Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var MonitoringModes = struct { MonitoringOff MonitoringMode MonitoringOn MonitoringMode }{ "MONITORING_OFF", "MONITORING_ON", }
View Source
var ResourceAttributeValueMatchers = struct { Contains ResourceAttributeValueMatcher DoesNotContain ResourceAttributeValueMatcher DoesNotEndWith ResourceAttributeValueMatcher DoesNotExist ResourceAttributeValueMatcher DoesNotStartWith ResourceAttributeValueMatcher EndsWith ResourceAttributeValueMatcher Equals ResourceAttributeValueMatcher Exists ResourceAttributeValueMatcher NotEquals ResourceAttributeValueMatcher StartsWith ResourceAttributeValueMatcher }{ "CONTAINS", "DOES_NOT_CONTAIN", "DOES_NOT_END_WITH", "DOES_NOT_EXIST", "DOES_NOT_START_WITH", "ENDS_WITH", "EQUALS", "EXISTS", "NOT_EQUALS", "STARTS_WITH", }
Functions ¶
This section is empty.
Types ¶
type Criteria ¶
type Criteria struct {
ProcessGroup *string `json:"processGroup,omitempty"` // Process group
}
func (*Criteria) MarshalHCL ¶
func (me *Criteria) MarshalHCL(properties hcl.Properties) error
type Metadata ¶
type Metadata struct {
Comment string `json:"comment"`
}
func (*Metadata) MarshalHCL ¶
func (me *Metadata) MarshalHCL(properties hcl.Properties) error
type MonitoringMode ¶
type MonitoringMode string
type ResourceAttributeCondition ¶ added in v1.62.0
type ResourceAttributeCondition struct { Matcher ResourceAttributeValueMatcher `json:"matcher"` // Possible Values: `CONTAINS`, `DOES_NOT_CONTAIN`, `DOES_NOT_END_WITH`, `DOES_NOT_EXIST`, `DOES_NOT_START_WITH`, `ENDS_WITH`, `EQUALS`, `EXISTS`, `NOT_EQUALS`, `STARTS_WITH` ResourceAttributeKey string `json:"resourceAttributeKey"` // Resource attribute key ResourceAttributeValue *string `json:"resourceAttributeValue,omitempty"` // Resource attribute value }
func (*ResourceAttributeCondition) HandlePreconditions ¶ added in v1.62.0
func (me *ResourceAttributeCondition) HandlePreconditions() error
func (*ResourceAttributeCondition) MarshalHCL ¶ added in v1.62.0
func (me *ResourceAttributeCondition) MarshalHCL(properties hcl.Properties) error
func (*ResourceAttributeCondition) Schema ¶ added in v1.62.0
func (me *ResourceAttributeCondition) Schema() map[string]*schema.Schema
func (*ResourceAttributeCondition) UnmarshalHCL ¶ added in v1.62.0
func (me *ResourceAttributeCondition) UnmarshalHCL(decoder hcl.Decoder) error
type ResourceAttributeConditions ¶ added in v1.62.0
type ResourceAttributeConditions []*ResourceAttributeCondition
func (ResourceAttributeConditions) MarshalHCL ¶ added in v1.62.0
func (me ResourceAttributeConditions) MarshalHCL(properties hcl.Properties) error
func (*ResourceAttributeConditions) Schema ¶ added in v1.62.0
func (me *ResourceAttributeConditions) Schema() map[string]*schema.Schema
func (*ResourceAttributeConditions) UnmarshalHCL ¶ added in v1.62.0
func (me *ResourceAttributeConditions) UnmarshalHCL(decoder hcl.Decoder) error
type ResourceAttributeValueMatcher ¶ added in v1.62.0
type ResourceAttributeValueMatcher string
type Settings ¶
type Settings struct { Criteria *Criteria `json:"criteria,omitempty"` // Define criteria Enabled bool `json:"enabled"` // This setting is enabled (`true`) or disabled (`false`) Metadata *Metadata `json:"metadata"` // Step 3: Leave comment (optional) ResourceAttributeConditions ResourceAttributeConditions `json:"resourceAttributeConditions,omitempty"` // If you add more than one condition, note that all conditions must be true simultaneously for the rule to apply.\n\nWe provide suggestions for resource attribute keys and values based on what we currently see in your environment. You can also enter any value not currently seen in the list. Resource attributes come out of the box from the OneAgent, and you can set them up from [data enrichment](https://docs.dynatrace.com/docs/extend-dynatrace/extend-data). RuleName *string `json:"ruleName,omitempty"` // Rule name VulnerabilityDetectionControl *VulnerabilityDetectionControl `json:"vulnerabilityDetectionControl"` // Step 1: Select code-level vulnerability detection behavior InsertAfter string `json:"-"` }
func (*Settings) MarshalHCL ¶
func (me *Settings) MarshalHCL(properties hcl.Properties) error
type VulnerabilityDetectionControl ¶
type VulnerabilityDetectionControl struct {
MonitoringMode MonitoringMode `json:"monitoringMode"` // Possible Values: `MONITORING_OFF`, `MONITORING_ON`
}
func (*VulnerabilityDetectionControl) MarshalHCL ¶
func (me *VulnerabilityDetectionControl) MarshalHCL(properties hcl.Properties) error
func (*VulnerabilityDetectionControl) Schema ¶
func (me *VulnerabilityDetectionControl) Schema() map[string]*schema.Schema
func (*VulnerabilityDetectionControl) UnmarshalHCL ¶
func (me *VulnerabilityDetectionControl) UnmarshalHCL(decoder hcl.Decoder) error
Click to show internal directories.
Click to hide internal directories.