingleSignOnService Binding=\\\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\\" Location=\\\"https://idp.example.com/sso\\\"/\u003e\n  \u003c/IDPSSODescriptor\u003e\n\u003c/EntityDescriptor\u003e\n            \"\"\")\n            .emailParameter(\"email\")\n            .integrationName(\"Corporate SAML SSO\")\n            .isActive(true)\n            .isSystem(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  exampleXml:\n    type: sysdig:SsoSaml\n    name: example_xml\n    properties:\n      metadataXml: |\n        \u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\n        \u003cEntityDescriptor xmlns=\\\"urn:oasis:names:tc:SAML:2.0:metadata\\\" entityID=\\\"https://idp.example.com\\\"\u003e\n          \u003cIDPSSODescriptor protocolSupportEnumeration=\\\"urn:oasis:names:tc:SAML:2.0:protocol\\\"\u003e\n            \u003cSingleSignOnService Binding=\\\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\\\" Location=\\\"https://idp.example.com/sso\\\"/\u003e\n          \u003c/IDPSSODescriptor\u003e\n        \u003c/EntityDescriptor\u003e\n      emailParameter: email\n      integrationName: Corporate SAML SSO\n      isActive: true\n      isSystem: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Example with group mapping enabled\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst exampleGroups = new sysdig.SsoSaml(\"example_groups\", {\n    metadataUrl: \"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n    emailParameter: \"email\",\n    integrationName: \"Corporate SAML SSO\",\n    isActive: true,\n    isSystem: false,\n    isGroupMappingEnabled: true,\n    groupMappingAttributeName: \"groups\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample_groups = sysdig.SsoSaml(\"example_groups\",\n    metadata_url=\"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n    email_parameter=\"email\",\n    integration_name=\"Corporate SAML SSO\",\n    is_active=True,\n    is_system=False,\n    is_group_mapping_enabled=True,\n    group_mapping_attribute_name=\"groups\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var exampleGroups = new Sysdig.SsoSaml(\"example_groups\", new()\n    {\n        MetadataUrl = \"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n        EmailParameter = \"email\",\n        IntegrationName = \"Corporate SAML SSO\",\n        IsActive = true,\n        IsSystem = false,\n        IsGroupMappingEnabled = true,\n        GroupMappingAttributeName = \"groups\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoSaml(ctx, \"example_groups\", \u0026sysdig.SsoSamlArgs{\n\t\t\tMetadataUrl:               pulumi.String(\"https://idp.example.com/app/sysdig/sso/saml/metadata\"),\n\t\t\tEmailParameter:            pulumi.String(\"email\"),\n\t\t\tIntegrationName:           pulumi.String(\"Corporate SAML SSO\"),\n\t\t\tIsActive:                  pulumi.Bool(true),\n\t\t\tIsSystem:                  pulumi.Bool(false),\n\t\t\tIsGroupMappingEnabled:     pulumi.Bool(true),\n\t\t\tGroupMappingAttributeName: pulumi.String(\"groups\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoSaml;\nimport com.pulumi.sysdig.SsoSamlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var exampleGroups = new SsoSaml(\"exampleGroups\", SsoSamlArgs.builder()\n            .metadataUrl(\"https://idp.example.com/app/sysdig/sso/saml/metadata\")\n            .emailParameter(\"email\")\n            .integrationName(\"Corporate SAML SSO\")\n            .isActive(true)\n            .isSystem(false)\n            .isGroupMappingEnabled(true)\n            .groupMappingAttributeName(\"groups\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  exampleGroups:\n    type: sysdig:SsoSaml\n    name: example_groups\n    properties:\n      metadataUrl: https://idp.example.com/app/sysdig/sso/saml/metadata\n      emailParameter: email\n      integrationName: Corporate SAML SSO\n      isActive: true\n      isSystem: false\n      isGroupMappingEnabled: true\n      groupMappingAttributeName: groups\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Example with custom security settings\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst exampleSecurity = new sysdig.SsoSaml(\"example_security\", {\n    metadataUrl: \"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n    emailParameter: \"email\",\n    integrationName: \"Corporate SAML SSO\",\n    isActive: true,\n    isSignatureValidationEnabled: true,\n    isSignedAssertionEnabled: true,\n    isDestinationVerificationEnabled: true,\n    isEncryptionSupportEnabled: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample_security = sysdig.SsoSaml(\"example_security\",\n    metadata_url=\"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n    email_parameter=\"email\",\n    integration_name=\"Corporate SAML SSO\",\n    is_active=True,\n    is_signature_validation_enabled=True,\n    is_signed_assertion_enabled=True,\n    is_destination_verification_enabled=True,\n    is_encryption_support_enabled=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var exampleSecurity = new Sysdig.SsoSaml(\"example_security\", new()\n    {\n        MetadataUrl = \"https://idp.example.com/app/sysdig/sso/saml/metadata\",\n        EmailParameter = \"email\",\n        IntegrationName = \"Corporate SAML SSO\",\n        IsActive = true,\n        IsSignatureValidationEnabled = true,\n        IsSignedAssertionEnabled = true,\n        IsDestinationVerificationEnabled = true,\n        IsEncryptionSupportEnabled = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewSsoSaml(ctx, \"example_security\", \u0026sysdig.SsoSamlArgs{\n\t\t\tMetadataUrl:                      pulumi.String(\"https://idp.example.com/app/sysdig/sso/saml/metadata\"),\n\t\t\tEmailParameter:                   pulumi.String(\"email\"),\n\t\t\tIntegrationName:                  pulumi.String(\"Corporate SAML SSO\"),\n\t\t\tIsActive:                         pulumi.Bool(true),\n\t\t\tIsSignatureValidationEnabled:     pulumi.Bool(true),\n\t\t\tIsSignedAssertionEnabled:         pulumi.Bool(true),\n\t\t\tIsDestinationVerificationEnabled: pulumi.Bool(true),\n\t\t\tIsEncryptionSupportEnabled:       pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SsoSaml;\nimport com.pulumi.sysdig.SsoSamlArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var exampleSecurity = new SsoSaml(\"exampleSecurity\", SsoSamlArgs.builder()\n            .metadataUrl(\"https://idp.example.com/app/sysdig/sso/saml/metadata\")\n            .emailParameter(\"email\")\n            .integrationName(\"Corporate SAML SSO\")\n            .isActive(true)\n            .isSignatureValidationEnabled(true)\n            .isSignedAssertionEnabled(true)\n            .isDestinationVerificationEnabled(true)\n            .isEncryptionSupportEnabled(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  exampleSecurity:\n    type: sysdig:SsoSaml\n    name: example_security\n    properties:\n      metadataUrl: https://idp.example.com/app/sysdig/sso/saml/metadata\n      emailParameter: email\n      integrationName: Corporate SAML SSO\n      isActive: true\n      isSignatureValidationEnabled: true\n      isSignedAssertionEnabled: true\n      isDestinationVerificationEnabled: true\n      isEncryptionSupportEnabled: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSAML SSO configurations can be imported using the SSO configuration ID:\n\n```sh\n$ pulumi import sysdig:index/ssoSaml:SsoSaml example 12345\n```\nFor system-level SSO configurations (on-prem), prefix the ID with `system/`:\n\n```sh\n$ pulumi import sysdig:index/ssoSaml:SsoSaml example system/12345\n```\n","properties":{"createUserOnLogin":{"type":"boolean","description":"Whether to create a new user upon first login"},"emailParameter":{"type":"string","description":"The SAML attribute name that contains the user's email address"},"groupMappingAttributeName":{"type":"string","description":"The SAML attribute name for group mapping"},"integrationName":{"type":"string","description":"A name to distinguish different SSO integrations (cannot be changed after creation)"},"isActive":{"type":"boolean","description":"Whether the SSO configuration is active"},"isDestinationVerificationEnabled":{"type":"boolean","description":"Whether destination verification is enabled"},"isEncryptionSupportEnabled":{"type":"boolean","description":"Whether encryption support is enabled"},"isGroupMappingEnabled":{"type":"boolean","description":"Whether group mapping is enabled"},"isSignatureValidationEnabled":{"type":"boolean","description":"Whether SAML response signature validation is enabled"},"isSignedAssertionEnabled":{"type":"boolean","description":"Whether signed SAML assertions are required"},"isSingleLogoutEnabled":{"type":"boolean","description":"Whether single logout is enabled"},"isSystem":{"type":"boolean","description":"Whether this is a system SSO configuration (Only applicable to on-prem installations)"},"metadataUrl":{"type":"string","description":"The URL to fetch SAML metadata from the IdP"},"metadataXml":{"type":"string","description":"The raw SAML metadata XML from the IdP"},"product":{"type":"string","description":"The Sysdig product (monitor or secure)"},"ssoSamlId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoSamlTimeouts:SsoSamlTimeouts"},"version":{"type":"number","description":"The version of the SSO configuration, used for optimistic locking during updates.\n"}},"type":"object","required":["emailParameter","ssoSamlId","version"],"inputProperties":{"createUserOnLogin":{"type":"boolean","description":"Whether to create a new user upon first login"},"emailParameter":{"type":"string","description":"The SAML attribute name that contains the user's email address"},"groupMappingAttributeName":{"type":"string","description":"The SAML attribute name for group mapping"},"integrationName":{"type":"string","description":"A name to distinguish different SSO integrations (cannot be changed after creation)"},"isActive":{"type":"boolean","description":"Whether the SSO configuration is active"},"isDestinationVerificationEnabled":{"type":"boolean","description":"Whether destination verification is enabled"},"isEncryptionSupportEnabled":{"type":"boolean","description":"Whether encryption support is enabled"},"isGroupMappingEnabled":{"type":"boolean","description":"Whether group mapping is enabled"},"isSignatureValidationEnabled":{"type":"boolean","description":"Whether SAML response signature validation is enabled"},"isSignedAssertionEnabled":{"type":"boolean","description":"Whether signed SAML assertions are required"},"isSingleLogoutEnabled":{"type":"boolean","description":"Whether single logout is enabled"},"isSystem":{"type":"boolean","description":"Whether this is a system SSO configuration (Only applicable to on-prem installations)"},"metadataUrl":{"type":"string","description":"The URL to fetch SAML metadata from the IdP"},"metadataXml":{"type":"string","description":"The raw SAML metadata XML from the IdP"},"product":{"type":"string","description":"The Sysdig product (monitor or secure)"},"ssoSamlId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoSamlTimeouts:SsoSamlTimeouts"}},"requiredInputs":["emailParameter"],"stateInputs":{"description":"Input properties used for looking up and filtering SsoSaml resources.\n","properties":{"createUserOnLogin":{"type":"boolean","description":"Whether to create a new user upon first login"},"emailParameter":{"type":"string","description":"The SAML attribute name that contains the user's email address"},"groupMappingAttributeName":{"type":"string","description":"The SAML attribute name for group mapping"},"integrationName":{"type":"string","description":"A name to distinguish different SSO integrations (cannot be changed after creation)"},"isActive":{"type":"boolean","description":"Whether the SSO configuration is active"},"isDestinationVerificationEnabled":{"type":"boolean","description":"Whether destination verification is enabled"},"isEncryptionSupportEnabled":{"type":"boolean","description":"Whether encryption support is enabled"},"isGroupMappingEnabled":{"type":"boolean","description":"Whether group mapping is enabled"},"isSignatureValidationEnabled":{"type":"boolean","description":"Whether SAML response signature validation is enabled"},"isSignedAssertionEnabled":{"type":"boolean","description":"Whether signed SAML assertions are required"},"isSingleLogoutEnabled":{"type":"boolean","description":"Whether single logout is enabled"},"isSystem":{"type":"boolean","description":"Whether this is a system SSO configuration (Only applicable to on-prem installations)"},"metadataUrl":{"type":"string","description":"The URL to fetch SAML metadata from the IdP"},"metadataXml":{"type":"string","description":"The raw SAML metadata XML from the IdP"},"product":{"type":"string","description":"The Sysdig product (monitor or secure)"},"ssoSamlId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FSsoSamlTimeouts:SsoSamlTimeouts"},"version":{"type":"number","description":"The version of the SSO configuration, used for optimistic locking during updates.\n"}},"type":"object"}},"sysdig:index/teamServiceAccount:TeamServiceAccount":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\nimport * as time from \"@pulumi/time\";\n\nconst example = new time.index.Static(\"example\", {rfc3339: \"2025-01-01T00:00:00Z\"});\nconst devops = new sysdig.MonitorTeam(\"devops\", {\n    name: \"Monitoring DevOps team\",\n    entrypoints: [{\n        type: \"Explore\",\n    }],\n});\nconst service_account = new sysdig.TeamServiceAccount(\"service-account\", {\n    name: \"read only\",\n    role: \"ROLE_TEAM_READ\",\n    expirationDate: example.unix,\n    teamId: devops.monitorTeamId,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\nimport pulumi_time as time\n\nexample = time.index.Static(\"example\", rfc3339=2025-01-01T00:00:00Z)\ndevops = sysdig.MonitorTeam(\"devops\",\n    name=\"Monitoring DevOps team\",\n    entrypoints=[{\n        \"type\": \"Explore\",\n    }])\nservice_account = sysdig.TeamServiceAccount(\"service-account\",\n    name=\"read only\",\n    role=\"ROLE_TEAM_READ\",\n    expiration_date=example[\"unix\"],\n    team_id=devops.monitor_team_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\nusing Time = Pulumi.Time;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Time.Index.Static(\"example\", new()\n    {\n        Rfc3339 = \"2025-01-01T00:00:00Z\",\n    });\n\n    var devops = new Sysdig.MonitorTeam(\"devops\", new()\n    {\n        Name = \"Monitoring DevOps team\",\n        Entrypoints = new[]\n        {\n            new Sysdig.Inputs.MonitorTeamEntrypointArgs\n            {\n                Type = \"Explore\",\n            },\n        },\n    });\n\n    var service_account = new Sysdig.TeamServiceAccount(\"service-account\", new()\n    {\n        Name = \"read only\",\n        Role = \"ROLE_TEAM_READ\",\n        ExpirationDate = example.Unix,\n        TeamId = devops.MonitorTeamId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi-time/sdk/go/time\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := time.NewStatic(ctx, \"example\", \u0026time.StaticArgs{\n\t\t\tRfc3339: \"2025-01-01T00:00:00Z\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdevops, err := sysdig.NewMonitorTeam(ctx, \"devops\", \u0026sysdig.MonitorTeamArgs{\n\t\t\tName: pulumi.String(\"Monitoring DevOps team\"),\n\t\t\tEntrypoints: sysdig.MonitorTeamEntrypointArray{\n\t\t\t\t\u0026sysdig.MonitorTeamEntrypointArgs{\n\t\t\t\t\tType: pulumi.String(\"Explore\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewTeamServiceAccount(ctx, \"service-account\", \u0026sysdig.TeamServiceAccountArgs{\n\t\t\tName:           pulumi.String(\"read only\"),\n\t\t\tRole:           pulumi.String(\"ROLE_TEAM_READ\"),\n\t\t\tExpirationDate: example.Unix,\n\t\t\tTeamId:         devops.MonitorTeamId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.time.Static;\nimport com.pulumi.time.StaticArgs;\nimport com.pulumi.sysdig.MonitorTeam;\nimport com.pulumi.sysdig.MonitorTeamArgs;\nimport com.pulumi.sysdig.inputs.MonitorTeamEntrypointArgs;\nimport com.pulumi.sysdig.TeamServiceAccount;\nimport com.pulumi.sysdig.TeamServiceAccountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new Static(\"example\", StaticArgs.builder()\n            .rfc3339(\"2025-01-01T00:00:00Z\")\n            .build());\n\n        var devops = new MonitorTeam(\"devops\", MonitorTeamArgs.builder()\n            .name(\"Monitoring DevOps team\")\n            .entrypoints(MonitorTeamEntrypointArgs.builder()\n                .type(\"Explore\")\n                .build())\n            .build());\n\n        var service_account = new TeamServiceAccount(\"service-account\", TeamServiceAccountArgs.builder()\n            .name(\"read only\")\n            .role(\"ROLE_TEAM_READ\")\n            .expirationDate(example.unix())\n            .teamId(devops.monitorTeamId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: time:Static\n    properties:\n      rfc3339: 2025-01-01T00:00:00Z\n  devops:\n    type: sysdig:MonitorTeam\n    properties:\n      name: Monitoring DevOps team\n      entrypoints:\n        - type: Explore\n  service-account:\n    type: sysdig:TeamServiceAccount\n    properties:\n      name: read only\n      role: ROLE_TEAM_READ\n      expirationDate: ${example.unix}\n      teamId: ${devops.monitorTeamId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSysdig team service account can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/teamServiceAccount:TeamServiceAccount my_team_service_account 10\n```\n","properties":{"apiKey":{"type":"string","description":"The api key to be using in API calls\n","secret":true},"dateCreated":{"type":"number","description":"The team service account creation date\n"},"expirationDate":{"type":"number","description":"The service account expiration date.\n"},"name":{"type":"string","description":"The team service account name.\n"},"role":{"type":"string","description":"The role that is assigned to the service account. It can be a standard role or a custom team role ID.\n"},"systemRole":{"type":"string","description":"The service account system role. The only value supported is `ROLE_SERVICE_ACCOUNT`\n"},"teamId":{"type":"number","description":"The team where the service account belongs to.\n"},"teamServiceAccountId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FTeamServiceAccountTimeouts:TeamServiceAccountTimeouts"}},"type":"object","required":["apiKey","dateCreated","expirationDate","name","teamId","teamServiceAccountId"],"inputProperties":{"expirationDate":{"type":"number","description":"The service account expiration date.\n"},"name":{"type":"string","description":"The team service account name.\n"},"role":{"type":"string","description":"The role that is assigned to the service account. It can be a standard role or a custom team role ID.\n"},"systemRole":{"type":"string","description":"The service account system role. The only value supported is `ROLE_SERVICE_ACCOUNT`\n"},"teamId":{"type":"number","description":"The team where the service account belongs to.\n"},"teamServiceAccountId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FTeamServiceAccountTimeouts:TeamServiceAccountTimeouts"}},"requiredInputs":["expirationDate","teamId"],"stateInputs":{"description":"Input properties used for looking up and filtering TeamServiceAccount resources.\n","properties":{"apiKey":{"type":"string","description":"The api key to be using in API calls\n","secret":true},"dateCreated":{"type":"number","description":"The team service account creation date\n"},"expirationDate":{"type":"number","description":"The service account expiration date.\n"},"name":{"type":"string","description":"The team service account name.\n"},"role":{"type":"string","description":"The role that is assigned to the service account. It can be a standard role or a custom team role ID.\n"},"systemRole":{"type":"string","description":"The service account system role. The only value supported is `ROLE_SERVICE_ACCOUNT`\n"},"teamId":{"type":"number","description":"The team where the service account belongs to.\n"},"teamServiceAccountId":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FTeamServiceAccountTimeouts:TeamServiceAccountTimeouts"}},"type":"object"}},"sysdig:index/user:User":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst foo_bar = new sysdig.User(\"foo-bar\", {\n    email: \"foo.bar@sysdig.com\",\n    systemRole: \"ROLE_CUSTOMER\",\n    firstName: \"foo\",\n    lastName: \"bar\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nfoo_bar = sysdig.User(\"foo-bar\",\n    email=\"foo.bar@sysdig.com\",\n    system_role=\"ROLE_CUSTOMER\",\n    first_name=\"foo\",\n    last_name=\"bar\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var foo_bar = new Sysdig.User(\"foo-bar\", new()\n    {\n        Email = \"foo.bar@sysdig.com\",\n        SystemRole = \"ROLE_CUSTOMER\",\n        FirstName = \"foo\",\n        LastName = \"bar\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.NewUser(ctx, \"foo-bar\", \u0026sysdig.UserArgs{\n\t\t\tEmail:      pulumi.String(\"foo.bar@sysdig.com\"),\n\t\t\tSystemRole: pulumi.String(\"ROLE_CUSTOMER\"),\n\t\t\tFirstName:  pulumi.String(\"foo\"),\n\t\t\tLastName:   pulumi.String(\"bar\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.User;\nimport com.pulumi.sysdig.UserArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var foo_bar = new User(\"foo-bar\", UserArgs.builder()\n            .email(\"foo.bar@sysdig.com\")\n            .systemRole(\"ROLE_CUSTOMER\")\n            .firstName(\"foo\")\n            .lastName(\"bar\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  foo-bar:\n    type: sysdig:User\n    properties:\n      email: foo.bar@sysdig.com\n      systemRole: ROLE_CUSTOMER\n      firstName: foo\n      lastName: bar\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nSysdig users can be imported using the ID, e.g.\n\n```sh\n$ pulumi import sysdig:index/user:User example 12345\n```\n","properties":{"email":{"type":"string","description":"The email for the user to invite.\n"},"firstName":{"type":"string","description":"The name of the user.\n"},"lastName":{"type":"string","description":"The last name of the user.\n"},"systemRole":{"type":"string","description":"The privileges for the user. It can be either \"ROLE_USER\" or \"ROLE_CUSTOMER\".\nIf set to \"ROLE_CUSTOMER\", the user will be known as an admin.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FUserTimeouts:UserTimeouts"},"userId":{"type":"string"},"version":{"type":"number"}},"type":"object","required":["email","userId","version"],"inputProperties":{"email":{"type":"string","description":"The email for the user to invite.\n"},"firstName":{"type":"string","description":"The name of the user.\n"},"lastName":{"type":"string","description":"The last name of the user.\n"},"systemRole":{"type":"string","description":"The privileges for the user. It can be either \"ROLE_USER\" or \"ROLE_CUSTOMER\".\nIf set to \"ROLE_CUSTOMER\", the user will be known as an admin.