Documentation ¶
Index ¶
- func NewThreatInsightSettings_Override(t ThreatInsightSettings, scope constructs.Construct, id *string, ...)
- func ThreatInsightSettings_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, ...) cdktf.ImportableResource
- func ThreatInsightSettings_IsConstruct(x interface{}) *bool
- func ThreatInsightSettings_IsTerraformElement(x interface{}) *bool
- func ThreatInsightSettings_IsTerraformResource(x interface{}) *bool
- func ThreatInsightSettings_TfResourceType() *string
- type ThreatInsightSettings
- type ThreatInsightSettingsConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewThreatInsightSettings_Override ¶
func NewThreatInsightSettings_Override(t ThreatInsightSettings, scope constructs.Construct, id *string, config *ThreatInsightSettingsConfig)
Create a new {@link https://registry.terraform.io/providers/okta/okta/4.14.0/docs/resources/threat_insight_settings okta_threat_insight_settings} Resource.
func ThreatInsightSettings_GenerateConfigForImport ¶
func ThreatInsightSettings_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource
Generates CDKTF code for importing a ThreatInsightSettings resource upon running "cdktf plan <stack-name>".
func ThreatInsightSettings_IsConstruct ¶
func ThreatInsightSettings_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func ThreatInsightSettings_IsTerraformElement ¶
func ThreatInsightSettings_IsTerraformElement(x interface{}) *bool
Experimental.
func ThreatInsightSettings_IsTerraformResource ¶
func ThreatInsightSettings_IsTerraformResource(x interface{}) *bool
Experimental.
func ThreatInsightSettings_TfResourceType ¶
func ThreatInsightSettings_TfResourceType() *string
Types ¶
type ThreatInsightSettings ¶
type ThreatInsightSettings interface { cdktf.TerraformResource Action() *string SetAction(val *string) ActionInput() *string // Experimental. CdktfStack() cdktf.TerraformStack // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) NetworkExcludes() *[]*string SetNetworkExcludes(val *[]*string) NetworkExcludesInput() *[]*string // The tree node. Node() constructs.Node // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. // Experimental. AddMoveTarget(moveTarget *string) // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. HasResourceMove() interface{} // Experimental. ImportFrom(id *string, provider cdktf.TerraformProvider) // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Move the resource corresponding to "id" to this resource. // // Note that the resource being moved from must be marked as moved using it's instance function. // Experimental. MoveFromId(id *string) // Moves this resource to the target resource given by moveTarget. // Experimental. MoveTo(moveTarget *string, index interface{}) // Moves this resource to the resource corresponding to "id". // Experimental. MoveToId(id *string) // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) ResetId() ResetNetworkExcludes() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() SynthesizeAttributes() *map[string]interface{} SynthesizeHclAttributes() *map[string]interface{} // Experimental. ToHclTerraform() interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/okta/okta/4.14.0/docs/resources/threat_insight_settings okta_threat_insight_settings}.
func NewThreatInsightSettings ¶
func NewThreatInsightSettings(scope constructs.Construct, id *string, config *ThreatInsightSettingsConfig) ThreatInsightSettings
Create a new {@link https://registry.terraform.io/providers/okta/okta/4.14.0/docs/resources/threat_insight_settings okta_threat_insight_settings} Resource.
type ThreatInsightSettingsConfig ¶
type ThreatInsightSettingsConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Specifies how Okta responds to authentication requests from suspicious IPs. // // Valid values are `none`, `audit`, or `block`. A value of `none` indicates that ThreatInsight is disabled. A value of `audit` indicates that Okta logs suspicious requests in the System Log. A value of `block` indicates that Okta logs suspicious requests in the System Log and blocks the requests. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.14.0/docs/resources/threat_insight_settings#action ThreatInsightSettings#action} Action *string `field:"required" json:"action" yaml:"action"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.14.0/docs/resources/threat_insight_settings#id ThreatInsightSettings#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Accepts a list of Network Zone IDs. // // Can only accept zones of `IP` type. IPs in the excluded Network Zones aren't logged or blocked by Okta ThreatInsight and proceed to Sign On rules evaluation. This ensures that traffic from known, trusted IPs isn't accidentally logged or blocked. The ordering of the network zone is not guarantee from the API sides // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.14.0/docs/resources/threat_insight_settings#network_excludes ThreatInsightSettings#network_excludes} NetworkExcludes *[]*string `field:"optional" json:"networkExcludes" yaml:"networkExcludes"` }