Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var ProcessItems = struct { Commandline ProcessItem Executable ProcessItem Executablepath ProcessItem }{ "CommandLine", "Executable", "ExecutablePath", }
View Source
var ReportItems = struct { Always ReportItem Highresourceusage ReportItem Never ReportItem }{ "always", "highResourceUsage", "never", }
Functions ¶
This section is empty.
Types ¶
type DetectionCondition ¶
type DetectionCondition struct { Condition string `json:"condition"` // - $contains(svc) – Matches if svc appears anywhere in the process property value.\n- $eq(svc.exe) – Matches if svc.exe matches the process property value exactly.\n- $prefix(svc) – Matches if app matches the prefix of the process property value.\n- $suffix(svc.py) – Matches if svc.py matches the suffix of the process property value.\n\nFor example, $suffix(svc.py) would detect processes named loyaltysvc.py and paymentssvc.py.\n\nFor more details, see [Declarative process grouping](https://dt-url.net/j142w57). Property ProcessItem `json:"property"` // Possible Values: `Executable`, `ExecutablePath`, `CommandLine` }
func (*DetectionCondition) MarshalHCL ¶
func (me *DetectionCondition) MarshalHCL(properties hcl.Properties) error
func (*DetectionCondition) Schema ¶
func (me *DetectionCondition) Schema() map[string]*schema.Schema
func (*DetectionCondition) UnmarshalHCL ¶
func (me *DetectionCondition) UnmarshalHCL(decoder hcl.Decoder) error
type DetectionConditions ¶
type DetectionConditions []*DetectionCondition
func (DetectionConditions) MarshalHCL ¶
func (me DetectionConditions) MarshalHCL(properties hcl.Properties) error
func (*DetectionConditions) Schema ¶
func (me *DetectionConditions) Schema() map[string]*schema.Schema
func (*DetectionConditions) UnmarshalHCL ¶
func (me *DetectionConditions) UnmarshalHCL(decoder hcl.Decoder) error
type ProcessDefinition ¶
type ProcessDefinition struct { ID string `json:"id"` // Process group identifier ProcessGroupName string `json:"processGroupName"` // This identifier is used by Dynatrace to recognize this process group. Report ReportItem `json:"report"` // Possible Values: `never`, `always`, `highResourceUsage` Rules DetectionConditions `json:"rules"` // Define process detection rules by selecting a process property and a condition. Each process group can have multiple detection rules associated with it. }
func (*ProcessDefinition) MarshalHCL ¶
func (me *ProcessDefinition) MarshalHCL(properties hcl.Properties) error
func (*ProcessDefinition) UnmarshalHCL ¶
func (me *ProcessDefinition) UnmarshalHCL(decoder hcl.Decoder) error
type ProcessDefinitions ¶
type ProcessDefinitions []*ProcessDefinition
func (ProcessDefinitions) MarshalHCL ¶
func (me ProcessDefinitions) MarshalHCL(properties hcl.Properties) error
func (*ProcessDefinitions) Schema ¶
func (me *ProcessDefinitions) Schema() map[string]*schema.Schema
func (*ProcessDefinitions) UnmarshalHCL ¶
func (me *ProcessDefinitions) UnmarshalHCL(decoder hcl.Decoder) error
type ProcessItem ¶
type ProcessItem string
type ReportItem ¶
type ReportItem string
type Settings ¶
type Settings struct { Detection ProcessDefinitions `json:"detection"` // Enter a descriptive process group display name and a unique identifier that Dynatrace can use to recognize this process group. Enabled bool `json:"enabled"` // This setting is enabled (`true`) or disabled (`false`) Name string `json:"name"` // Monitored technology name Scope *string `json:"-" scope:"scope"` // The scope of this setting (HOST, HOST_GROUP). Omit this property if you want to cover the whole environment. InsertAfter string `json:"-"` }
func (*Settings) MarshalHCL ¶
func (me *Settings) MarshalHCL(properties hcl.Properties) error
Click to show internal directories.
Click to hide internal directories.