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FUserTimeouts:UserTimeouts"},"userId":{"type":"string"}},"requiredInputs":["email"],"stateInputs":{"description":"Input properties used for looking up and filtering User resources.\n","properties":{"email":{"type":"string","description":"The email for the user to invite.\n"},"firstName":{"type":"string","description":"The name of the user.\n"},"lastName":{"type":"string","description":"The last name of the user.\n"},"systemRole":{"type":"string","description":"The privileges for the user. It can be either \"ROLE_USER\" or \"ROLE_CUSTOMER\".\nIf set to \"ROLE_CUSTOMER\", the user will be known as an admin.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FUserTimeouts:UserTimeouts"},"userId":{"type":"string"},"version":{"type":"number"}},"type":"object"}}},"functions":{"pulumi:providers:sysdig/terraformConfig":{"description":"This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.","inputs":{"properties":{"__self__":{"$ref":"#/resources/pulumi:providers:sysdig"}},"type":"object","required":["__self__"]},"outputs":{"properties":{"result":{"additionalProperties":{"$ref":"pulumi.json#/Any"},"type":"object"}},"required":["result"],"type":"object"}},"sysdig:index/getAgentAccessKey:getAgentAccessKey":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sysdigAgentAccessKey = sysdig.getAgentAccessKey({\n    id: 631123,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsysdig_agent_access_key = sysdig.get_agent_access_key(id=631123)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sysdigAgentAccessKey = Sysdig.GetAgentAccessKey.Invoke(new()\n    {\n        Id = 631123,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupAgentAccessKey(ctx, \u0026sysdig.LookupAgentAccessKeyArgs{\n\t\t\tId: 631123,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetAgentAccessKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var sysdigAgentAccessKey = SysdigFunctions.getAgentAccessKey(GetAgentAccessKeyArgs.builder()\n            .id(631123)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  sysdigAgentAccessKey:\n    fn::invoke:\n      function: sysdig:getAgentAccessKey\n      arguments:\n        id: '631123'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getAgentAccessKey.\n","properties":{"id":{"type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetAgentAccessKeyTimeouts:getAgentAccessKeyTimeouts"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getAgentAccessKey.\n","properties":{"accessKey":{"description":"The agent access key\n","type":"string"},"dateCreated":{"description":"Date when the agent key was created.\n","type":"string"},"dateDisabled":{"description":"Date when the agent key was last disabled.\n","type":"string"},"enabled":{"description":"Whether the agent access key is enabled or not.\n","type":"boolean"},"id":{"type":"number"},"limit":{"description":"The limit of the agent access key.\n","type":"number"},"metadata":{"additionalProperties":{"type":"string"},"description":"The metadata of agent access key.\n","type":"object"},"reservation":{"description":"The reservation of the agent access key.\n","type":"number"},"teamId":{"description":"The team id of the agent access key.\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetAgentAccessKeyTimeouts:getAgentAccessKeyTimeouts"}},"required":["accessKey","dateCreated","dateDisabled","enabled","id","limit","metadata","reservation","teamId"],"type":"object"}},"sysdig:index/getBuiltinRole:getBuiltinRole":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst advancedUser = sysdig.getBuiltinRole({\n    name: \"Advanced User\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nadvanced_user = sysdig.get_builtin_role(name=\"Advanced User\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var advancedUser = Sysdig.GetBuiltinRole.Invoke(new()\n    {\n        Name = \"Advanced User\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetBuiltinRole(ctx, \u0026sysdig.GetBuiltinRoleArgs{\n\t\t\tName: \"Advanced User\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetBuiltinRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var advancedUser = SysdigFunctions.getBuiltinRole(GetBuiltinRoleArgs.builder()\n            .name(\"Advanced User\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  advancedUser:\n    fn::invoke:\n      function: sysdig:getBuiltinRole\n      arguments:\n        name: Advanced User\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getBuiltinRole.\n","properties":{"id":{"type":"string"},"name":{"type":"string","description":"The name of the built-in role. Valid values are: `View Only`, `Standard User`, `Advanced User`, `Team Manager`.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetBuiltinRoleTimeouts:getBuiltinRoleTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getBuiltinRole.\n","properties":{"id":{"type":"string"},"monitorPermissions":{"description":"The built-in role's monitor permissions.\n","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"securePermissions":{"description":"The built-in role's secure permissions.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetBuiltinRoleTimeouts:getBuiltinRoleTimeouts"}},"required":["id","monitorPermissions","name","securePermissions"],"type":"object"}},"sysdig:index/getCurrentUser:getCurrentUser":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst me = sysdig.getCurrentUser({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nme = sysdig.get_current_user()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var me = Sysdig.GetCurrentUser.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetCurrentUser(ctx, \u0026sysdig.GetCurrentUserArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetCurrentUserArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var me = SysdigFunctions.getCurrentUser(GetCurrentUserArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  me:\n    fn::invoke:\n      function: sysdig:getCurrentUser\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getCurrentUser.\n","properties":{"id":{"type":"string","description":"The current user's ID.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetCurrentUserTimeouts:getCurrentUserTimeouts"}},"type":"object"},"outputs":{"description":"A collection of values returned by getCurrentUser.\n","properties":{"customerExternalId":{"description":"The Customer External ID as shown in [Customer ID, Name, and External ID](https://docs.sysdig.com/en/administration/find-your-customer-id-and-name/). Only available for users with the Admin role; empty for non-admin users.\n","type":"string"},"customerId":{"description":"The ID of the customer (account) the user belongs to, as shown in [Customer ID, Name, and External ID](https://docs.sysdig.com/en/administration/find-your-customer-id-and-name/).\n","type":"number"},"customerName":{"description":"The name of the customer (account) the user belongs to, as shown in [Customer ID, Name, and External ID](https://docs.sysdig.com/en/administration/find-your-customer-id-and-name/).\n","type":"string"},"email":{"description":"The user email.\n","type":"string"},"id":{"description":"The current user's ID.\n","type":"string"},"lastName":{"description":"The user's last name.\n","type":"string"},"name":{"description":"The user's first name.\n","type":"string"},"systemRole":{"description":"The user's system role.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetCurrentUserTimeouts:getCurrentUserTimeouts"}},"required":["customerExternalId","customerId","customerName","email","id","lastName","name","systemRole"],"type":"object"}},"sysdig:index/getCustomRole:getCustomRole":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst customRole = sysdig.getCustomRole({\n    name: \"CustomRoleName\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ncustom_role = sysdig.get_custom_role(name=\"CustomRoleName\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var customRole = Sysdig.GetCustomRole.Invoke(new()\n    {\n        Name = \"CustomRoleName\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupCustomRole(ctx, \u0026sysdig.LookupCustomRoleArgs{\n\t\t\tName: \"CustomRoleName\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetCustomRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var customRole = SysdigFunctions.getCustomRole(GetCustomRoleArgs.builder()\n            .name(\"CustomRoleName\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  customRole:\n    fn::invoke:\n      function: sysdig:getCustomRole\n      arguments:\n        name: CustomRoleName\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getCustomRole.\n","properties":{"id":{"type":"string","description":"The custom role's ID.\n"},"name":{"type":"string","description":"The custom role's name.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetCustomRoleTimeouts:getCustomRoleTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getCustomRole.\n","properties":{"description":{"description":"The custom role's description.\n","type":"string"},"id":{"description":"The custom role's ID.\n","type":"string"},"monitorPermissions":{"description":"The custom role's monitor permissions.\n","items":{"type":"string"},"type":"array"},"name":{"description":"The custom role's name.\n","type":"string"},"securePermissions":{"description":"The custom role's secure permissions.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetCustomRoleTimeouts:getCustomRoleTimeouts"}},"required":["description","id","monitorPermissions","name","securePermissions"],"type":"object"}},"sysdig:index/getFargateWorkloadAgent:getFargateWorkloadAgent":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst instrumentedContainers = sysdig.getFargateWorkloadAgent({\n    containerDefinitions: \"[]\",\n    workloadAgentImage: \"quay.io/sysdig/workload-agent:latest\",\n    collectorHost: collectorHost,\n    collectorPort: collectorPort,\n    sysdigAccessKey: sysdigAccessKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ninstrumented_containers = sysdig.get_fargate_workload_agent(container_definitions=\"[]\",\n    workload_agent_image=\"quay.io/sysdig/workload-agent:latest\",\n    collector_host=collector_host,\n    collector_port=collector_port,\n    sysdig_access_key=sysdig_access_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var instrumentedContainers = Sysdig.GetFargateWorkloadAgent.Invoke(new()\n    {\n        ContainerDefinitions = \"[]\",\n        WorkloadAgentImage = \"quay.io/sysdig/workload-agent:latest\",\n        CollectorHost = collectorHost,\n        CollectorPort = collectorPort,\n        SysdigAccessKey = sysdigAccessKey,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetFargateWorkloadAgent(ctx, \u0026sysdig.GetFargateWorkloadAgentArgs{\n\t\t\tContainerDefinitions: \"[]\",\n\t\t\tWorkloadAgentImage:   \"quay.io/sysdig/workload-agent:latest\",\n\t\t\tCollectorHost:        pulumi.StringRef(collectorHost),\n\t\t\tCollectorPort:        pulumi.StringRef(collectorPort),\n\t\t\tSysdigAccessKey:      pulumi.StringRef(sysdigAccessKey),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetFargateWorkloadAgentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var instrumentedContainers = SysdigFunctions.getFargateWorkloadAgent(GetFargateWorkloadAgentArgs.builder()\n            .containerDefinitions(\"[]\")\n            .workloadAgentImage(\"quay.io/sysdig/workload-agent:latest\")\n            .collectorHost(collectorHost)\n            .collectorPort(collectorPort)\n            .sysdigAccessKey(sysdigAccessKey)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  instrumentedContainers:\n    fn::invoke:\n      function: sysdig:getFargateWorkloadAgent\n      arguments:\n        containerDefinitions: '[]'\n        workloadAgentImage: quay.io/sysdig/workload-agent:latest\n        collectorHost: ${collectorHost}\n        collectorPort: ${collectorPort}\n        sysdigAccessKey: ${sysdigAccessKey}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getFargateWorkloadAgent.\n","properties":{"barePdigOnContainers":{"type":"array","items":{"type":"string"},"description":"A list of containers in this data source to be instrumented with bare pdig.\n"},"collectorHost":{"type":"string","description":"The Sysdig Collector host to connect to.\n"},"collectorPort":{"type":"string","description":"The Sysdig Collector port.\n"},"containerDefinitions":{"type":"string","description":"The input Fargate container definitions to instrument with the Sysdig workload agent.\n"},"id":{"type":"string"},"ignoreContainers":{"type":"array","items":{"type":"string"},"description":"A list of containers in this data source that should not be instrumented.\n"},"imageAuthSecret":{"type":"string","description":"The registry authentication secret.\n"},"instrumentationCpu":{"type":"number","description":"The number of CPU units for the instrumentation container.\n"},"instrumentationEssential":{"type":"boolean","description":"\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e by default. If \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e the instrumentation container will be marked as essential.\n"},"instrumentationMemoryLimit":{"type":"number","description":"The maximum amount (in MiB) of memory for the instrumentation container.\n"},"instrumentationMemoryReservation":{"type":"number","description":"The minimum amount (in MiB) of memory reserved for the instrumentation container.\n"},"logConfiguration":{"$ref":"#/types/sysdig:index%2FgetFargateWorkloadAgentLogConfiguration:getFargateWorkloadAgentLogConfiguration","description":"Configuration for the awslogs driver on the instrumentation container. All three values must be specified if instrumentation logging is desired:\n"},"orchestratorHost":{"type":"string","deprecationMessage":"Deprecated"},"orchestratorPort":{"type":"string","deprecationMessage":"Deprecated"},"priority":{"type":"string","description":"The priority mode for the workload agent. Can be \u003cspan pulumi-lang-nodejs=\"`availability`\" pulumi-lang-dotnet=\"`Availability`\" pulumi-lang-go=\"`availability`\" pulumi-lang-python=\"`availability`\" pulumi-lang-yaml=\"`availability`\" pulumi-lang-java=\"`availability`\"\u003e`availability`\u003c/span\u003e (by default) or \u003cspan pulumi-lang-nodejs=\"`security`\" pulumi-lang-dotnet=\"`Security`\" pulumi-lang-go=\"`security`\" pulumi-lang-python=\"`security`\" pulumi-lang-yaml=\"`security`\" pulumi-lang-java=\"`security`\"\u003e`security`\u003c/span\u003e.\n"},"sidecar":{"type":"string"},"sysdigAccessKey":{"type":"string","description":"The Sysdig Agent access key, available in the Sysdig Secure UI.\n"},"sysdigLogging":{"type":"string","description":"The instrumentation logging level: \u003cspan pulumi-lang-nodejs=\"`trace`\" pulumi-lang-dotnet=\"`Trace`\" pulumi-lang-go=\"`trace`\" pulumi-lang-python=\"`trace`\" pulumi-lang-yaml=\"`trace`\" pulumi-lang-java=\"`trace`\"\u003e`trace`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`debug`\" pulumi-lang-dotnet=\"`Debug`\" pulumi-lang-go=\"`debug`\" pulumi-lang-python=\"`debug`\" pulumi-lang-yaml=\"`debug`\" pulumi-lang-java=\"`debug`\"\u003e`debug`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`info`\" pulumi-lang-dotnet=\"`Info`\" pulumi-lang-go=\"`info`\" pulumi-lang-python=\"`info`\" pulumi-lang-yaml=\"`info`\" pulumi-lang-java=\"`info`\"\u003e`info`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`warning`\" pulumi-lang-dotnet=\"`Warning`\" pulumi-lang-go=\"`warning`\" pulumi-lang-python=\"`warning`\" pulumi-lang-yaml=\"`warning`\" pulumi-lang-java=\"`warning`\"\u003e`warning`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`error`\" pulumi-lang-dotnet=\"`Error`\" pulumi-lang-go=\"`error`\" pulumi-lang-python=\"`error`\" pulumi-lang-yaml=\"`error`\" pulumi-lang-java=\"`error`\"\u003e`error`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`silent`\" pulumi-lang-dotnet=\"`Silent`\" pulumi-lang-go=\"`silent`\" pulumi-lang-python=\"`silent`\" pulumi-lang-yaml=\"`silent`\" pulumi-lang-java=\"`silent`\"\u003e`silent`\u003c/span\u003e.\n"},"workloadAgentImage":{"type":"string","description":"The Sysdig workload agent image.\n"}},"type":"object","required":["containerDefinitions","workloadAgentImage"]},"outputs":{"description":"A collection of values returned by getFargateWorkloadAgent.\n","properties":{"barePdigOnContainers":{"items":{"type":"string"},"type":"array"},"collectorHost":{"type":"string"},"collectorPort":{"type":"string"},"containerDefinitions":{"type":"string"},"id":{"type":"string"},"ignoreContainers":{"items":{"type":"string"},"type":"array"},"imageAuthSecret":{"type":"string"},"instrumentationCpu":{"type":"number"},"instrumentationEssential":{"type":"boolean"},"instrumentationMemoryLimit":{"type":"number"},"instrumentationMemoryReservation":{"type":"number"},"logConfiguration":{"$ref":"#/types/sysdig:index%2FgetFargateWorkloadAgentLogConfiguration:getFargateWorkloadAgentLogConfiguration"},"orchestratorHost":{"deprecationMessage":"Deprecated","type":"string"},"orchestratorPort":{"deprecationMessage":"Deprecated","type":"string"},"outputContainerDefinitions":{"description":"The updated container definitions instrumented with the Sysdig workload agent.\n","type":"string"},"priority":{"type":"string"},"sidecar":{"type":"string"},"sysdigAccessKey":{"type":"string"},"sysdigLogging":{"type":"string"},"workloadAgentImage":{"type":"string"}},"required":["containerDefinitions","id","outputContainerDefinitions","workloadAgentImage"],"type":"object"}},"sysdig:index/getMonitorCustomRolePermissions:getMonitorCustomRolePermissions":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst dashboardEdit = sysdig.getMonitorCustomRolePermissions({\n    requestedPermissions: [\"dashboards.edit\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ndashboard_edit = sysdig.get_monitor_custom_role_permissions(requested_permissions=[\"dashboards.edit\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dashboardEdit = Sysdig.GetMonitorCustomRolePermissions.Invoke(new()\n    {\n        RequestedPermissions = new[]\n        {\n            \"dashboards.edit\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetMonitorCustomRolePermissions(ctx, \u0026sysdig.GetMonitorCustomRolePermissionsArgs{\n\t\t\tRequestedPermissions: []string{\n\t\t\t\t\"dashboards.edit\",\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorCustomRolePermissionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dashboardEdit = SysdigFunctions.getMonitorCustomRolePermissions(GetMonitorCustomRolePermissionsArgs.builder()\n            .requestedPermissions(\"dashboards.edit\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dashboardEdit:\n    fn::invoke:\n      function: sysdig:getMonitorCustomRolePermissions\n      arguments:\n        requestedPermissions:\n          - dashboards.edit\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Custom Role\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst dashboardEdit = sysdig.getMonitorCustomRolePermissions({\n    requestedPermissions: [\"dashboards.edit\"],\n});\nconst my_custom_role = new sysdig.CustomRole(\"my-custom-role\", {\n    name: \"custom-role-name\",\n    description: \"Custom role to edit dashboards\",\n    permissions: {\n        monitorPermissions: dashboardEdit.then(dashboardEdit =\u003e dashboardEdit.enrichedPermissions),\n    },\n}, {\n    dependsOn: [imagesEdit],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ndashboard_edit = sysdig.get_monitor_custom_role_permissions(requested_permissions=[\"dashboards.edit\"])\nmy_custom_role = sysdig.CustomRole(\"my-custom-role\",\n    name=\"custom-role-name\",\n    description=\"Custom role to edit dashboards\",\n    permissions={\n        \"monitor_permissions\": dashboard_edit.enriched_permissions,\n    },\n    opts = pulumi.ResourceOptions(depends_on=[images_edit]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dashboardEdit = Sysdig.GetMonitorCustomRolePermissions.Invoke(new()\n    {\n        RequestedPermissions = new[]\n        {\n            \"dashboards.edit\",\n        },\n    });\n\n    var my_custom_role = new Sysdig.CustomRole(\"my-custom-role\", new()\n    {\n        Name = \"custom-role-name\",\n        Description = \"Custom role to edit dashboards\",\n        Permissions = new Sysdig.Inputs.CustomRolePermissionsArgs\n        {\n            MonitorPermissions = dashboardEdit.Apply(getMonitorCustomRolePermissionsResult =\u003e getMonitorCustomRolePermissionsResult.EnrichedPermissions),\n        },\n    }, new CustomResourceOptions\n    {\n        DependsOn =\n        {\n            imagesEdit,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tdashboardEdit, err := sysdig.GetMonitorCustomRolePermissions(ctx, \u0026sysdig.GetMonitorCustomRolePermissionsArgs{\n\t\t\tRequestedPermissions: []string{\n\t\t\t\t\"dashboards.edit\",\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewCustomRole(ctx, \"my-custom-role\", \u0026sysdig.CustomRoleArgs{\n\t\t\tName:        pulumi.String(\"custom-role-name\"),\n\t\t\tDescription: pulumi.String(\"Custom role to edit dashboards\"),\n\t\t\tPermissions: \u0026sysdig.CustomRolePermissionsArgs{\n\t\t\t\tMonitorPermissions: interface{}(dashboardEdit.EnrichedPermissions),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\timagesEdit,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorCustomRolePermissionsArgs;\nimport com.pulumi.sysdig.CustomRole;\nimport com.pulumi.sysdig.CustomRoleArgs;\nimport com.pulumi.sysdig.inputs.CustomRolePermissionsArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dashboardEdit = SysdigFunctions.getMonitorCustomRolePermissions(GetMonitorCustomRolePermissionsArgs.builder()\n            .requestedPermissions(\"dashboards.edit\")\n            .build());\n\n        var my_custom_role = new CustomRole(\"my-custom-role\", CustomRoleArgs.builder()\n            .name(\"custom-role-name\")\n            .description(\"Custom role to edit dashboards\")\n            .permissions(CustomRolePermissionsArgs.builder()\n                .monitorPermissions(dashboardEdit.enrichedPermissions())\n                .build())\n            .build(), CustomResourceOptions.builder()\n                .dependsOn(imagesEdit)\n                .build());\n\n    }\n}\n```\n```yaml\nresources:\n  my-custom-role:\n    type: sysdig:CustomRole\n    properties:\n      name: custom-role-name\n      description: Custom role to edit dashboards\n      permissions:\n        monitorPermissions: ${dashboardEdit.enrichedPermissions}\n    options:\n      dependsOn:\n        - ${imagesEdit}\nvariables:\n  dashboardEdit:\n    fn::invoke:\n      function: sysdig:getMonitorCustomRolePermissions\n      arguments:\n        requestedPermissions:\n          - dashboards.edit\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorCustomRolePermissions.\n","properties":{"id":{"type":"string"},"requestedPermissions":{"type":"array","items":{"type":"string"}},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorCustomRolePermissionsTimeouts:getMonitorCustomRolePermissionsTimeouts"}},"type":"object","required":["requestedPermissions"]},"outputs":{"description":"A collection of values returned by getMonitorCustomRolePermissions.\n","properties":{"enrichedPermissions":{"description":"The minimum set of permissions enriched with permissions on which the requested permissions depend\n","items":{"type":"string"},"type":"array"},"id":{"type":"string"},"requestedPermissions":{"items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorCustomRolePermissionsTimeouts:getMonitorCustomRolePermissionsTimeouts"}},"required":["enrichedPermissions","id","requestedPermissions"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelCustomWebhook:getMonitorNotificationChannelCustomWebhook":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncCustomWebhook = sysdig.getMonitorNotificationChannelCustomWebhook({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_custom_webhook = sysdig.get_monitor_notification_channel_custom_webhook(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncCustomWebhook = Sysdig.GetMonitorNotificationChannelCustomWebhook.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelCustomWebhook(ctx, \u0026sysdig.LookupMonitorNotificationChannelCustomWebhookArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelCustomWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncCustomWebhook = SysdigFunctions.getMonitorNotificationChannelCustomWebhook(GetMonitorNotificationChannelCustomWebhookArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncCustomWebhook:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelCustomWebhook\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelCustomWebhook.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelCustomWebhookTimeouts:getMonitorNotificationChannelCustomWebhookTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelCustomWebhook.\n","properties":{"additionalHeaders":{"additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n","type":"object"},"allowInsecureConnections":{"description":"Whether to skip TLS verification.\n","type":"boolean"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"httpMethod":{"description":"Http method of the request to be sent.\n","type":"string"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"template":{"description":"JSON payload template to be sent in body.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelCustomWebhookTimeouts:getMonitorNotificationChannelCustomWebhookTimeouts"},"url":{"description":"URL to send the event.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["additionalHeaders","allowInsecureConnections","httpMethod","id","name","template","url","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelEmail:getMonitorNotificationChannelEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncEmail = sysdig.getMonitorNotificationChannelEmail({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_email = sysdig.get_monitor_notification_channel_email(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncEmail = Sysdig.GetMonitorNotificationChannelEmail.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelEmail(ctx, \u0026sysdig.LookupMonitorNotificationChannelEmailArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncEmail = SysdigFunctions.getMonitorNotificationChannelEmail(GetMonitorNotificationChannelEmailArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncEmail:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelEmail\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelEmail.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelEmailTimeouts:getMonitorNotificationChannelEmailTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelEmail.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"recipients":{"description":"List of recipients that will receive the message.\n","items":{"type":"string"},"type":"array"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelEmailTimeouts:getMonitorNotificationChannelEmailTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","recipients","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelGoogleChat:getMonitorNotificationChannelGoogleChat":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncGoogleChat = sysdig.getMonitorNotificationChannelGoogleChat({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_google_chat = sysdig.get_monitor_notification_channel_google_chat(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncGoogleChat = Sysdig.GetMonitorNotificationChannelGoogleChat.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelGoogleChat(ctx, \u0026sysdig.LookupMonitorNotificationChannelGoogleChatArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelGoogleChatArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncGoogleChat = SysdigFunctions.getMonitorNotificationChannelGoogleChat(GetMonitorNotificationChannelGoogleChatArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncGoogleChat:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelGoogleChat\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelGoogleChat.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelGoogleChatTimeouts:getMonitorNotificationChannelGoogleChatTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelGoogleChat.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelGoogleChatTimeouts:getMonitorNotificationChannelGoogleChatTimeouts"},"url":{"description":"URL of the Google Chat webhook.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","url","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelIbmEventNotification:getMonitorNotificationChannelIbmEventNotification":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncIbmEventNotification = sysdig.getMonitorNotificationChannelIbmEventNotification({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_ibm_event_notification = sysdig.get_monitor_notification_channel_ibm_event_notification(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncIbmEventNotification = Sysdig.GetMonitorNotificationChannelIbmEventNotification.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelIbmEventNotification(ctx, \u0026sysdig.LookupMonitorNotificationChannelIbmEventNotificationArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelIbmEventNotificationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncIbmEventNotification = SysdigFunctions.getMonitorNotificationChannelIbmEventNotification(GetMonitorNotificationChannelIbmEventNotificationArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncIbmEventNotification:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelIbmEventNotification\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelIbmEventNotification.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelIbmEventNotificationTimeouts:getMonitorNotificationChannelIbmEventNotificationTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelIbmEventNotification.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"instanceId":{"description":"id of the Event Notifications Instance. Id value can be either an instance id or CRN. If the event notification instance is within the same account, then it is the instance id. If it is in a different account, then the Event Notifications Instance's [CRN](https://cloud.ibm.com/docs/account?topic=account-crn).\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelIbmEventNotificationTimeouts:getMonitorNotificationChannelIbmEventNotificationTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","instanceId","name","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelMsteams:getMonitorNotificationChannelMsteams":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncMsteams = sysdig.getMonitorNotificationChannelMsteams({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_msteams = sysdig.get_monitor_notification_channel_msteams(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncMsteams = Sysdig.GetMonitorNotificationChannelMsteams.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelMsteams(ctx, \u0026sysdig.LookupMonitorNotificationChannelMsteamsArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelMsteamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncMsteams = SysdigFunctions.getMonitorNotificationChannelMsteams(GetMonitorNotificationChannelMsteamsArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncMsteams:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelMsteams\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelMsteams.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelMsteamsTimeouts:getMonitorNotificationChannelMsteamsTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelMsteams.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelMsteamsTimeouts:getMonitorNotificationChannelMsteamsTimeouts"},"url":{"description":"URL of the MS Teams webhook.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","url","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelOpsgenie:getMonitorNotificationChannelOpsgenie":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncOpsgenie = sysdig.getMonitorNotificationChannelOpsgenie({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_opsgenie = sysdig.get_monitor_notification_channel_opsgenie(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncOpsgenie = Sysdig.GetMonitorNotificationChannelOpsgenie.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelOpsgenie(ctx, \u0026sysdig.LookupMonitorNotificationChannelOpsgenieArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelOpsgenieArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncOpsgenie = SysdigFunctions.getMonitorNotificationChannelOpsgenie(GetMonitorNotificationChannelOpsgenieArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncOpsgenie:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelOpsgenie\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelOpsgenie.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelOpsgenieTimeouts:getMonitorNotificationChannelOpsgenieTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelOpsgenie.\n","properties":{"apiKey":{"description":"Key for the API.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"region":{"description":"Opsgenie Region.\n","type":"string"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelOpsgenieTimeouts:getMonitorNotificationChannelOpsgenieTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["apiKey","id","name","region","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelPagerduty:getMonitorNotificationChannelPagerduty":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncPagerduty = sysdig.getMonitorNotificationChannelPagerduty({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_pagerduty = sysdig.get_monitor_notification_channel_pagerduty(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncPagerduty = Sysdig.GetMonitorNotificationChannelPagerduty.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelPagerduty(ctx, \u0026sysdig.LookupMonitorNotificationChannelPagerdutyArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelPagerdutyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncPagerduty = SysdigFunctions.getMonitorNotificationChannelPagerduty(GetMonitorNotificationChannelPagerdutyArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncPagerduty:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelPagerduty\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelPagerduty.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelPagerdutyTimeouts:getMonitorNotificationChannelPagerdutyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelPagerduty.\n","properties":{"account":{"description":"Pagerduty account.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"serviceKey":{"description":"Service Key for the Pagerduty account.\n","type":"string"},"serviceName":{"description":"Service name for the Pagerduty account.\n","type":"string"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelPagerdutyTimeouts:getMonitorNotificationChannelPagerdutyTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["account","id","name","serviceKey","serviceName","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelPrometheusAlertManager:getMonitorNotificationChannelPrometheusAlertManager":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncPrometheusAlertManager = sysdig.getMonitorNotificationChannelPrometheusAlertManager({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_prometheus_alert_manager = sysdig.get_monitor_notification_channel_prometheus_alert_manager(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncPrometheusAlertManager = Sysdig.GetMonitorNotificationChannelPrometheusAlertManager.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelPrometheusAlertManager(ctx, \u0026sysdig.LookupMonitorNotificationChannelPrometheusAlertManagerArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelPrometheusAlertManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncPrometheusAlertManager = SysdigFunctions.getMonitorNotificationChannelPrometheusAlertManager(GetMonitorNotificationChannelPrometheusAlertManagerArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncPrometheusAlertManager:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelPrometheusAlertManager\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelPrometheusAlertManager.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelPrometheusAlertManagerTimeouts:getMonitorNotificationChannelPrometheusAlertManagerTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelPrometheusAlertManager.\n","properties":{"additionalHeaders":{"additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n","type":"object"},"allowInsecureConnections":{"description":"Whether to skip TLS verification.\n","type":"boolean"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelPrometheusAlertManagerTimeouts:getMonitorNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"description":"URL to send the event.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["additionalHeaders","allowInsecureConnections","id","name","url","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelSlack:getMonitorNotificationChannelSlack":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncSlack = sysdig.getMonitorNotificationChannelSlack({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_slack = sysdig.get_monitor_notification_channel_slack(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncSlack = Sysdig.GetMonitorNotificationChannelSlack.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelSlack(ctx, \u0026sysdig.LookupMonitorNotificationChannelSlackArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncSlack = SysdigFunctions.getMonitorNotificationChannelSlack(GetMonitorNotificationChannelSlackArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncSlack:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelSlack\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelSlack.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a user.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelSlackTimeouts:getMonitorNotificationChannelSlackTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelSlack.\n","properties":{"channel":{"description":"Name of the Slack channel.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"isPrivateChannel":{"description":"Whether the Slack Channel has been marked as private or not.\n","type":"boolean"},"name":{"type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a user.\n","type":"boolean"},"privateChannelUrl":{"description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url), if the channel is private.\n","type":"string"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"showSectionAlertDetails":{"description":"Whether to include the alert details section in the Slack messages.\n","type":"boolean"},"showSectionCapturingInformation":{"description":"Whether to include the capturing information section in the Slack messages.\n","type":"boolean"},"showSectionDashboardLinks":{"description":"Whether to include the dashboard links section in the Slack messages.\n","type":"boolean"},"showSectionEventDetails":{"description":"Whether to include the event details section in the Slack messages.\n","type":"boolean"},"showSectionNotificationChart":{"description":"Whether to include the notification chart section in the Slack messages.\n","type":"boolean"},"showSectionRunbookLinks":{"description":"Whether to include the runbook links section in the Slack messages.\n","type":"boolean"},"showSectionUserDefinedContent":{"description":"Whether to include the user defined section in the Slack messages.\n","type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelSlackTimeouts:getMonitorNotificationChannelSlackTimeouts"},"url":{"description":"URL of the Slack webhook.\n","secret":true,"type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["channel","id","isPrivateChannel","name","privateChannelUrl","showSectionAlertDetails","showSectionCapturingInformation","showSectionDashboardLinks","showSectionEventDetails","showSectionNotificationChart","showSectionRunbookLinks","showSectionUserDefinedContent","url","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelSns:getMonitorNotificationChannelSns":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncSns = sysdig.getMonitorNotificationChannelSns({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_sns = sysdig.get_monitor_notification_channel_sns(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncSns = Sysdig.GetMonitorNotificationChannelSns.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelSns(ctx, \u0026sysdig.LookupMonitorNotificationChannelSnsArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelSnsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncSns = SysdigFunctions.getMonitorNotificationChannelSns(GetMonitorNotificationChannelSnsArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncSns:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelSns\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelSns.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelSnsTimeouts:getMonitorNotificationChannelSnsTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelSns.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelSnsTimeouts:getMonitorNotificationChannelSnsTimeouts"},"topics":{"description":"List of ARNs from the SNS topics.\n","items":{"type":"string"},"type":"array"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","topics","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelTeamEmail:getMonitorNotificationChannelTeamEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncTeamEmail = sysdig.getMonitorNotificationChannelTeamEmail({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_team_email = sysdig.get_monitor_notification_channel_team_email(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncTeamEmail = Sysdig.GetMonitorNotificationChannelTeamEmail.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelTeamEmail(ctx, \u0026sysdig.LookupMonitorNotificationChannelTeamEmailArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelTeamEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncTeamEmail = SysdigFunctions.getMonitorNotificationChannelTeamEmail(GetMonitorNotificationChannelTeamEmailArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncTeamEmail:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelTeamEmail\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelTeamEmail.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelTeamEmailTimeouts:getMonitorNotificationChannelTeamEmailTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelTeamEmail.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"includeAdminUsers":{"description":"Whether the Notification Channel includes admin users in notifications.\n","type":"boolean"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"teamId":{"description":"id of the team.\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelTeamEmailTimeouts:getMonitorNotificationChannelTeamEmailTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","includeAdminUsers","name","teamId","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelVictorops:getMonitorNotificationChannelVictorops":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncVictorops = sysdig.getMonitorNotificationChannelVictorops({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_victorops = sysdig.get_monitor_notification_channel_victorops(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncVictorops = Sysdig.GetMonitorNotificationChannelVictorops.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelVictorops(ctx, \u0026sysdig.LookupMonitorNotificationChannelVictoropsArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelVictoropsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncVictorops = SysdigFunctions.getMonitorNotificationChannelVictorops(GetMonitorNotificationChannelVictoropsArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncVictorops:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelVictorops\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelVictorops.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelVictoropsTimeouts:getMonitorNotificationChannelVictoropsTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelVictorops.\n","properties":{"apiKey":{"description":"Key for the API.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"routingKey":{"description":"Routing key for VictorOps.\n","type":"string"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelVictoropsTimeouts:getMonitorNotificationChannelVictoropsTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["apiKey","id","name","routingKey","version"],"type":"object"}},"sysdig:index/getMonitorNotificationChannelWebhook:getMonitorNotificationChannelWebhook":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncWebhook = sysdig.getMonitorNotificationChannelWebhook({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_webhook = sysdig.get_monitor_notification_channel_webhook(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncWebhook = Sysdig.GetMonitorNotificationChannelWebhook.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorNotificationChannelWebhook(ctx, \u0026sysdig.LookupMonitorNotificationChannelWebhookArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorNotificationChannelWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncWebhook = SysdigFunctions.getMonitorNotificationChannelWebhook(GetMonitorNotificationChannelWebhookArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncWebhook:\n    fn::invoke:\n      function: sysdig:getMonitorNotificationChannelWebhook\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorNotificationChannelWebhook.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelWebhookTimeouts:getMonitorNotificationChannelWebhookTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getMonitorNotificationChannelWebhook.\n","properties":{"additionalHeaders":{"additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n","type":"object"},"allowInsecureConnections":{"description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n","type":"boolean"},"customData":{"additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n","type":"object"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetMonitorNotificationChannelWebhookTimeouts:getMonitorNotificationChannelWebhookTimeouts"},"url":{"description":"URL to send the event.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["additionalHeaders","allowInsecureConnections","customData","id","name","url","version"],"type":"object"}},"sysdig:index/getMonitorTeam:getMonitorTeam":{"description":"The \u003cspan pulumi-lang-nodejs=\"`sysdig.MonitorTeam`\" pulumi-lang-dotnet=\"`sysdig.MonitorTeam`\" pulumi-lang-go=\"`MonitorTeam`\" pulumi-lang-python=\"`MonitorTeam`\" pulumi-lang-yaml=\"`sysdig.MonitorTeam`\" pulumi-lang-java=\"`sysdig.MonitorTeam`\"\u003e`sysdig.MonitorTeam`\u003c/span\u003e data source retrieves information about a specific monitor team in Sysdig.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getMonitorTeam({\n    id: \"812371\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_monitor_team(id=\"812371\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetMonitorTeam.Invoke(new()\n    {\n        Id = \"812371\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupMonitorTeam(ctx, \u0026sysdig.LookupMonitorTeamArgs{\n\t\t\tId: \"812371\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorTeamArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getMonitorTeam(GetMonitorTeamArgs.builder()\n            .id(\"812371\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getMonitorTeam\n      arguments:\n        id: '812371'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorTeam.\n","properties":{"id":{"type":"string","description":"The ID of the monitor team.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getMonitorTeam.\n","properties":{"canSeeInfrastructureEvents":{"description":"Whether the team can see infrastructure events.\n","type":"boolean"},"canUseAgentCli":{"description":"Whether the team can use the agent CLI.\n","type":"boolean"},"canUseAwsData":{"description":"Whether the team can use AWS data.\n","type":"boolean"},"canUseSysdigCapture":{"description":"Whether the team can use Sysdig capture.\n","type":"boolean"},"defaultTeam":{"description":"Whether the team is the default team.\n","type":"boolean"},"description":{"description":"The description of the monitor team.\n","type":"string"},"enableIbmPlatformMetrics":{"description":"Whether the team can use IBM platform metrics.\n","type":"boolean"},"entrypoints":{"description":"The entrypoint configuration for the team.\n","items":{"$ref":"#/types/sysdig:index%2FgetMonitorTeamEntrypoint:getMonitorTeamEntrypoint"},"type":"array"},"filter":{"description":"The filter applied to the team.\n","type":"string"},"ibmPlatformMetrics":{"description":"The IBM platform metrics configuration for the team.\n","type":"string"},"id":{"type":"string"},"name":{"description":"The name of the monitor team.\n","type":"string"},"prometheusRemoteWriteMetricsFilter":{"description":"The Prometheus remote write metrics filter for the team.\n","type":"string"},"scopeBy":{"description":"The scope of the team.\n","type":"string"},"theme":{"description":"The theme of the monitor team.\n","type":"string"},"userRoles":{"description":"The roles assigned to users in the team.\n","items":{"$ref":"#/types/sysdig:index%2FgetMonitorTeamUserRole:getMonitorTeamUserRole"},"type":"array"},"version":{"description":"The version of the monitor team.\n","type":"number"}},"required":["canSeeInfrastructureEvents","canUseAgentCli","canUseAwsData","canUseSysdigCapture","defaultTeam","description","enableIbmPlatformMetrics","entrypoints","filter","ibmPlatformMetrics","id","name","prometheusRemoteWriteMetricsFilter","scopeBy","theme","userRoles","version"],"type":"object"}},"sysdig:index/getMonitorTeams:getMonitorTeams":{"description":"The \u003cspan pulumi-lang-nodejs=\"`sysdig.getMonitorTeams`\" pulumi-lang-dotnet=\"`sysdig.getMonitorTeams`\" pulumi-lang-go=\"`getMonitorTeams`\" pulumi-lang-python=\"`get_monitor_teams`\" pulumi-lang-yaml=\"`sysdig.getMonitorTeams`\" pulumi-lang-java=\"`sysdig.getMonitorTeams`\"\u003e`sysdig.getMonitorTeams`\u003c/span\u003e data source retrieves a list of all monitor teams in Sysdig.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getMonitorTeams({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_monitor_teams()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetMonitorTeams.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetMonitorTeams(ctx, \u0026sysdig.GetMonitorTeamsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetMonitorTeamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getMonitorTeams(GetMonitorTeamsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getMonitorTeams\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getMonitorTeams.\n","properties":{"id":{"type":"string","description":"The ID of the monitor team.\n"}},"type":"object"},"outputs":{"description":"A collection of values returned by getMonitorTeams.\n","properties":{"id":{"description":"The ID of the monitor team.\n","type":"string"},"teams":{"description":"A list of monitor teams. Each team has the following attributes:\n","items":{"$ref":"#/types/sysdig:index%2FgetMonitorTeamsTeam:getMonitorTeamsTeam"},"type":"array"}},"required":["id","teams"],"type":"object"}},"sysdig:index/getSecureAgentlessScanningAssets:getSecureAgentlessScanningAssets":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst assets = sysdig.getSecureAgentlessScanningAssets({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nassets = sysdig.get_secure_agentless_scanning_assets()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var assets = Sysdig.GetSecureAgentlessScanningAssets.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureAgentlessScanningAssets(ctx, \u0026sysdig.GetSecureAgentlessScanningAssetsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureAgentlessScanningAssetsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var assets = SysdigFunctions.getSecureAgentlessScanningAssets(GetSecureAgentlessScanningAssetsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  assets:\n    fn::invoke:\n      function: sysdig:getSecureAgentlessScanningAssets\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureAgentlessScanningAssets.\n","properties":{"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureAgentlessScanningAssetsTimeouts:getSecureAgentlessScanningAssetsTimeouts"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecureAgentlessScanningAssets.\n","properties":{"aws":{"additionalProperties":{"type":"string"},"type":"object"},"azure":{"additionalProperties":{"type":"string"},"type":"object"},"backend":{"additionalProperties":{"type":"string"},"type":"object"},"gcp":{"additionalProperties":{"type":"string"},"type":"object"},"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureAgentlessScanningAssetsTimeouts:getSecureAgentlessScanningAssetsTimeouts"}},"required":["aws","azure","backend","gcp","id"],"type":"object"}},"sysdig:index/getSecureAwsMlPolicy:getSecureAwsMlPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst policy = sysdig.getSecureAwsMlPolicy({\n    name: \"ML Policy 1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\npolicy = sysdig.get_secure_aws_ml_policy(name=\"ML Policy 1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var policy = Sysdig.GetSecureAwsMlPolicy.Invoke(new()\n    {\n        Name = \"ML Policy 1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureAwsMlPolicy(ctx, \u0026sysdig.LookupSecureAwsMlPolicyArgs{\n\t\t\tName: \"ML Policy 1\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureAwsMlPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var policy = SysdigFunctions.getSecureAwsMlPolicy(GetSecureAwsMlPolicyArgs.builder()\n            .name(\"ML Policy 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  policy:\n    fn::invoke:\n      function: sysdig:getSecureAwsMlPolicy\n      arguments:\n        name: ML Policy 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureAwsMlPolicy.\n","properties":{"id":{"type":"string","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureAwsMlPolicyTimeouts:getSecureAwsMlPolicyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureAwsMlPolicy.\n","properties":{"description":{"description":"(Required) Rule description.\n","type":"string"},"enabled":{"description":"Whether the policy is enabled or not.\n","type":"boolean"},"id":{"description":"The id for the policy.\n","type":"string"},"name":{"type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureAwsMlPolicyRule:getSecureAwsMlPolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureAwsMlPolicyTimeouts:getSecureAwsMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"required":["description","enabled","id","name","notificationChannels","rules","runbook","scope","severity","type","version"],"type":"object"}},"sysdig:index/getSecureCloudIngestionAssets:getSecureCloudIngestionAssets":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst assets = sysdig.getSecureCloudIngestionAssets({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nassets = sysdig.get_secure_cloud_ingestion_assets()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var assets = Sysdig.GetSecureCloudIngestionAssets.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureCloudIngestionAssets(ctx, \u0026sysdig.GetSecureCloudIngestionAssetsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureCloudIngestionAssetsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var assets = SysdigFunctions.getSecureCloudIngestionAssets(GetSecureCloudIngestionAssetsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  assets:\n    fn::invoke:\n      function: sysdig:getSecureCloudIngestionAssets\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureCloudIngestionAssets.\n","properties":{"cloudProvider":{"type":"string"},"cloudProviderId":{"type":"string"},"componentType":{"type":"string"},"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureCloudIngestionAssetsTimeouts:getSecureCloudIngestionAssetsTimeouts"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecureCloudIngestionAssets.\n","properties":{"aws":{"additionalProperties":{"type":"string"},"type":"object"},"cloudProvider":{"type":"string"},"cloudProviderId":{"type":"string"},"componentType":{"type":"string"},"gcpMetadata":{"additionalProperties":{"type":"string"},"description":"GCP ingestion metadata\n","type":"object"},"gcpRoutingKey":{"description":"GCP ingestion routing key\n","type":"string"},"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureCloudIngestionAssetsTimeouts:getSecureCloudIngestionAssetsTimeouts"}},"required":["aws","gcpMetadata","gcpRoutingKey","id"],"type":"object"}},"sysdig:index/getSecureConnection:getSecureConnection":{"description":"Provides information about current secure connection details.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst current = sysdig.getSecureConnection({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ncurrent = sysdig.get_secure_connection()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var current = Sysdig.GetSecureConnection.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureConnection(ctx, \u0026sysdig.GetSecureConnectionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureConnectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var current = SysdigFunctions.getSecureConnection(GetSecureConnectionArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  current:\n    fn::invoke:\n      function: sysdig:getSecureConnection\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureConnection.\n","properties":{"id":{"type":"string"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecureConnection.\n","properties":{"id":{"type":"string"},"secureApiToken":{"description":"Returns \u003cspan pulumi-lang-nodejs=\"`sysdigSecureApiToken`\" pulumi-lang-dotnet=\"`SysdigSecureApiToken`\" pulumi-lang-go=\"`sysdigSecureApiToken`\" pulumi-lang-python=\"`sysdig_secure_api_token`\" pulumi-lang-yaml=\"`sysdigSecureApiToken`\" pulumi-lang-java=\"`sysdigSecureApiToken`\"\u003e`sysdig_secure_api_token`\u003c/span\u003e provider configuration sensitive attribute\n","secret":true,"type":"string"},"secureUrl":{"description":"Returns \u003cspan pulumi-lang-nodejs=\"`sysdigSecureUrl`\" pulumi-lang-dotnet=\"`SysdigSecureUrl`\" pulumi-lang-go=\"`sysdigSecureUrl`\" pulumi-lang-python=\"`sysdig_secure_url`\" pulumi-lang-yaml=\"`sysdigSecureUrl`\" pulumi-lang-java=\"`sysdigSecureUrl`\"\u003e`sysdig_secure_url`\u003c/span\u003e provider configuration attribute\n","type":"string"}},"required":["id","secureApiToken","secureUrl"],"type":"object"}},"sysdig:index/getSecureCustomPolicy:getSecureCustomPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureCustomPolicy({\n    name: \"Write apt database\",\n    type: \"falco\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_custom_policy(name=\"Write apt database\",\n    type=\"falco\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureCustomPolicy.Invoke(new()\n    {\n        Name = \"Write apt database\",\n        Type = \"falco\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureCustomPolicy(ctx, \u0026sysdig.LookupSecureCustomPolicyArgs{\n\t\t\tName: \"Write apt database\",\n\t\t\tType: pulumi.StringRef(\"falco\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureCustomPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureCustomPolicy(GetSecureCustomPolicyArgs.builder()\n            .name(\"Write apt database\")\n            .type(\"falco\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureCustomPolicy\n      arguments:\n        name: Write apt database\n        type: falco\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureCustomPolicy.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureCustomPolicyAction:getSecureCustomPolicyAction"}},"name":{"type":"string","description":"The name of the Secure custom policy.\n"},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureCustomPolicyTimeouts:getSecureCustomPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureCustomPolicy.\n","properties":{"actions":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureCustomPolicyAction:getSecureCustomPolicyAction"},"type":"array"},"description":{"description":"The description for the custom policy.\n","type":"string"},"enabled":{"description":"Whether the policy is enabled or not.\n","type":"boolean"},"id":{"description":"The id for the custom policy.\n","type":"number"},"name":{"description":"(Required) The name of the capture file\n","type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"description":"An array of rules with the properties \u003cspan pulumi-lang-nodejs=\"`name`\" pulumi-lang-dotnet=\"`Name`\" pulumi-lang-go=\"`name`\" pulumi-lang-python=\"`name`\" pulumi-lang-yaml=\"`name`\" pulumi-lang-java=\"`name`\"\u003e`name`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`enabled`\" pulumi-lang-dotnet=\"`Enabled`\" pulumi-lang-go=\"`enabled`\" pulumi-lang-python=\"`enabled`\" pulumi-lang-yaml=\"`enabled`\" pulumi-lang-java=\"`enabled`\"\u003e`enabled`\u003c/span\u003e to identify the rule name and whether it is enabled.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureCustomPolicyRule:getSecureCustomPolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureCustomPolicyTimeouts:getSecureCustomPolicyTimeouts"},"type":{"type":"string"}},"required":["description","enabled","id","name","notificationChannels","rules","scope","severity"],"type":"object"}},"sysdig:index/getSecureCustomRolePermissions:getSecureCustomRolePermissions":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst imagesEdit = sysdig.getSecureCustomRolePermissions({\n    requestedPermissions: [\"secure.blacklist.images.edit\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nimages_edit = sysdig.get_secure_custom_role_permissions(requested_permissions=[\"secure.blacklist.images.edit\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var imagesEdit = Sysdig.GetSecureCustomRolePermissions.Invoke(new()\n    {\n        RequestedPermissions = new[]\n        {\n            \"secure.blacklist.images.edit\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureCustomRolePermissions(ctx, \u0026sysdig.GetSecureCustomRolePermissionsArgs{\n\t\t\tRequestedPermissions: []string{\n\t\t\t\t\"secure.blacklist.images.edit\",\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureCustomRolePermissionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var imagesEdit = SysdigFunctions.getSecureCustomRolePermissions(GetSecureCustomRolePermissionsArgs.builder()\n            .requestedPermissions(\"secure.blacklist.images.edit\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  imagesEdit:\n    fn::invoke:\n      function: sysdig:getSecureCustomRolePermissions\n      arguments:\n        requestedPermissions:\n          - secure.blacklist.images.edit\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### With Custom Role\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst imagesEdit = sysdig.getSecureCustomRolePermissions({\n    requestedPermissions: [\"secure.blacklist.images.edit\"],\n});\nconst my_custom_role = new sysdig.CustomRole(\"my-custom-role\", {\n    name: \"custom-role-name\",\n    description: \"Custom role to edit images\",\n    permissions: {\n        securePermissions: imagesEdit.then(imagesEdit =\u003e imagesEdit.enrichedPermissions),\n    },\n}, {\n    dependsOn: [imagesEdit],\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nimages_edit = sysdig.get_secure_custom_role_permissions(requested_permissions=[\"secure.blacklist.images.edit\"])\nmy_custom_role = sysdig.CustomRole(\"my-custom-role\",\n    name=\"custom-role-name\",\n    description=\"Custom role to edit images\",\n    permissions={\n        \"secure_permissions\": images_edit.enriched_permissions,\n    },\n    opts = pulumi.ResourceOptions(depends_on=[images_edit]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var imagesEdit = Sysdig.GetSecureCustomRolePermissions.Invoke(new()\n    {\n        RequestedPermissions = new[]\n        {\n            \"secure.blacklist.images.edit\",\n        },\n    });\n\n    var my_custom_role = new Sysdig.CustomRole(\"my-custom-role\", new()\n    {\n        Name = \"custom-role-name\",\n        Description = \"Custom role to edit images\",\n        Permissions = new Sysdig.Inputs.CustomRolePermissionsArgs\n        {\n            SecurePermissions = imagesEdit.Apply(getSecureCustomRolePermissionsResult =\u003e getSecureCustomRolePermissionsResult.EnrichedPermissions),\n        },\n    }, new CustomResourceOptions\n    {\n        DependsOn =\n        {\n            imagesEdit,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\timagesEdit, err := sysdig.GetSecureCustomRolePermissions(ctx, \u0026sysdig.GetSecureCustomRolePermissionsArgs{\n\t\t\tRequestedPermissions: []string{\n\t\t\t\t\"secure.blacklist.images.edit\",\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = sysdig.NewCustomRole(ctx, \"my-custom-role\", \u0026sysdig.CustomRoleArgs{\n\t\t\tName:        pulumi.String(\"custom-role-name\"),\n\t\t\tDescription: pulumi.String(\"Custom role to edit images\"),\n\t\t\tPermissions: \u0026sysdig.CustomRolePermissionsArgs{\n\t\t\t\tSecurePermissions: interface{}(imagesEdit.EnrichedPermissions),\n\t\t\t},\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\timagesEdit,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureCustomRolePermissionsArgs;\nimport com.pulumi.sysdig.CustomRole;\nimport com.pulumi.sysdig.CustomRoleArgs;\nimport com.pulumi.sysdig.inputs.CustomRolePermissionsArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var imagesEdit = SysdigFunctions.getSecureCustomRolePermissions(GetSecureCustomRolePermissionsArgs.builder()\n            .requestedPermissions(\"secure.blacklist.images.edit\")\n            .build());\n\n        var my_custom_role = new CustomRole(\"my-custom-role\", CustomRoleArgs.builder()\n            .name(\"custom-role-name\")\n            .description(\"Custom role to edit images\")\n            .permissions(CustomRolePermissionsArgs.builder()\n                .securePermissions(imagesEdit.enrichedPermissions())\n                .build())\n            .build(), CustomResourceOptions.builder()\n                .dependsOn(imagesEdit)\n                .build());\n\n    }\n}\n```\n```yaml\nresources:\n  my-custom-role:\n    type: sysdig:CustomRole\n    properties:\n      name: custom-role-name\n      description: Custom role to edit images\n      permissions:\n        securePermissions: ${imagesEdit.enrichedPermissions}\n    options:\n      dependsOn:\n        - ${imagesEdit}\nvariables:\n  imagesEdit:\n    fn::invoke:\n      function: sysdig:getSecureCustomRolePermissions\n      arguments:\n        requestedPermissions:\n          - secure.blacklist.images.edit\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureCustomRolePermissions.\n","properties":{"id":{"type":"string"},"requestedPermissions":{"type":"array","items":{"type":"string"}},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureCustomRolePermissionsTimeouts:getSecureCustomRolePermissionsTimeouts"}},"type":"object","required":["requestedPermissions"]},"outputs":{"description":"A collection of values returned by getSecureCustomRolePermissions.\n","properties":{"enrichedPermissions":{"description":"The minimum set of permissions enriched with permissions on which the requested permissions depend\n","items":{"type":"string"},"type":"array"},"id":{"type":"string"},"requestedPermissions":{"items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureCustomRolePermissionsTimeouts:getSecureCustomRolePermissionsTimeouts"}},"required":["enrichedPermissions","id","requestedPermissions"],"type":"object"}},"sysdig:index/getSecureDriftPolicy:getSecureDriftPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst policy = sysdig.getSecureDriftPolicy({\n    name: \"Drift Policy 1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\npolicy = sysdig.get_secure_drift_policy(name=\"Drift Policy 1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var policy = Sysdig.GetSecureDriftPolicy.Invoke(new()\n    {\n        Name = \"Drift Policy 1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureDriftPolicy(ctx, \u0026sysdig.LookupSecureDriftPolicyArgs{\n\t\t\tName: \"Drift Policy 1\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureDriftPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var policy = SysdigFunctions.getSecureDriftPolicy(GetSecureDriftPolicyArgs.builder()\n            .name(\"Drift Policy 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  policy:\n    fn::invoke:\n      function: sysdig:getSecureDriftPolicy\n      arguments:\n        name: Drift Policy 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureDriftPolicy.\n","properties":{"id":{"type":"string","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyTimeouts:getSecureDriftPolicyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureDriftPolicy.\n","properties":{"actions":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyAction:getSecureDriftPolicyAction"},"type":"array"},"description":{"description":"(Required) The description of the drift rule.\n","type":"string"},"enabled":{"description":"(Required) Toggle to dynamically detect execution of drifted binaries. A drifted binary is any binary that was not part of the original image of the container. It is typically downloaded or compiled into a running container.\n","type":"boolean"},"id":{"description":"The id for the policy.\n","type":"string"},"name":{"description":"(Required) The name of the capture file\n","type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyRule:getSecureDriftPolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureDriftPolicyTimeouts:getSecureDriftPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"required":["actions","description","enabled","id","name","notificationChannels","rules","runbook","scope","severity","type","version"],"type":"object"}},"sysdig:index/getSecureMalwarePolicy:getSecureMalwarePolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureMalwarePolicy({\n    name: \"Sysdig Runtime Threat Detection\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_malware_policy(name=\"Sysdig Runtime Threat Detection\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureMalwarePolicy.Invoke(new()\n    {\n        Name = \"Sysdig Runtime Threat Detection\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureMalwarePolicy(ctx, \u0026sysdig.LookupSecureMalwarePolicyArgs{\n\t\t\tName: \"Sysdig Runtime Threat Detection\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureMalwarePolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureMalwarePolicy(GetSecureMalwarePolicyArgs.builder()\n            .name(\"Sysdig Runtime Threat Detection\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureMalwarePolicy\n      arguments:\n        name: Sysdig Runtime Threat Detection\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureMalwarePolicy.\n","properties":{"id":{"type":"string","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureMalwarePolicyTimeouts:getSecureMalwarePolicyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureMalwarePolicy.\n","properties":{"actions":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureMalwarePolicyAction:getSecureMalwarePolicyAction"},"type":"array"},"description":{"description":"(Required) The description of the malware rule.\n","type":"string"},"enabled":{"description":"Whether the policy is enabled or not.\n","type":"boolean"},"id":{"description":"The id for the policy.\n","type":"string"},"name":{"description":"(Required) The name of the capture file\n","type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureMalwarePolicyRule:getSecureMalwarePolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureMalwarePolicyTimeouts:getSecureMalwarePolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"required":["actions","description","enabled","id","name","notificationChannels","rules","runbook","scope","severity","type","version"],"type":"object"}},"sysdig:index/getSecureManagedPolicy:getSecureManagedPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureManagedPolicy({\n    name: \"Sysdig Runtime Threat Detection\",\n    type: \"falco\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_managed_policy(name=\"Sysdig Runtime Threat Detection\",\n    type=\"falco\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureManagedPolicy.Invoke(new()\n    {\n        Name = \"Sysdig Runtime Threat Detection\",\n        Type = \"falco\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureManagedPolicy(ctx, \u0026sysdig.LookupSecureManagedPolicyArgs{\n\t\t\tName: \"Sysdig Runtime Threat Detection\",\n\t\t\tType: pulumi.StringRef(\"falco\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureManagedPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureManagedPolicy(GetSecureManagedPolicyArgs.builder()\n            .name(\"Sysdig Runtime Threat Detection\")\n            .type(\"falco\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureManagedPolicy\n      arguments:\n        name: Sysdig Runtime Threat Detection\n        type: falco\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureManagedPolicy.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedPolicyAction:getSecureManagedPolicyAction"}},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureManagedPolicyTimeouts:getSecureManagedPolicyTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureManagedPolicy.\n","properties":{"actions":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedPolicyAction:getSecureManagedPolicyAction"},"type":"array"},"description":{"description":"The description for the managed policy.\n","type":"string"},"enabled":{"description":"Whether the policy is enabled or not.\n","type":"boolean"},"id":{"description":"The id for the managed policy.\n","type":"number"},"name":{"description":"(Required) The name of the capture file\n","type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"description":"An array of rules with the properties \u003cspan pulumi-lang-nodejs=\"`name`\" pulumi-lang-dotnet=\"`Name`\" pulumi-lang-go=\"`name`\" pulumi-lang-python=\"`name`\" pulumi-lang-yaml=\"`name`\" pulumi-lang-java=\"`name`\"\u003e`name`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`enabled`\" pulumi-lang-dotnet=\"`Enabled`\" pulumi-lang-go=\"`enabled`\" pulumi-lang-python=\"`enabled`\" pulumi-lang-yaml=\"`enabled`\" pulumi-lang-java=\"`enabled`\"\u003e`enabled`\u003c/span\u003e to identify the rule name and whether it is enabled.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedPolicyRule:getSecureManagedPolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureManagedPolicyTimeouts:getSecureManagedPolicyTimeouts"},"type":{"type":"string"}},"required":["description","enabled","id","name","notificationChannels","rules","scope","severity"],"type":"object"}},"sysdig:index/getSecureManagedRuleset:getSecureManagedRuleset":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureManagedRuleset({\n    name: \"Sysdig Runtime Threat Detection - Managed Ruleset\",\n    type: \"falco\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_managed_ruleset(name=\"Sysdig Runtime Threat Detection - Managed Ruleset\",\n    type=\"falco\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureManagedRuleset.Invoke(new()\n    {\n        Name = \"Sysdig Runtime Threat Detection - Managed Ruleset\",\n        Type = \"falco\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureManagedRuleset(ctx, \u0026sysdig.LookupSecureManagedRulesetArgs{\n\t\t\tName: \"Sysdig Runtime Threat Detection - Managed Ruleset\",\n\t\t\tType: pulumi.StringRef(\"falco\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureManagedRulesetArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureManagedRuleset(GetSecureManagedRulesetArgs.builder()\n            .name(\"Sysdig Runtime Threat Detection - Managed Ruleset\")\n            .type(\"falco\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureManagedRuleset\n      arguments:\n        name: Sysdig Runtime Threat Detection - Managed Ruleset\n        type: falco\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureManagedRuleset.\n","properties":{"actions":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedRulesetAction:getSecureManagedRulesetAction"}},"name":{"type":"string","description":"The name of the Secure managed ruleset.\n"},"runbook":{"type":"string","description":"Customer provided url that provides a runbook for a given policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureManagedRulesetTimeouts:getSecureManagedRulesetTimeouts"},"type":{"type":"string","description":"Specifies the type of the runtime policy. Must be one of: \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`listMatching`\" pulumi-lang-dotnet=\"`ListMatching`\" pulumi-lang-go=\"`listMatching`\" pulumi-lang-python=\"`list_matching`\" pulumi-lang-yaml=\"`listMatching`\" pulumi-lang-java=\"`listMatching`\"\u003e`list_matching`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`k8sAudit`\" pulumi-lang-dotnet=\"`K8sAudit`\" pulumi-lang-go=\"`k8sAudit`\" pulumi-lang-python=\"`k8s_audit`\" pulumi-lang-yaml=\"`k8sAudit`\" pulumi-lang-java=\"`k8sAudit`\"\u003e`k8s_audit`\u003c/span\u003e,\n\u003cspan pulumi-lang-nodejs=\"`awsCloudtrail`\" pulumi-lang-dotnet=\"`AwsCloudtrail`\" pulumi-lang-go=\"`awsCloudtrail`\" pulumi-lang-python=\"`aws_cloudtrail`\" pulumi-lang-yaml=\"`awsCloudtrail`\" pulumi-lang-java=\"`awsCloudtrail`\"\u003e`aws_cloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcpAuditlog`\" pulumi-lang-dotnet=\"`GcpAuditlog`\" pulumi-lang-go=\"`gcpAuditlog`\" pulumi-lang-python=\"`gcp_auditlog`\" pulumi-lang-yaml=\"`gcpAuditlog`\" pulumi-lang-java=\"`gcpAuditlog`\"\u003e`gcp_auditlog`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`azurePlatformlogs`\" pulumi-lang-dotnet=\"`AzurePlatformlogs`\" pulumi-lang-go=\"`azurePlatformlogs`\" pulumi-lang-python=\"`azure_platformlogs`\" pulumi-lang-yaml=\"`azurePlatformlogs`\" pulumi-lang-java=\"`azurePlatformlogs`\"\u003e`azure_platformlogs`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`awscloudtrail`\" pulumi-lang-dotnet=\"`Awscloudtrail`\" pulumi-lang-go=\"`awscloudtrail`\" pulumi-lang-python=\"`awscloudtrail`\" pulumi-lang-yaml=\"`awscloudtrail`\" pulumi-lang-java=\"`awscloudtrail`\"\u003e`awscloudtrail`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`okta`\" pulumi-lang-dotnet=\"`Okta`\" pulumi-lang-go=\"`okta`\" pulumi-lang-python=\"`okta`\" pulumi-lang-yaml=\"`okta`\" pulumi-lang-java=\"`okta`\"\u003e`okta`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`github`\" pulumi-lang-dotnet=\"`Github`\" pulumi-lang-go=\"`github`\" pulumi-lang-python=\"`github`\" pulumi-lang-yaml=\"`github`\" pulumi-lang-java=\"`github`\"\u003e`github`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`guardduty`\" pulumi-lang-dotnet=\"`Guardduty`\" pulumi-lang-go=\"`guardduty`\" pulumi-lang-python=\"`guardduty`\" pulumi-lang-yaml=\"`guardduty`\" pulumi-lang-java=\"`guardduty`\"\u003e`guardduty`\u003c/span\u003e. By default it is \u003cspan pulumi-lang-nodejs=\"`falco`\" pulumi-lang-dotnet=\"`Falco`\" pulumi-lang-go=\"`falco`\" pulumi-lang-python=\"`falco`\" pulumi-lang-yaml=\"`falco`\" pulumi-lang-java=\"`falco`\"\u003e`falco`\u003c/span\u003e.\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureManagedRuleset.\n","properties":{"actions":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedRulesetAction:getSecureManagedRulesetAction"},"type":"array"},"description":{"description":"The description for the managed policy.\n","type":"string"},"enabled":{"description":"Whether the policy is enabled or not.\n","type":"boolean"},"id":{"description":"The id for the managed policy.\n","type":"number"},"name":{"description":"(Required) The name of the capture file\n","type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"description":"An array of rules with the properties \u003cspan pulumi-lang-nodejs=\"`name`\" pulumi-lang-dotnet=\"`Name`\" pulumi-lang-go=\"`name`\" pulumi-lang-python=\"`name`\" pulumi-lang-yaml=\"`name`\" pulumi-lang-java=\"`name`\"\u003e`name`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`enabled`\" pulumi-lang-dotnet=\"`Enabled`\" pulumi-lang-go=\"`enabled`\" pulumi-lang-python=\"`enabled`\" pulumi-lang-yaml=\"`enabled`\" pulumi-lang-java=\"`enabled`\"\u003e`enabled`\u003c/span\u003e to identify the rule name and whether it is enabled.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureManagedRulesetRule:getSecureManagedRulesetRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureManagedRulesetTimeouts:getSecureManagedRulesetTimeouts"},"type":{"type":"string"}},"required":["description","enabled","id","name","notificationChannels","rules","scope","severity"],"type":"object"}},"sysdig:index/getSecureMlPolicy:getSecureMlPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst policy = sysdig.getSecureMlPolicy({\n    name: \"ML Policy 1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\npolicy = sysdig.get_secure_ml_policy(name=\"ML Policy 1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var policy = Sysdig.GetSecureMlPolicy.Invoke(new()\n    {\n        Name = \"ML Policy 1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureMlPolicy(ctx, \u0026sysdig.LookupSecureMlPolicyArgs{\n\t\t\tName: \"ML Policy 1\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureMlPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var policy = SysdigFunctions.getSecureMlPolicy(GetSecureMlPolicyArgs.builder()\n            .name(\"ML Policy 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  policy:\n    fn::invoke:\n      function: sysdig:getSecureMlPolicy\n      arguments:\n        name: ML Policy 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureMlPolicy.\n","properties":{"id":{"type":"string","description":"The id for the policy.\n"},"name":{"type":"string","description":"The name of the Secure managed policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureMlPolicyTimeouts:getSecureMlPolicyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureMlPolicy.\n","properties":{"description":{"description":"(Required) Rule description.\n","type":"string"},"enabled":{"description":"Whether the policy is enabled or not.\n","type":"boolean"},"id":{"description":"The id for the policy.\n","type":"string"},"name":{"type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureMlPolicyRule:getSecureMlPolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureMlPolicyTimeouts:getSecureMlPolicyTimeouts"},"type":{"type":"string"},"version":{"type":"number"}},"required":["description","enabled","id","name","notificationChannels","rules","runbook","scope","severity","type","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelEmail:getSecureNotificationChannelEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncEmail = sysdig.getSecureNotificationChannelEmail({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_email = sysdig.get_secure_notification_channel_email(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncEmail = Sysdig.GetSecureNotificationChannelEmail.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelEmail(ctx, \u0026sysdig.LookupSecureNotificationChannelEmailArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncEmail = SysdigFunctions.getSecureNotificationChannelEmail(GetSecureNotificationChannelEmailArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncEmail:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelEmail\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelEmail.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelEmailTimeouts:getSecureNotificationChannelEmailTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelEmail.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"recipients":{"description":"List of recipients that will receive the message.\n","items":{"type":"string"},"type":"array"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelEmailTimeouts:getSecureNotificationChannelEmailTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","recipients","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelMsteams:getSecureNotificationChannelMsteams":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncMsteams = sysdig.getSecureNotificationChannelMsteams({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_msteams = sysdig.get_secure_notification_channel_msteams(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncMsteams = Sysdig.GetSecureNotificationChannelMsteams.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelMsteams(ctx, \u0026sysdig.LookupSecureNotificationChannelMsteamsArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelMsteamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncMsteams = SysdigFunctions.getSecureNotificationChannelMsteams(GetSecureNotificationChannelMsteamsArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncMsteams:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelMsteams\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelMsteams.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelMsteamsTimeouts:getSecureNotificationChannelMsteamsTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelMsteams.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"templateVersion":{"description":"The notification template version to use to create notifications.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelMsteamsTimeouts:getSecureNotificationChannelMsteamsTimeouts"},"url":{"description":"URL of the MS Teams webhook.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","templateVersion","url","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelOpsgenie:getSecureNotificationChannelOpsgenie":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncOpsgenie = sysdig.getSecureNotificationChannelOpsgenie({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_opsgenie = sysdig.get_secure_notification_channel_opsgenie(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncOpsgenie = Sysdig.GetSecureNotificationChannelOpsgenie.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelOpsgenie(ctx, \u0026sysdig.LookupSecureNotificationChannelOpsgenieArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelOpsgenieArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncOpsgenie = SysdigFunctions.getSecureNotificationChannelOpsgenie(GetSecureNotificationChannelOpsgenieArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncOpsgenie:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelOpsgenie\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelOpsgenie.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelOpsgenieTimeouts:getSecureNotificationChannelOpsgenieTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelOpsgenie.\n","properties":{"apiKey":{"description":"Key for the API.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"region":{"description":"Opsgenie Region.\n","type":"string"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelOpsgenieTimeouts:getSecureNotificationChannelOpsgenieTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["apiKey","id","name","region","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelPagerduty:getSecureNotificationChannelPagerduty":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncPagerduty = sysdig.getSecureNotificationChannelPagerduty({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_pagerduty = sysdig.get_secure_notification_channel_pagerduty(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncPagerduty = Sysdig.GetSecureNotificationChannelPagerduty.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelPagerduty(ctx, \u0026sysdig.LookupSecureNotificationChannelPagerdutyArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelPagerdutyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncPagerduty = SysdigFunctions.getSecureNotificationChannelPagerduty(GetSecureNotificationChannelPagerdutyArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncPagerduty:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelPagerduty\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelPagerduty.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelPagerdutyTimeouts:getSecureNotificationChannelPagerdutyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelPagerduty.\n","properties":{"account":{"description":"Pagerduty account.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"serviceKey":{"description":"Service Key for the Pagerduty account.\n","type":"string"},"serviceName":{"description":"Service name for the Pagerduty account.\n","type":"string"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelPagerdutyTimeouts:getSecureNotificationChannelPagerdutyTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["account","id","name","serviceKey","serviceName","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelPrometheusAlertManager:getSecureNotificationChannelPrometheusAlertManager":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncPrometheusAlertManager = sysdig.getSecureNotificationChannelPrometheusAlertManager({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_prometheus_alert_manager = sysdig.get_secure_notification_channel_prometheus_alert_manager(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncPrometheusAlertManager = Sysdig.GetSecureNotificationChannelPrometheusAlertManager.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelPrometheusAlertManager(ctx, \u0026sysdig.LookupSecureNotificationChannelPrometheusAlertManagerArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelPrometheusAlertManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncPrometheusAlertManager = SysdigFunctions.getSecureNotificationChannelPrometheusAlertManager(GetSecureNotificationChannelPrometheusAlertManagerArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncPrometheusAlertManager:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelPrometheusAlertManager\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelPrometheusAlertManager.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelPrometheusAlertManagerTimeouts:getSecureNotificationChannelPrometheusAlertManagerTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelPrometheusAlertManager.\n","properties":{"additionalHeaders":{"additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n","type":"object"},"allowInsecureConnections":{"description":"Whether to skip TLS verification.\n","type":"boolean"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelPrometheusAlertManagerTimeouts:getSecureNotificationChannelPrometheusAlertManagerTimeouts"},"url":{"description":"URL to send the event.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["additionalHeaders","allowInsecureConnections","id","name","url","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelSlack:getSecureNotificationChannelSlack":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncSlack = sysdig.getSecureNotificationChannelSlack({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_slack = sysdig.get_secure_notification_channel_slack(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncSlack = Sysdig.GetSecureNotificationChannelSlack.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelSlack(ctx, \u0026sysdig.LookupSecureNotificationChannelSlackArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncSlack = SysdigFunctions.getSecureNotificationChannelSlack(GetSecureNotificationChannelSlackArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncSlack:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelSlack\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelSlack.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a user.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelSlackTimeouts:getSecureNotificationChannelSlackTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelSlack.\n","properties":{"channel":{"description":"Name of the Slack channel.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"isPrivateChannel":{"description":"Whether the Slack Channel has been marked as private or not.\n","type":"boolean"},"name":{"type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a user.\n","type":"boolean"},"privateChannelUrl":{"description":"The channel URL, i.e. the link that is referencing the channel (not to be confused with the webhook url), if the channel is private.\n","type":"string"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"templateVersion":{"description":"The notification template version to use to create notifications.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelSlackTimeouts:getSecureNotificationChannelSlackTimeouts"},"url":{"description":"URL of the Slack webhook.\n","secret":true,"type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["channel","id","isPrivateChannel","name","privateChannelUrl","templateVersion","url","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelSns:getSecureNotificationChannelSns":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncSns = sysdig.getSecureNotificationChannelSns({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_sns = sysdig.get_secure_notification_channel_sns(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncSns = Sysdig.GetSecureNotificationChannelSns.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelSns(ctx, \u0026sysdig.LookupSecureNotificationChannelSnsArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelSnsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncSns = SysdigFunctions.getSecureNotificationChannelSns(GetSecureNotificationChannelSnsArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncSns:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelSns\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelSns.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelSnsTimeouts:getSecureNotificationChannelSnsTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelSns.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelSnsTimeouts:getSecureNotificationChannelSnsTimeouts"},"topics":{"description":"List of ARNs from the SNS topics.\n","items":{"type":"string"},"type":"array"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","name","topics","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelTeamEmail:getSecureNotificationChannelTeamEmail":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncTeamEmail = sysdig.getSecureNotificationChannelTeamEmail({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_team_email = sysdig.get_secure_notification_channel_team_email(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncTeamEmail = Sysdig.GetSecureNotificationChannelTeamEmail.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelTeamEmail(ctx, \u0026sysdig.LookupSecureNotificationChannelTeamEmailArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelTeamEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncTeamEmail = SysdigFunctions.getSecureNotificationChannelTeamEmail(GetSecureNotificationChannelTeamEmailArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncTeamEmail:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelTeamEmail\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelTeamEmail.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelTeamEmailTimeouts:getSecureNotificationChannelTeamEmailTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelTeamEmail.\n","properties":{"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"includeAdminUsers":{"description":"Whether the Notification Channel includes admin users in notifications.\n","type":"boolean"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"teamId":{"description":"id of the team.\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelTeamEmailTimeouts:getSecureNotificationChannelTeamEmailTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["id","includeAdminUsers","name","teamId","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelVictorops:getSecureNotificationChannelVictorops":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncVictorops = sysdig.getSecureNotificationChannelVictorops({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_victorops = sysdig.get_secure_notification_channel_victorops(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncVictorops = Sysdig.GetSecureNotificationChannelVictorops.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelVictorops(ctx, \u0026sysdig.LookupSecureNotificationChannelVictoropsArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelVictoropsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncVictorops = SysdigFunctions.getSecureNotificationChannelVictorops(GetSecureNotificationChannelVictoropsArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncVictorops:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelVictorops\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelVictorops.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelVictoropsTimeouts:getSecureNotificationChannelVictoropsTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelVictorops.\n","properties":{"apiKey":{"description":"Key for the API.\n","type":"string"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"routingKey":{"description":"Routing key for VictorOps.\n","type":"string"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelVictoropsTimeouts:getSecureNotificationChannelVictoropsTimeouts"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["apiKey","id","name","routingKey","version"],"type":"object"}},"sysdig:index/getSecureNotificationChannelWebhook:getSecureNotificationChannelWebhook":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst ncWebhook = sysdig.getSecureNotificationChannelWebhook({\n    name: \"some notification channel name\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nnc_webhook = sysdig.get_secure_notification_channel_webhook(name=\"some notification channel name\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ncWebhook = Sysdig.GetSecureNotificationChannelWebhook.Invoke(new()\n    {\n        Name = \"some notification channel name\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureNotificationChannelWebhook(ctx, \u0026sysdig.LookupSecureNotificationChannelWebhookArgs{\n\t\t\tName: \"some notification channel name\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureNotificationChannelWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var ncWebhook = SysdigFunctions.getSecureNotificationChannelWebhook(GetSecureNotificationChannelWebhookArgs.builder()\n            .name(\"some notification channel name\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  ncWebhook:\n    fn::invoke:\n      function: sysdig:getSecureNotificationChannelWebhook\n      arguments:\n        name: some notification channel name\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureNotificationChannelWebhook.\n","properties":{"enabled":{"type":"boolean","description":"Whether the Notification Channel is active or not.\n"},"id":{"type":"string","description":"The Notification Channel ID.\n"},"name":{"type":"string","description":"The name of the Notification Channel to retrieve.\n"},"notifyWhenOk":{"type":"boolean","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","deprecationMessage":"Deprecated"},"notifyWhenResolved":{"type":"boolean","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","deprecationMessage":"Deprecated"},"sendTestNotification":{"type":"boolean","description":"Whether the Notification Channel has enabled the test notification.\n"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelWebhookTimeouts:getSecureNotificationChannelWebhookTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureNotificationChannelWebhook.\n","properties":{"additionalHeaders":{"additionalProperties":{"type":"string"},"description":"Key value list of custom headers.\n","type":"object"},"allowInsecureConnections":{"description":"Whether to skip TLS verification. Default: \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n","type":"boolean"},"customData":{"additionalProperties":{"type":"string"},"description":"Key value list of additional data you want to attach to the alert notification.\n","type":"object"},"enabled":{"description":"Whether the Notification Channel is active or not.\n","type":"boolean"},"id":{"description":"The Notification Channel ID.\n","type":"string"},"name":{"description":"The Notification Channel Name.\n","type":"string"},"notifyWhenOk":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification when the condition is no longer triggered.\n","type":"boolean"},"notifyWhenResolved":{"deprecationMessage":"Deprecated","description":"Whether the Notification Channel sends a notification if it's manually acknowledged by a\nuser.\n","type":"boolean"},"sendTestNotification":{"description":"Whether the Notification Channel has enabled the test notification.\n","type":"boolean"},"shareWithCurrentTeam":{"type":"boolean"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureNotificationChannelWebhookTimeouts:getSecureNotificationChannelWebhookTimeouts"},"url":{"description":"URL to send the event.\n","type":"string"},"version":{"description":"The version of the Notification Channel.\n","type":"number"}},"required":["additionalHeaders","allowInsecureConnections","customData","id","name","url","version"],"type":"object"}},"sysdig:index/getSecureOktaMlPolicy:getSecureOktaMlPolicy":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst policy = sysdig.getSecureOktaMlPolicy({\n    name: \"My Okta ML Policy\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\npolicy = sysdig.get_secure_okta_ml_policy(name=\"My Okta ML Policy\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var policy = Sysdig.GetSecureOktaMlPolicy.Invoke(new()\n    {\n        Name = \"My Okta ML Policy\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureOktaMlPolicy(ctx, \u0026sysdig.LookupSecureOktaMlPolicyArgs{\n\t\t\tName: \"My Okta ML Policy\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureOktaMlPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var policy = SysdigFunctions.getSecureOktaMlPolicy(GetSecureOktaMlPolicyArgs.builder()\n            .name(\"My Okta ML Policy\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  policy:\n    fn::invoke:\n      function: sysdig:getSecureOktaMlPolicy\n      arguments:\n        name: My Okta ML Policy\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureOktaMlPolicy.\n","properties":{"id":{"type":"string","description":"The ID of the rule.\n"},"name":{"type":"string","description":"The name of the Secure Okta ML policy.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureOktaMlPolicyTimeouts:getSecureOktaMlPolicyTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureOktaMlPolicy.\n","properties":{"description":{"description":"Rule description.\n","type":"string"},"enabled":{"description":"Whether anomaly detection is enabled.\n","type":"boolean"},"id":{"description":"The ID of the rule.\n","type":"string"},"name":{"description":"The name of the rule.\n","type":"string"},"notificationChannels":{"description":"IDs of the notification channels to send alerts to\nwhen the policy is fired.\n","items":{"type":"number"},"type":"array"},"rules":{"items":{"$ref":"#/types/sysdig:index%2FgetSecureOktaMlPolicyRule:getSecureOktaMlPolicyRule"},"type":"array"},"runbook":{"description":"Customer provided url that provides a runbook for a given policy.\n","type":"string"},"scope":{"description":"The application scope for the policy.\n","type":"string"},"severity":{"description":"The severity of Secure policy. The accepted values\nare: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info).\n","type":"number"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureOktaMlPolicyTimeouts:getSecureOktaMlPolicyTimeouts"},"type":{"description":"The type of the policy. Always set to \u003cspan pulumi-lang-nodejs=\"\"oktaMachineLearning\"\" pulumi-lang-dotnet=\"\"OktaMachineLearning\"\" pulumi-lang-go=\"\"oktaMachineLearning\"\" pulumi-lang-python=\"\"okta_machine_learning\"\" pulumi-lang-yaml=\"\"oktaMachineLearning\"\" pulumi-lang-java=\"\"oktaMachineLearning\"\"\u003e\"okta_machine_learning\"\u003c/span\u003e.\n","type":"string"},"version":{"description":"The version of the rule.\n","type":"number"}},"required":["description","enabled","id","name","notificationChannels","rules","runbook","scope","severity","type","version"],"type":"object"}},"sysdig:index/getSecurePosturePolicies:getSecurePosturePolicies":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst policies = sysdig.getSecurePosturePolicies({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\npolicies = sysdig.get_secure_posture_policies()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var policies = Sysdig.GetSecurePosturePolicies.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecurePosturePolicies(ctx, \u0026sysdig.GetSecurePosturePoliciesArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecurePosturePoliciesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var policies = SysdigFunctions.getSecurePosturePolicies(GetSecurePosturePoliciesArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  policies:\n    fn::invoke:\n      function: sysdig:getSecurePosturePolicies\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecurePosturePolicies.\n","properties":{"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePoliciesTimeouts:getSecurePosturePoliciesTimeouts"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecurePosturePolicies.\n","properties":{"id":{"description":"Zone ID\n","type":"string"},"policies":{"description":"List of posture policy objects.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePoliciesPolicy:getSecurePosturePoliciesPolicy"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePoliciesTimeouts:getSecurePosturePoliciesTimeouts"}},"required":["id","policies"],"type":"object"}},"sysdig:index/getSecurePosturePolicy:getSecurePosturePolicy":{"description":"## Example Usage\n\n","inputs":{"description":"A collection of arguments for invoking getSecurePosturePolicy.\n","properties":{"groups":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroup:getSecurePosturePolicyGroup"}},"id":{"type":"string","description":"The ID of the Posture Policy, eg. \u003cspan pulumi-lang-nodejs=\"`2`\" pulumi-lang-dotnet=\"`2`\" pulumi-lang-go=\"`2`\" pulumi-lang-python=\"`2`\" pulumi-lang-yaml=\"`2`\" pulumi-lang-java=\"`2`\"\u003e`2`\u003c/span\u003e\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyTimeouts:getSecurePosturePolicyTimeouts"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getSecurePosturePolicy.\n","properties":{"description":{"description":"The description of the Posture Policy Requirement.\n","type":"string"},"groups":{"items":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyGroup:getSecurePosturePolicyGroup"},"type":"array"},"id":{"description":"The ID of the Requirement, eg. \u003cspan pulumi-lang-nodejs=\"`15000`\" pulumi-lang-dotnet=\"`15000`\" pulumi-lang-go=\"`15000`\" pulumi-lang-python=\"`15000`\" pulumi-lang-yaml=\"`15000`\" pulumi-lang-java=\"`15000`\"\u003e`15000`\u003c/span\u003e\n","type":"string"},"isActive":{"description":"Policy is active flag (active means policy is published, not active means policy is draft). by default is true.\n","type":"boolean"},"link":{"description":"Policy link\n","type":"string"},"maxKubeVersion":{"description":"Policy maximum Kubernetes version, eg. `1.26`\n","type":"number"},"minKubeVersion":{"description":"Policy minimum Kubernetes version, eg. `1.24`\n","type":"number"},"name":{"description":"The name of the Posture Control.\n","type":"string"},"platform":{"description":"Policy platform: \n- IKS -     \u003cspan pulumi-lang-nodejs=\"`iks`\" pulumi-lang-dotnet=\"`Iks`\" pulumi-lang-go=\"`iks`\" pulumi-lang-python=\"`iks`\" pulumi-lang-yaml=\"`iks`\" pulumi-lang-java=\"`iks`\"\u003e`iks`\u003c/span\u003e,\n- GKE -     \u003cspan pulumi-lang-nodejs=\"`gke`\" pulumi-lang-dotnet=\"`Gke`\" pulumi-lang-go=\"`gke`\" pulumi-lang-python=\"`gke`\" pulumi-lang-yaml=\"`gke`\" pulumi-lang-java=\"`gke`\"\u003e`gke`\u003c/span\u003e,\n- Vanilla -  \u003cspan pulumi-lang-nodejs=\"`vanilla`\" pulumi-lang-dotnet=\"`Vanilla`\" pulumi-lang-go=\"`vanilla`\" pulumi-lang-python=\"`vanilla`\" pulumi-lang-yaml=\"`vanilla`\" pulumi-lang-java=\"`vanilla`\"\u003e`vanilla`\u003c/span\u003e,\n- AKS -     \u003cspan pulumi-lang-nodejs=\"`aks`\" pulumi-lang-dotnet=\"`Aks`\" pulumi-lang-go=\"`aks`\" pulumi-lang-python=\"`aks`\" pulumi-lang-yaml=\"`aks`\" pulumi-lang-java=\"`aks`\"\u003e`aks`\u003c/span\u003e,\n- RKE2 -     \u003cspan pulumi-lang-nodejs=\"`rke2`\" pulumi-lang-dotnet=\"`Rke2`\" pulumi-lang-go=\"`rke2`\" pulumi-lang-python=\"`rke2`\" pulumi-lang-yaml=\"`rke2`\" pulumi-lang-java=\"`rke2`\"\u003e`rke2`\u003c/span\u003e,\n- OCP4  -     \u003cspan pulumi-lang-nodejs=\"`ocp4`\" pulumi-lang-dotnet=\"`Ocp4`\" pulumi-lang-go=\"`ocp4`\" pulumi-lang-python=\"`ocp4`\" pulumi-lang-yaml=\"`ocp4`\" pulumi-lang-java=\"`ocp4`\"\u003e`ocp4`\u003c/span\u003e,\n- MKE  -      \u003cspan pulumi-lang-nodejs=\"`mke`\" pulumi-lang-dotnet=\"`Mke`\" pulumi-lang-go=\"`mke`\" pulumi-lang-python=\"`mke`\" pulumi-lang-yaml=\"`mke`\" pulumi-lang-java=\"`mke`\"\u003e`mke`\u003c/span\u003e,\n- EKS  -     \u003cspan pulumi-lang-nodejs=\"`eks`\" pulumi-lang-dotnet=\"`Eks`\" pulumi-lang-go=\"`eks`\" pulumi-lang-python=\"`eks`\" pulumi-lang-yaml=\"`eks`\" pulumi-lang-java=\"`eks`\"\u003e`eks`\u003c/span\u003e,\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecurePosturePolicyTimeouts:getSecurePosturePolicyTimeouts"},"type":{"description":"Policy type:\n- AWS - \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e\n- GCP - \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e\n- Azure - \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n- Kubernetes - \u003cspan pulumi-lang-nodejs=\"`kubernetes`\" pulumi-lang-dotnet=\"`Kubernetes`\" pulumi-lang-go=\"`kubernetes`\" pulumi-lang-python=\"`kubernetes`\" pulumi-lang-yaml=\"`kubernetes`\" pulumi-lang-java=\"`kubernetes`\"\u003e`kubernetes`\u003c/span\u003e\n- Linux - \u003cspan pulumi-lang-nodejs=\"`linux`\" pulumi-lang-dotnet=\"`Linux`\" pulumi-lang-go=\"`linux`\" pulumi-lang-python=\"`linux`\" pulumi-lang-yaml=\"`linux`\" pulumi-lang-java=\"`linux`\"\u003e`linux`\u003c/span\u003e\n- Docker - \u003cspan pulumi-lang-nodejs=\"`docker`\" pulumi-lang-dotnet=\"`Docker`\" pulumi-lang-go=\"`docker`\" pulumi-lang-python=\"`docker`\" pulumi-lang-yaml=\"`docker`\" pulumi-lang-java=\"`docker`\"\u003e`docker`\u003c/span\u003e\n- OCI = \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e\n","type":"string"}},"required":["description","id","isActive","link","maxKubeVersion","minKubeVersion","name","platform","type"],"type":"object"}},"sysdig:index/getSecurePostureZone:getSecurePostureZone":{"description":"The \u003cspan pulumi-lang-nodejs=\"`sysdig.SecurePostureZone`\" pulumi-lang-dotnet=\"`sysdig.SecurePostureZone`\" pulumi-lang-go=\"`SecurePostureZone`\" pulumi-lang-python=\"`SecurePostureZone`\" pulumi-lang-yaml=\"`sysdig.SecurePostureZone`\" pulumi-lang-java=\"`sysdig.SecurePostureZone`\"\u003e`sysdig.SecurePostureZone`\u003c/span\u003e data source allows you to retrieve information about a specific secure posture zone by its ID.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecurePostureZone({\n    id: \"454678\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_posture_zone(id=\"454678\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecurePostureZone.Invoke(new()\n    {\n        Id = \"454678\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecurePostureZone(ctx, \u0026sysdig.LookupSecurePostureZoneArgs{\n\t\t\tId: \"454678\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecurePostureZoneArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecurePostureZone(GetSecurePostureZoneArgs.builder()\n            .id(\"454678\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecurePostureZone\n      arguments:\n        id: '454678'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecurePostureZone.\n","properties":{"id":{"type":"string","description":"The ID of the secure posture zone to retrieve.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getSecurePostureZone.\n","properties":{"author":{"description":"The author of the secure posture zone.\n","type":"string"},"description":{"description":"The description of the secure posture zone.\n","type":"string"},"id":{"type":"string"},"lastModifiedBy":{"description":"The user who last modified the secure posture zone.\n","type":"string"},"lastUpdated":{"description":"The timestamp of the last update to the secure posture zone.\n","type":"string"},"name":{"description":"The name of the secure posture zone.\n","type":"string"},"policyIds":{"description":"A list of policy IDs associated with the secure posture zone.\n","items":{"type":"number"},"type":"array"},"scopes":{"description":"A list of scopes associated with the secure posture zone. Each scope contains:\n","items":{"$ref":"#/types/sysdig:index%2FgetSecurePostureZoneScope:getSecurePostureZoneScope"},"type":"array"}},"required":["author","description","id","lastModifiedBy","lastUpdated","name","policyIds","scopes"],"type":"object"}},"sysdig:index/getSecureRuleContainer:getSecureRuleContainer":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleContainer({\n    name: \"Nginx container spawned\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_container(name=\"Nginx container spawned\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleContainer.Invoke(new()\n    {\n        Name = \"Nginx container spawned\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureRuleContainer(ctx, \u0026sysdig.LookupSecureRuleContainerArgs{\n\t\t\tName: \"Nginx container spawned\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleContainerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleContainer(GetSecureRuleContainerArgs.builder()\n            .name(\"Nginx container spawned\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleContainer\n      arguments:\n        name: Nginx container spawned\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleContainer.\n","properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleContainerTimeouts:getSecureRuleContainerTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleContainer.\n","properties":{"containers":{"description":"List of containers to match.\n","items":{"type":"string"},"type":"array"},"description":{"description":"The description of Secure rule.\n","type":"string"},"id":{"type":"number"},"matching":{"description":"Defines if the image name matches or not with the provided list. Default is true.\n","type":"boolean"},"name":{"type":"string"},"tags":{"description":"A list of tags for this rule.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleContainerTimeouts:getSecureRuleContainerTimeouts"},"version":{"description":"Current version of the resource in Sysdig Secure.\n","type":"number"}},"required":["containers","description","id","matching","name","tags","version"],"type":"object"}},"sysdig:index/getSecureRuleFalco:getSecureRuleFalco":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleFalco({\n    name: \"Terminal shell in container\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_falco(name=\"Terminal shell in container\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleFalco.Invoke(new()\n    {\n        Name = \"Terminal shell in container\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureRuleFalco(ctx, \u0026sysdig.LookupSecureRuleFalcoArgs{\n\t\t\tName: \"Terminal shell in container\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleFalcoArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleFalco(GetSecureRuleFalcoArgs.builder()\n            .name(\"Terminal shell in container\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleFalco\n      arguments:\n        name: Terminal shell in container\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Rules with Appended Rules\n\nIn the event that a rule has appended rules, the data source can return the default rule and its appended rules using\nthe \u003cspan pulumi-lang-nodejs=\"`index`\" pulumi-lang-dotnet=\"`Index`\" pulumi-lang-go=\"`index`\" pulumi-lang-python=\"`index`\" pulumi-lang-yaml=\"`index`\" pulumi-lang-java=\"`index`\"\u003e`index`\u003c/span\u003e argument. This can be combined with the \u003cspan pulumi-lang-nodejs=\"`sysdig.getSecureRuleFalcoCount`\" pulumi-lang-dotnet=\"`sysdig.getSecureRuleFalcoCount`\" pulumi-lang-go=\"`getSecureRuleFalcoCount`\" pulumi-lang-python=\"`get_secure_rule_falco_count`\" pulumi-lang-yaml=\"`sysdig.getSecureRuleFalcoCount`\" pulumi-lang-java=\"`sysdig.getSecureRuleFalcoCount`\"\u003e`sysdig.getSecureRuleFalcoCount`\u003c/span\u003e data source to easily retrieve all\nof the rules in the rule group.\n\nAn example of how this could be used follows:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst disallowedContainer = sysdig.getSecureRuleFalcoCount({\n    name: \"Launch Disallowed Container\",\n    source: \"syscall\",\n});\nconst disallowedContainerGetSecureRuleFalco = .map(__index =\u003e (sysdig.getSecureRuleFalco({\n    name: \"Launch Disallowed Container\",\n    source: \"syscall\",\n    index: __index,\n})));\nexport const disallowedContainerRuleGroup = [disallowedContainerGetSecureRuleFalco.then(disallowedContainerGetSecureRuleFalco =\u003e disallowedContainerGetSecureRuleFalco.map(__item =\u003e __item))];\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ndisallowed_container = sysdig.get_secure_rule_falco_count(name=\"Launch Disallowed Container\",\n    source=\"syscall\")\ndisallowed_container_get_secure_rule_falco = [sysdig.get_secure_rule_falco(name=\"Launch Disallowed Container\",\n    source=\"syscall\",\n    index=__index) for __index in range(disallowed_container.rule_count)]\npulumi.export(\"disallowedContainerRuleGroup\", [[__item for __item in disallowed_container_get_secure_rule_falco]])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var disallowedContainer = Sysdig.GetSecureRuleFalcoCount.Invoke(new()\n    {\n        Name = \"Launch Disallowed Container\",\n        Source = \"syscall\",\n    });\n\n    var disallowedContainerGetSecureRuleFalco = ;\n\n    return new Dictionary\u003cstring, object?\u003e\n    {\n        [\"disallowedContainerRuleGroup\"] = new[]\n        {\n            disallowedContainerGetSecureRuleFalco.Apply(disallowedContainerGetSecureRuleFalco =\u003e disallowedContainerGetSecureRuleFalco.Select(__item =\u003e __item).ToList()),\n        },\n    };\n});\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleFalco.\n","properties":{"index":{"type":"number","description":"The index of the Secure rule to retrieve in the event of multiple rules. The default value is 0.\nsee section on rules with appended rules.\n"},"minimumEngineVersion":{"type":"number","description":"This is used to indicate that the rule requires a minimum engine version.\n"},"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"source":{"type":"string","description":"The source of the Secure rule to retrieve. This is required if a rule with this name exists in\nmultiple sources.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFalcoTimeouts:getSecureRuleFalcoTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleFalco.\n","properties":{"append":{"description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided rule\n","type":"boolean"},"condition":{"description":"A [Falco condition](https://falco.org/docs/rules/) is simply a Boolean predicate on Sysdig events\nexpressed using the Sysdig [filter syntax](http://www.sysdig.org/wiki/sysdig-user-guide/#filtering) and macro terms.\n","type":"string"},"description":{"description":"The description of Secure rule.\n","type":"string"},"exceptions":{"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFalcoException:getSecureRuleFalcoException"},"type":"array"},"id":{"type":"number"},"index":{"type":"number"},"minimumEngineVersion":{"description":"This is used to indicate that the rule requires a minimum engine version.\n","type":"number"},"name":{"description":"The name of the exception.\n","type":"string"},"output":{"description":"Add additional information to each Falco notification's output.\n","type":"string"},"priority":{"description":"The priority of the Falco rule. It can be: \"emergency\", \"alert\", \"critical\", \"error\", \"warning\", \"notice\", \"info\" or \"debug\". By default is \"warning\".\n","type":"string"},"source":{"type":"string"},"tags":{"description":"A list of tags for this rule.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFalcoTimeouts:getSecureRuleFalcoTimeouts"},"version":{"description":"Current version of the resource in Sysdig Secure.\n","type":"number"}},"required":["append","condition","description","exceptions","id","minimumEngineVersion","name","output","priority","tags","version"],"type":"object"}},"sysdig:index/getSecureRuleFalcoCount:getSecureRuleFalcoCount":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleFalcoCount({\n    name: \"Terminal shell in container\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_falco_count(name=\"Terminal shell in container\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleFalcoCount.Invoke(new()\n    {\n        Name = \"Terminal shell in container\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureRuleFalcoCount(ctx, \u0026sysdig.GetSecureRuleFalcoCountArgs{\n\t\t\tName: \"Terminal shell in container\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleFalcoCountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleFalcoCount(GetSecureRuleFalcoCountArgs.builder()\n            .name(\"Terminal shell in container\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleFalcoCount\n      arguments:\n        name: Terminal shell in container\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleFalcoCount.\n","properties":{"id":{"type":"string"},"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"source":{"type":"string","description":"The source of the Secure rule to retrieve. This is required if a rule with this name exists in\nmultiple sources.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFalcoCountTimeouts:getSecureRuleFalcoCountTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleFalcoCount.\n","properties":{"id":{"type":"string"},"name":{"type":"string"},"ruleCount":{"description":"The number of rules (including appends).\n","type":"number"},"source":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFalcoCountTimeouts:getSecureRuleFalcoCountTimeouts"}},"required":["id","name","ruleCount"],"type":"object"}},"sysdig:index/getSecureRuleFilesystem:getSecureRuleFilesystem":{"description":"## Example Usage\n\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleFilesystem.\n","properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFilesystemTimeouts:getSecureRuleFilesystemTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleFilesystem.\n","properties":{"description":{"description":"The description of Secure rule.\n","type":"string"},"id":{"type":"number"},"name":{"type":"string"},"readOnlies":{"description":"Block that defines read only paths to match or not match.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFilesystemReadOnly:getSecureRuleFilesystemReadOnly"},"type":"array"},"readWrites":{"description":"Block that defines read and write paths to match or not match.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFilesystemReadWrite:getSecureRuleFilesystemReadWrite"},"type":"array"},"tags":{"description":"A list of tags for this rule.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleFilesystemTimeouts:getSecureRuleFilesystemTimeouts"},"version":{"description":"Current version of the resource in Sysdig Secure.\n","type":"number"}},"required":["description","id","name","readOnlies","readWrites","tags","version"],"type":"object"}},"sysdig:index/getSecureRuleNetwork:getSecureRuleNetwork":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleNetwork({\n    name: \"Disallowed SSH Connection\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_network(name=\"Disallowed SSH Connection\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleNetwork.Invoke(new()\n    {\n        Name = \"Disallowed SSH Connection\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureRuleNetwork(ctx, \u0026sysdig.LookupSecureRuleNetworkArgs{\n\t\t\tName: \"Disallowed SSH Connection\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleNetworkArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleNetwork(GetSecureRuleNetworkArgs.builder()\n            .name(\"Disallowed SSH Connection\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleNetwork\n      arguments:\n        name: Disallowed SSH Connection\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Connection Blocks\n\nThe \u003cspan pulumi-lang-nodejs=\"`tcp`\" pulumi-lang-dotnet=\"`Tcp`\" pulumi-lang-go=\"`tcp`\" pulumi-lang-python=\"`tcp`\" pulumi-lang-yaml=\"`tcp`\" pulumi-lang-java=\"`tcp`\"\u003e`tcp`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`udp`\" pulumi-lang-dotnet=\"`Udp`\" pulumi-lang-go=\"`udp`\" pulumi-lang-python=\"`udp`\" pulumi-lang-yaml=\"`udp`\" pulumi-lang-java=\"`udp`\"\u003e`udp`\u003c/span\u003e blocks will have the the following attributes:\n\n* \u003cspan pulumi-lang-nodejs=\"`matching`\" pulumi-lang-dotnet=\"`Matching`\" pulumi-lang-go=\"`matching`\" pulumi-lang-python=\"`matching`\" pulumi-lang-yaml=\"`matching`\" pulumi-lang-java=\"`matching`\"\u003e`matching`\u003c/span\u003e - Defines if the port matches or not with the provided list.\n* \u003cspan pulumi-lang-nodejs=\"`ports`\" pulumi-lang-dotnet=\"`Ports`\" pulumi-lang-go=\"`ports`\" pulumi-lang-python=\"`ports`\" pulumi-lang-yaml=\"`ports`\" pulumi-lang-java=\"`ports`\"\u003e`ports`\u003c/span\u003e - List of ports to match.\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleNetwork.\n","properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleNetworkTimeouts:getSecureRuleNetworkTimeouts"},"udps":{"type":"array","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleNetworkUdp:getSecureRuleNetworkUdp"},"description":"A block with the properties \u003cspan pulumi-lang-nodejs=\"`matching`\" pulumi-lang-dotnet=\"`Matching`\" pulumi-lang-go=\"`matching`\" pulumi-lang-python=\"`matching`\" pulumi-lang-yaml=\"`matching`\" pulumi-lang-java=\"`matching`\"\u003e`matching`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`ports`\" pulumi-lang-dotnet=\"`Ports`\" pulumi-lang-go=\"`ports`\" pulumi-lang-python=\"`ports`\" pulumi-lang-yaml=\"`ports`\" pulumi-lang-java=\"`ports`\"\u003e`ports`\u003c/span\u003e for UDP connections.\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleNetwork.\n","properties":{"blockInbound":{"description":"Detect if there is an inbound connection.\n","type":"boolean"},"blockOutbound":{"description":"Detect if there is an outbound connection.\n","type":"boolean"},"description":{"description":"The description of Secure rule.\n","type":"string"},"id":{"type":"number"},"name":{"type":"string"},"tags":{"description":"A list of tags for this rule.\n","items":{"type":"string"},"type":"array"},"tcps":{"description":"A block with the properties \u003cspan pulumi-lang-nodejs=\"`matching`\" pulumi-lang-dotnet=\"`Matching`\" pulumi-lang-go=\"`matching`\" pulumi-lang-python=\"`matching`\" pulumi-lang-yaml=\"`matching`\" pulumi-lang-java=\"`matching`\"\u003e`matching`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`ports`\" pulumi-lang-dotnet=\"`Ports`\" pulumi-lang-go=\"`ports`\" pulumi-lang-python=\"`ports`\" pulumi-lang-yaml=\"`ports`\" pulumi-lang-java=\"`ports`\"\u003e`ports`\u003c/span\u003e for TCP connections.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleNetworkTcp:getSecureRuleNetworkTcp"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleNetworkTimeouts:getSecureRuleNetworkTimeouts"},"udps":{"description":"A block with the properties \u003cspan pulumi-lang-nodejs=\"`matching`\" pulumi-lang-dotnet=\"`Matching`\" pulumi-lang-go=\"`matching`\" pulumi-lang-python=\"`matching`\" pulumi-lang-yaml=\"`matching`\" pulumi-lang-java=\"`matching`\"\u003e`matching`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`ports`\" pulumi-lang-dotnet=\"`Ports`\" pulumi-lang-go=\"`ports`\" pulumi-lang-python=\"`ports`\" pulumi-lang-yaml=\"`ports`\" pulumi-lang-java=\"`ports`\"\u003e`ports`\u003c/span\u003e for UDP connections.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleNetworkUdp:getSecureRuleNetworkUdp"},"type":"array"},"version":{"description":"Current version of the resource in Sysdig Secure.\n","type":"number"}},"required":["blockInbound","blockOutbound","description","id","name","tags","tcps","version"],"type":"object"}},"sysdig:index/getSecureRuleProcess:getSecureRuleProcess":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleProcess({\n    name: \"Launch Suspicious Network Tool in Container\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_process(name=\"Launch Suspicious Network Tool in Container\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleProcess.Invoke(new()\n    {\n        Name = \"Launch Suspicious Network Tool in Container\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureRuleProcess(ctx, \u0026sysdig.LookupSecureRuleProcessArgs{\n\t\t\tName: \"Launch Suspicious Network Tool in Container\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleProcessArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleProcess(GetSecureRuleProcessArgs.builder()\n            .name(\"Launch Suspicious Network Tool in Container\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleProcess\n      arguments:\n        name: Launch Suspicious Network Tool in Container\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleProcess.\n","properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleProcessTimeouts:getSecureRuleProcessTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleProcess.\n","properties":{"description":{"description":"The description of Secure rule.\n","type":"string"},"id":{"type":"number"},"matching":{"description":"Defines if the process name matches or not with the provided list.\n","type":"boolean"},"name":{"type":"string"},"processes":{"description":"List of processes to match.\n","items":{"type":"string"},"type":"array"},"tags":{"description":"A list of tags for this rule.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleProcessTimeouts:getSecureRuleProcessTimeouts"},"version":{"description":"Current version of the resource in Sysdig Secure.\n","type":"number"}},"required":["description","id","matching","name","processes","tags","version"],"type":"object"}},"sysdig:index/getSecureRuleStateful:getSecureRuleStateful":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleStateful\n      arguments:\n        name: Access Key Enumeration Detected\n        source: awscloudtrail_stateful\n        ruletype: STATEFUL_SEQUENCE\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleStateful.\n","properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"source":{"type":"string","description":"The source of the Secure rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleStatefulTimeouts:getSecureRuleStatefulTimeouts"}},"type":"object","required":["name","source"]},"outputs":{"description":"A collection of values returned by getSecureRuleStateful.\n","properties":{"append":{"description":"This indicates that the rule being created appends the condition to an existing Sysdig-provided rule\n","type":"boolean"},"exceptions":{"description":"The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureRuleStatefulException:getSecureRuleStatefulException"},"type":"array"},"id":{"type":"number"},"name":{"description":"The name of the existing exception definition.\n","type":"string"},"ruletype":{"type":"string"},"source":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleStatefulTimeouts:getSecureRuleStatefulTimeouts"},"version":{"type":"number"}},"required":["append","exceptions","id","name","ruletype","source","version"],"type":"object"}},"sysdig:index/getSecureRuleStatefulCount:getSecureRuleStatefulCount":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleStatefulCount({\n    name: \"API Gateway Enumeration Detected\",\n    source: \"awscloudtrail_stateful\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_stateful_count(name=\"API Gateway Enumeration Detected\",\n    source=\"awscloudtrail_stateful\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleStatefulCount.Invoke(new()\n    {\n        Name = \"API Gateway Enumeration Detected\",\n        Source = \"awscloudtrail_stateful\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureRuleStatefulCount(ctx, \u0026sysdig.GetSecureRuleStatefulCountArgs{\n\t\t\tName:   \"API Gateway Enumeration Detected\",\n\t\t\tSource: \"awscloudtrail_stateful\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleStatefulCountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleStatefulCount(GetSecureRuleStatefulCountArgs.builder()\n            .name(\"API Gateway Enumeration Detected\")\n            .source(\"awscloudtrail_stateful\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleStatefulCount\n      arguments:\n        name: API Gateway Enumeration Detected\n        source: awscloudtrail_stateful\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleStatefulCount.\n","properties":{"id":{"type":"string"},"name":{"type":"string","description":"The name of the Secure stateful rule to retrieve.\n"},"source":{"type":"string","description":"The source of the Secure stateful rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleStatefulCountTimeouts:getSecureRuleStatefulCountTimeouts"}},"type":"object","required":["name","source"]},"outputs":{"description":"A collection of values returned by getSecureRuleStatefulCount.\n","properties":{"id":{"type":"string"},"name":{"type":"string"},"ruleCount":{"description":"The number of rules (including appends).\n","type":"number"},"source":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleStatefulCountTimeouts:getSecureRuleStatefulCountTimeouts"}},"required":["id","name","ruleCount","source"],"type":"object"}},"sysdig:index/getSecureRuleSyscall:getSecureRuleSyscall":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureRuleSyscall({\n    name: \"Unexpected mount syscall\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_rule_syscall(name=\"Unexpected mount syscall\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureRuleSyscall.Invoke(new()\n    {\n        Name = \"Unexpected mount syscall\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureRuleSyscall(ctx, \u0026sysdig.LookupSecureRuleSyscallArgs{\n\t\t\tName: \"Unexpected mount syscall\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureRuleSyscallArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureRuleSyscall(GetSecureRuleSyscallArgs.builder()\n            .name(\"Unexpected mount syscall\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureRuleSyscall\n      arguments:\n        name: Unexpected mount syscall\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureRuleSyscall.\n","properties":{"name":{"type":"string","description":"The name of the Secure rule to retrieve.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleSyscallTimeouts:getSecureRuleSyscallTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureRuleSyscall.\n","properties":{"description":{"description":"The description of Secure rule.\n","type":"string"},"id":{"type":"number"},"matching":{"description":"Defines if the syscall name matches or not with the provided list.\n","type":"boolean"},"name":{"type":"string"},"syscalls":{"items":{"type":"string"},"type":"array"},"tags":{"description":"A list of tags for this rule.\n","items":{"type":"string"},"type":"array"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureRuleSyscallTimeouts:getSecureRuleSyscallTimeouts"},"version":{"description":"Current version of the resource in Sysdig Secure.\n","type":"number"}},"required":["description","id","matching","name","syscalls","tags","version"],"type":"object"}},"sysdig:index/getSecureTeam:getSecureTeam":{"description":"The \u003cspan pulumi-lang-nodejs=\"`sysdig.SecureTeam`\" pulumi-lang-dotnet=\"`sysdig.SecureTeam`\" pulumi-lang-go=\"`SecureTeam`\" pulumi-lang-python=\"`SecureTeam`\" pulumi-lang-yaml=\"`sysdig.SecureTeam`\" pulumi-lang-java=\"`sysdig.SecureTeam`\"\u003e`sysdig.SecureTeam`\u003c/span\u003e data source retrieves information about a specific secure team in Sysdig.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureTeam({\n    id: \"812371\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_team(id=\"812371\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureTeam.Invoke(new()\n    {\n        Id = \"812371\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupSecureTeam(ctx, \u0026sysdig.LookupSecureTeamArgs{\n\t\t\tId: \"812371\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureTeamArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureTeam(GetSecureTeamArgs.builder()\n            .id(\"812371\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureTeam\n      arguments:\n        id: '812371'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureTeam.\n","properties":{"id":{"type":"string","description":"The ID of the secure team.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getSecureTeam.\n","properties":{"allZones":{"description":"Whether the team has access to all zones.\n","type":"boolean"},"canUseAgentCli":{"description":"Whether the team can use the agent CLI.\n","type":"boolean"},"canUseRapidResponse":{"description":"Whether the team can use rapid response.\n","type":"boolean"},"defaultTeam":{"description":"Whether the team is the default team.\n","type":"boolean"},"description":{"description":"The description of the secure team.\n","type":"string"},"filter":{"description":"The filter applied to the team.\n","type":"string"},"id":{"type":"string"},"name":{"description":"The name of the secure team.\n","type":"string"},"scopeBy":{"description":"The scope of the team.\n","type":"string"},"theme":{"description":"The theme of the secure team.\n","type":"string"},"useSysdigCapture":{"description":"Whether the team can use Sysdig capture.\n","type":"boolean"},"userRoles":{"description":"The roles assigned to users in the team.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureTeamUserRole:getSecureTeamUserRole"},"type":"array"},"version":{"description":"The version of the secure team.\n","type":"number"},"zoneIds":{"description":"The IDs of the zones associated with the team.\n","items":{"type":"number"},"type":"array"}},"required":["allZones","canUseAgentCli","canUseRapidResponse","defaultTeam","description","filter","id","name","scopeBy","theme","useSysdigCapture","userRoles","version","zoneIds"],"type":"object"}},"sysdig:index/getSecureTeams:getSecureTeams":{"description":"The \u003cspan pulumi-lang-nodejs=\"`sysdig.getSecureTeams`\" pulumi-lang-dotnet=\"`sysdig.getSecureTeams`\" pulumi-lang-go=\"`getSecureTeams`\" pulumi-lang-python=\"`get_secure_teams`\" pulumi-lang-yaml=\"`sysdig.getSecureTeams`\" pulumi-lang-java=\"`sysdig.getSecureTeams`\"\u003e`sysdig.getSecureTeams`\u003c/span\u003e data source retrieves a list of all secure teams in Sysdig.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst example = sysdig.getSecureTeams({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexample = sysdig.get_secure_teams()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Sysdig.GetSecureTeams.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureTeams(ctx, \u0026sysdig.GetSecureTeamsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureTeamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = SysdigFunctions.getSecureTeams(GetSecureTeamsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: sysdig:getSecureTeams\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureTeams.\n","properties":{"id":{"type":"string","description":"The ID of the secure team.\n"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecureTeams.\n","properties":{"id":{"description":"The ID of the secure team.\n","type":"string"},"teams":{"description":"A list of secure teams. Each team has the following attributes:\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureTeamsTeam:getSecureTeamsTeam"},"type":"array"}},"required":["id","teams"],"type":"object"}},"sysdig:index/getSecureTenantExternalId:getSecureTenantExternalId":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst externalId = sysdig.getSecureTenantExternalId({});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nexternal_id = sysdig.get_secure_tenant_external_id()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var externalId = Sysdig.GetSecureTenantExternalId.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureTenantExternalId(ctx, \u0026sysdig.GetSecureTenantExternalIdArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureTenantExternalIdArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var externalId = SysdigFunctions.getSecureTenantExternalId(GetSecureTenantExternalIdArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  externalId:\n    fn::invoke:\n      function: sysdig:getSecureTenantExternalId\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureTenantExternalId.\n","properties":{"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTenantExternalIdTimeouts:getSecureTenantExternalIdTimeouts"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecureTenantExternalId.\n","properties":{"externalId":{"description":"The cloud onboarding external ID for the Sysdig Secure Tenant.\n","type":"string"},"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTenantExternalIdTimeouts:getSecureTenantExternalIdTimeouts"}},"required":["externalId","id"],"type":"object"}},"sysdig:index/getSecureTrustedAzureApp:getSecureTrustedAzureApp":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst onboarding = sysdig.getSecureTrustedAzureApp({\n    name: \"onboarding\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nonboarding = sysdig.get_secure_trusted_azure_app(name=\"onboarding\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var onboarding = Sysdig.GetSecureTrustedAzureApp.Invoke(new()\n    {\n        Name = \"onboarding\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureTrustedAzureApp(ctx, \u0026sysdig.GetSecureTrustedAzureAppArgs{\n\t\t\tName: \"onboarding\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureTrustedAzureAppArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var onboarding = SysdigFunctions.getSecureTrustedAzureApp(GetSecureTrustedAzureAppArgs.builder()\n            .name(\"onboarding\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  onboarding:\n    fn::invoke:\n      function: sysdig:getSecureTrustedAzureApp\n      arguments:\n        name: onboarding\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureTrustedAzureApp.\n","properties":{"id":{"type":"string"},"name":{"type":"string","description":"Sysdig's Azure App name urrently supported applications are \u003cspan pulumi-lang-nodejs=\"`configPosture`\" pulumi-lang-dotnet=\"`ConfigPosture`\" pulumi-lang-go=\"`configPosture`\" pulumi-lang-python=\"`config_posture`\" pulumi-lang-yaml=\"`configPosture`\" pulumi-lang-java=\"`configPosture`\"\u003e`config_posture`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`onboarding`\" pulumi-lang-dotnet=\"`Onboarding`\" pulumi-lang-go=\"`onboarding`\" pulumi-lang-python=\"`onboarding`\" pulumi-lang-yaml=\"`onboarding`\" pulumi-lang-java=\"`onboarding`\"\u003e`onboarding`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`threatDetection`\" pulumi-lang-dotnet=\"`ThreatDetection`\" pulumi-lang-go=\"`threatDetection`\" pulumi-lang-python=\"`threat_detection`\" pulumi-lang-yaml=\"`threatDetection`\" pulumi-lang-java=\"`threatDetection`\"\u003e`threat_detection`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`vmWorkloadScanning`\" pulumi-lang-dotnet=\"`VmWorkloadScanning`\" pulumi-lang-go=\"`vmWorkloadScanning`\" pulumi-lang-python=\"`vm_workload_scanning`\" pulumi-lang-yaml=\"`vmWorkloadScanning`\" pulumi-lang-java=\"`vmWorkloadScanning`\"\u003e`vm_workload_scanning`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTrustedAzureAppTimeouts:getSecureTrustedAzureAppTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureTrustedAzureApp.\n","properties":{"applicationId":{"description":"The application's identifier\n","type":"string"},"id":{"type":"string"},"name":{"type":"string"},"servicePrincipalId":{"description":"The application's associated service principal identifier.\n","type":"string"},"tenantId":{"description":"The application's associated tenant identifer\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTrustedAzureAppTimeouts:getSecureTrustedAzureAppTimeouts"}},"required":["applicationId","id","name","servicePrincipalId","tenantId"],"type":"object"}},"sysdig:index/getSecureTrustedCloudIdentity:getSecureTrustedCloudIdentity":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst trustedIdentity = sysdig.getSecureTrustedCloudIdentity({\n    cloudProvider: \"aws\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\ntrusted_identity = sysdig.get_secure_trusted_cloud_identity(cloud_provider=\"aws\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var trustedIdentity = Sysdig.GetSecureTrustedCloudIdentity.Invoke(new()\n    {\n        CloudProvider = \"aws\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureTrustedCloudIdentity(ctx, \u0026sysdig.GetSecureTrustedCloudIdentityArgs{\n\t\t\tCloudProvider: \"aws\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureTrustedCloudIdentityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var trustedIdentity = SysdigFunctions.getSecureTrustedCloudIdentity(GetSecureTrustedCloudIdentityArgs.builder()\n            .cloudProvider(\"aws\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  trustedIdentity:\n    fn::invoke:\n      function: sysdig:getSecureTrustedCloudIdentity\n      arguments:\n        cloudProvider: aws\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureTrustedCloudIdentity.\n","properties":{"cloudProvider":{"type":"string","description":"The cloud provider in which the trusted identity will be used. Currently supported providers are \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e\n"},"id":{"type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTrustedCloudIdentityTimeouts:getSecureTrustedCloudIdentityTimeouts"}},"type":"object","required":["cloudProvider"]},"outputs":{"description":"A collection of values returned by getSecureTrustedCloudIdentity.\n","properties":{"awsAccountId":{"description":"If \u003cspan pulumi-lang-nodejs=\"`identity`\" pulumi-lang-dotnet=\"`Identity`\" pulumi-lang-go=\"`identity`\" pulumi-lang-python=\"`identity`\" pulumi-lang-yaml=\"`identity`\" pulumi-lang-java=\"`identity`\"\u003e`identity`\u003c/span\u003e is an AWS ARN, this attribute contains the AWS Account ID to which the ARN belongs, otherwise it contains the empty string. \u003cspan pulumi-lang-nodejs=\"`cloudProvider`\" pulumi-lang-dotnet=\"`CloudProvider`\" pulumi-lang-go=\"`cloudProvider`\" pulumi-lang-python=\"`cloud_provider`\" pulumi-lang-yaml=\"`cloudProvider`\" pulumi-lang-java=\"`cloudProvider`\"\u003e`cloud_provider`\u003c/span\u003e must be equal to \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e.\n","type":"string"},"awsGovAccountId":{"description":"If \u003cspan pulumi-lang-nodejs=\"`govIdentity`\" pulumi-lang-dotnet=\"`GovIdentity`\" pulumi-lang-go=\"`govIdentity`\" pulumi-lang-python=\"`gov_identity`\" pulumi-lang-yaml=\"`govIdentity`\" pulumi-lang-java=\"`govIdentity`\"\u003e`gov_identity`\u003c/span\u003e is an AWS GOV IAM Role ARN, this attribute contains the AWS GOV Account ID to which the ARN belongs, otherwise it contains the empty string. Currently supported on \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e.\n","type":"string"},"awsGovRoleName":{"description":"If \u003cspan pulumi-lang-nodejs=\"`govIdentity`\" pulumi-lang-dotnet=\"`GovIdentity`\" pulumi-lang-go=\"`govIdentity`\" pulumi-lang-python=\"`gov_identity`\" pulumi-lang-yaml=\"`govIdentity`\" pulumi-lang-java=\"`govIdentity`\"\u003e`gov_identity`\u003c/span\u003e is a AWS GOV IAM Role ARN, this attribute contains the name of the GOV role, otherwise it contains the empty string. Currently supported on \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e.\n","type":"string"},"awsRoleName":{"description":"If \u003cspan pulumi-lang-nodejs=\"`identity`\" pulumi-lang-dotnet=\"`Identity`\" pulumi-lang-go=\"`identity`\" pulumi-lang-python=\"`identity`\" pulumi-lang-yaml=\"`identity`\" pulumi-lang-java=\"`identity`\"\u003e`identity`\u003c/span\u003e is a AWS IAM Role ARN, this attribute contains the name of the role, otherwise it contains the empty string. \u003cspan pulumi-lang-nodejs=\"`cloudProvider`\" pulumi-lang-dotnet=\"`CloudProvider`\" pulumi-lang-go=\"`cloudProvider`\" pulumi-lang-python=\"`cloud_provider`\" pulumi-lang-yaml=\"`cloudProvider`\" pulumi-lang-java=\"`cloudProvider`\"\u003e`cloud_provider`\u003c/span\u003e must be equal to \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`gcp`\" pulumi-lang-dotnet=\"`Gcp`\" pulumi-lang-go=\"`gcp`\" pulumi-lang-python=\"`gcp`\" pulumi-lang-yaml=\"`gcp`\" pulumi-lang-java=\"`gcp`\"\u003e`gcp`\u003c/span\u003e.\n","type":"string"},"azureServicePrincipalId":{"description":"If \u003cspan pulumi-lang-nodejs=\"`identity`\" pulumi-lang-dotnet=\"`Identity`\" pulumi-lang-go=\"`identity`\" pulumi-lang-python=\"`identity`\" pulumi-lang-yaml=\"`identity`\" pulumi-lang-java=\"`identity`\"\u003e`identity`\u003c/span\u003e contains credentials for an Azure Service Principal, this attribute contains the service principal's ID. \u003cspan pulumi-lang-nodejs=\"`cloudProvider`\" pulumi-lang-dotnet=\"`CloudProvider`\" pulumi-lang-go=\"`cloudProvider`\" pulumi-lang-python=\"`cloud_provider`\" pulumi-lang-yaml=\"`cloudProvider`\" pulumi-lang-java=\"`cloudProvider`\"\u003e`cloud_provider`\u003c/span\u003e must be equal to \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e.\n","type":"string"},"azureTenantId":{"description":"If \u003cspan pulumi-lang-nodejs=\"`identity`\" pulumi-lang-dotnet=\"`Identity`\" pulumi-lang-go=\"`identity`\" pulumi-lang-python=\"`identity`\" pulumi-lang-yaml=\"`identity`\" pulumi-lang-java=\"`identity`\"\u003e`identity`\u003c/span\u003e contains credentials for an Azure Service Principal, this attribute contains the service principal's Tenant ID. \u003cspan pulumi-lang-nodejs=\"`cloudProvider`\" pulumi-lang-dotnet=\"`CloudProvider`\" pulumi-lang-go=\"`cloudProvider`\" pulumi-lang-python=\"`cloud_provider`\" pulumi-lang-yaml=\"`cloudProvider`\" pulumi-lang-java=\"`cloudProvider`\"\u003e`cloud_provider`\u003c/span\u003e must be equal to \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e.\n","type":"string"},"cloudProvider":{"type":"string"},"govIdentity":{"description":"Sysdig's identity for regulatory workloads (User/Role/etc) that should be used to create a trust relationship allowing Sysdig access to your regulated cloud account. Currently supported on \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e.\n","type":"string"},"id":{"type":"string"},"identity":{"description":"Sysdig's identity (User/Role/etc) that should be used to create a trust relationship allowing Sysdig access to your cloud account.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTrustedCloudIdentityTimeouts:getSecureTrustedCloudIdentityTimeouts"}},"required":["awsAccountId","awsGovAccountId","awsGovRoleName","awsRoleName","azureServicePrincipalId","azureTenantId","cloudProvider","govIdentity","id","identity"],"type":"object"}},"sysdig:index/getSecureTrustedOracleApp:getSecureTrustedOracleApp":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst onboarding = sysdig.getSecureTrustedOracleApp({\n    name: \"onboarding\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nonboarding = sysdig.get_secure_trusted_oracle_app(name=\"onboarding\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var onboarding = Sysdig.GetSecureTrustedOracleApp.Invoke(new()\n    {\n        Name = \"onboarding\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.GetSecureTrustedOracleApp(ctx, \u0026sysdig.GetSecureTrustedOracleAppArgs{\n\t\t\tName: \"onboarding\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureTrustedOracleAppArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var onboarding = SysdigFunctions.getSecureTrustedOracleApp(GetSecureTrustedOracleAppArgs.builder()\n            .name(\"onboarding\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  onboarding:\n    fn::invoke:\n      function: sysdig:getSecureTrustedOracleApp\n      arguments:\n        name: onboarding\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureTrustedOracleApp.\n","properties":{"id":{"type":"string"},"name":{"type":"string","description":"Sysdig's Oracle App name. Currently supported applications are \u003cspan pulumi-lang-nodejs=\"`configPosture`\" pulumi-lang-dotnet=\"`ConfigPosture`\" pulumi-lang-go=\"`configPosture`\" pulumi-lang-python=\"`config_posture`\" pulumi-lang-yaml=\"`configPosture`\" pulumi-lang-java=\"`configPosture`\"\u003e`config_posture`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`onboarding`\" pulumi-lang-dotnet=\"`Onboarding`\" pulumi-lang-go=\"`onboarding`\" pulumi-lang-python=\"`onboarding`\" pulumi-lang-yaml=\"`onboarding`\" pulumi-lang-java=\"`onboarding`\"\u003e`onboarding`\u003c/span\u003e.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTrustedOracleAppTimeouts:getSecureTrustedOracleAppTimeouts"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getSecureTrustedOracleApp.\n","properties":{"groupOcid":{"description":"The application's associated usergroup OCI identifier.\n","type":"string"},"id":{"type":"string"},"name":{"type":"string"},"tenancyOcid":{"description":"The application's associated tenancy OCI identifer.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetSecureTrustedOracleAppTimeouts:getSecureTrustedOracleAppTimeouts"},"userOcid":{"description":"The application's associated user OCI identifier.\n","type":"string"}},"required":["groupOcid","id","name","tenancyOcid","userOcid"],"type":"object"}},"sysdig:index/getSecureZone:getSecureZone":{"description":"The \u003cspan pulumi-lang-nodejs=\"`sysdig.SecureZone`\" pulumi-lang-dotnet=\"`sysdig.SecureZone`\" pulumi-lang-go=\"`SecureZone`\" pulumi-lang-python=\"`SecureZone`\" pulumi-lang-yaml=\"`sysdig.SecureZone`\" pulumi-lang-java=\"`sysdig.SecureZone`\"\u003e`sysdig.SecureZone`\u003c/span\u003e data source allows you to retrieve information about a specific Sysdig Secure Zone.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst sample = new sysdig.SecureZone(\"sample\", {\n    name: \"test-secure-zone\",\n    description: \"Test secure zone\",\n    scopes: [{\n        targetType: \"aws\",\n        rules: \"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\",\n    }],\n});\nconst test = sysdig.getSecureZoneOutput({\n    name: sample.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nsample = sysdig.SecureZone(\"sample\",\n    name=\"test-secure-zone\",\n    description=\"Test secure zone\",\n    scopes=[{\n        \"target_type\": \"aws\",\n        \"rules\": \"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\",\n    }])\ntest = sysdig.get_secure_zone_output(name=sample.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var sample = new Sysdig.SecureZone(\"sample\", new()\n    {\n        Name = \"test-secure-zone\",\n        Description = \"Test secure zone\",\n        Scopes = new[]\n        {\n            new Sysdig.Inputs.SecureZoneScopeArgs\n            {\n                TargetType = \"aws\",\n                Rules = \"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\",\n            },\n        },\n    });\n\n    var test = Sysdig.GetSecureZone.Invoke(new()\n    {\n        Name = sample.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tsample, err := sysdig.NewSecureZone(ctx, \"sample\", \u0026sysdig.SecureZoneArgs{\n\t\t\tName:        pulumi.String(\"test-secure-zone\"),\n\t\t\tDescription: pulumi.String(\"Test secure zone\"),\n\t\t\tScopes: sysdig.SecureZoneScopeArray{\n\t\t\t\t\u0026sysdig.SecureZoneScopeArgs{\n\t\t\t\t\tTargetType: pulumi.String(\"aws\"),\n\t\t\t\t\tRules:      pulumi.String(\"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = sysdig.LookupSecureZoneOutput(ctx, sysdig.GetSecureZoneOutputArgs{\n\t\t\tName: sample.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SecureZone;\nimport com.pulumi.sysdig.SecureZoneArgs;\nimport com.pulumi.sysdig.inputs.SecureZoneScopeArgs;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetSecureZoneArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var sample = new SecureZone(\"sample\", SecureZoneArgs.builder()\n            .name(\"test-secure-zone\")\n            .description(\"Test secure zone\")\n            .scopes(SecureZoneScopeArgs.builder()\n                .targetType(\"aws\")\n                .rules(\"organization in (\\\"o1\\\", \\\"o2\\\") and account in (\\\"a1\\\", \\\"a2\\\")\")\n                .build())\n            .build());\n\n        final var test = SysdigFunctions.getSecureZone(GetSecureZoneArgs.builder()\n            .name(sample.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  sample:\n    type: sysdig:SecureZone\n    properties:\n      name: test-secure-zone\n      description: Test secure zone\n      scopes:\n        - targetType: aws\n          rules: organization in (\"o1\", \"o2\") and account in (\"a1\", \"a2\")\nvariables:\n  test:\n    fn::invoke:\n      function: sysdig:getSecureZone\n      arguments:\n        name: ${sample.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getSecureZone.\n","properties":{"id":{"type":"string","description":"The ID of the Sysdig Secure Zone.\n"},"name":{"type":"string","description":"The name of the Sysdig Secure Zone.\n"}},"type":"object"},"outputs":{"description":"A collection of values returned by getSecureZone.\n","properties":{"author":{"description":"(Computed) The zone author.\n","type":"string"},"description":{"type":"string"},"id":{"type":"string"},"isSystem":{"description":"(Computed) Whether the Zone is a system zone.\n","type":"boolean"},"lastModifiedBy":{"description":"(Computed) By whom is last modification made.\n","type":"string"},"lastUpdated":{"description":"(Computed) Timestamp of last modification of zone.\n","type":"string"},"name":{"type":"string"},"scopes":{"description":"(Computed) The scope of the zone.\n","items":{"$ref":"#/types/sysdig:index%2FgetSecureZoneScope:getSecureZoneScope"},"type":"array"}},"required":["author","description","isSystem","lastModifiedBy","lastUpdated","scopes"],"type":"object"}},"sysdig:index/getUser:getUser":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as sysdig from \"@pulumi/sysdig\";\n\nconst user = sysdig.getUser({\n    email: \"terraform-test+user@sysdig.com\",\n});\n```\n```python\nimport pulumi\nimport pulumi_sysdig as sysdig\n\nuser = sysdig.get_user(email=\"terraform-test+user@sysdig.com\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Sysdig = Pulumi.Sysdig;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var user = Sysdig.GetUser.Invoke(new()\n    {\n        Email = \"terraform-test+user@sysdig.com\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/v3/sysdig\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := sysdig.LookupUser(ctx, \u0026sysdig.LookupUserArgs{\n\t\t\tEmail: \"terraform-test+user@sysdig.com\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.sysdig.SysdigFunctions;\nimport com.pulumi.sysdig.inputs.GetUserArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var user = SysdigFunctions.getUser(GetUserArgs.builder()\n            .email(\"terraform-test+user@sysdig.com\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  user:\n    fn::invoke:\n      function: sysdig:getUser\n      arguments:\n        email: terraform-test+user@sysdig.com\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getUser.\n","properties":{"email":{"type":"string"},"id":{"type":"string","description":"The user's ID.\n"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetUserTimeouts:getUserTimeouts"}},"type":"object","required":["email"]},"outputs":{"description":"A collection of values returned by getUser.\n","properties":{"email":{"type":"string"},"firstName":{"description":"The user's first name.\n","type":"string"},"id":{"description":"The user's ID.\n","type":"string"},"lastName":{"description":"The user's last name.\n","type":"string"},"systemRole":{"description":"The user's system role.\n","type":"string"},"timeouts":{"$ref":"#/types/sysdig:index%2FgetUserTimeouts:getUserTimeouts"},"version":{"type":"number"}},"required":["email","firstName","id","lastName","systemRole","version"],"type":"object"}}},"parameterization":{"baseProvider":{"name":"terraform-provider","version":"1.0.1"},"parameter":"eyJyZW1vdGUiOnsidXJsIjoicmVnaXN0cnkub3BlbnRvZnUub3JnL3N5c2RpZ2xhYnMvc3lzZGlnIiwidmVyc2lvbiI6IjMuNS4wIn19"}}