Documentation
¶
Index ¶
- Variables
- type AgentSideAttributeKey
- type AgentSideAttributeMatcher
- type AgentSideCriteria
- type AgentSideCriterias
- type AttackHandling
- type BlockingStrategy
- type Criteria
- type DetectionType
- type Metadata
- type ResourceAttributeCondition
- type ResourceAttributeConditions
- type ResourceAttributeValueMatcher
- type Settings
Constants ¶
This section is empty.
Variables ¶
View Source
var AgentSideAttributeKeies = struct { ActorIp AgentSideAttributeKey DetectionType AgentSideAttributeKey EntryPointPayload AgentSideAttributeKey EntryPointPayloadDomain AgentSideAttributeKey EntryPointPayloadPort AgentSideAttributeKey EntryPointUrlPath AgentSideAttributeKey }{ "ACTOR_IP", "DETECTION_TYPE", "ENTRY_POINT_PAYLOAD", "ENTRY_POINT_PAYLOAD_DOMAIN", "ENTRY_POINT_PAYLOAD_PORT", "ENTRY_POINT_URL_PATH", }
View Source
var AgentSideAttributeMatchers = struct { Contains AgentSideAttributeMatcher DoesNotContain AgentSideAttributeMatcher DoesNotEndWith AgentSideAttributeMatcher DoesNotStartsWith AgentSideAttributeMatcher EndsWith AgentSideAttributeMatcher Equals AgentSideAttributeMatcher IpCidr AgentSideAttributeMatcher NotEquals AgentSideAttributeMatcher NotInIpCidr AgentSideAttributeMatcher StartsWith AgentSideAttributeMatcher }{ "CONTAINS", "DOES_NOT_CONTAIN", "DOES_NOT_END_WITH", "DOES_NOT_STARTS_WITH", "ENDS_WITH", "EQUALS", "IP_CIDR", "NOT_EQUALS", "NOT_IN_IP_CIDR", "STARTS_WITH", }
View Source
var BlockingStrategies = struct { Monitor BlockingStrategy Off BlockingStrategy }{ "MONITOR", "OFF", }
View Source
var DetectionTypes = struct { CmdInjection DetectionType JndiInjection DetectionType SqlInjection DetectionType Ssrf DetectionType }{ "CMD_INJECTION", "JNDI_INJECTION", "SQL_INJECTION", "SSRF", }
View Source
var ResourceAttributeValueMatchers = struct { Contains ResourceAttributeValueMatcher DoesNotContain ResourceAttributeValueMatcher DoesNotEndWith ResourceAttributeValueMatcher DoesNotExist ResourceAttributeValueMatcher DoesNotStartWith ResourceAttributeValueMatcher EndsWith ResourceAttributeValueMatcher Equals ResourceAttributeValueMatcher Exists ResourceAttributeValueMatcher NotEquals ResourceAttributeValueMatcher StartsWith ResourceAttributeValueMatcher }{ "CONTAINS", "DOES_NOT_CONTAIN", "DOES_NOT_END_WITH", "DOES_NOT_EXIST", "DOES_NOT_START_WITH", "ENDS_WITH", "EQUALS", "EXISTS", "NOT_EQUALS", "STARTS_WITH", }
Functions ¶
This section is empty.
Types ¶
type AgentSideAttributeKey ¶ added in v1.75.0
type AgentSideAttributeKey string
type AgentSideAttributeMatcher ¶ added in v1.75.0
type AgentSideAttributeMatcher string
type AgentSideCriteria ¶ added in v1.75.0
type AgentSideCriteria struct { CriteriaKey AgentSideAttributeKey `json:"criteriaKey"` // Possible Values: `ACTOR_IP`, `DETECTION_TYPE`, `ENTRY_POINT_PAYLOAD`, `ENTRY_POINT_PAYLOAD_DOMAIN`, `ENTRY_POINT_PAYLOAD_PORT`, `ENTRY_POINT_URL_PATH` CriteriaMatcher AgentSideAttributeMatcher `json:"criteriaMatcher"` // Possible Values: `CONTAINS`, `DOES_NOT_CONTAIN`, `DOES_NOT_END_WITH`, `DOES_NOT_STARTS_WITH`, `ENDS_WITH`, `EQUALS`, `IP_CIDR`, `NOT_EQUALS`, `NOT_IN_IP_CIDR`, `STARTS_WITH` CriteriaValueDetectionType *DetectionType `json:"criteriaValueDetectionType,omitempty"` // Possible Values: `CMD_INJECTION`, `JNDI_INJECTION`, `SQL_INJECTION`, `SSRF` CriteriaValueFreeText *string `json:"criteriaValueFreeText,omitempty"` // Value }
func (*AgentSideCriteria) HandlePreconditions ¶ added in v1.75.0
func (me *AgentSideCriteria) HandlePreconditions() error
func (*AgentSideCriteria) MarshalHCL ¶ added in v1.75.0
func (me *AgentSideCriteria) MarshalHCL(properties hcl.Properties) error
func (*AgentSideCriteria) Schema ¶ added in v1.75.0
func (me *AgentSideCriteria) Schema() map[string]*schema.Schema
func (*AgentSideCriteria) UnmarshalHCL ¶ added in v1.75.0
func (me *AgentSideCriteria) UnmarshalHCL(decoder hcl.Decoder) error
type AgentSideCriterias ¶ added in v1.75.0
type AgentSideCriterias []*AgentSideCriteria
func (AgentSideCriterias) MarshalHCL ¶ added in v1.75.0
func (me AgentSideCriterias) MarshalHCL(properties hcl.Properties) error
func (*AgentSideCriterias) Schema ¶ added in v1.75.0
func (me *AgentSideCriterias) Schema() map[string]*schema.Schema
func (*AgentSideCriterias) UnmarshalHCL ¶ added in v1.75.0
func (me *AgentSideCriterias) UnmarshalHCL(decoder hcl.Decoder) error
type AttackHandling ¶
type AttackHandling struct {
BlockingStrategy BlockingStrategy `json:"blockingStrategy"` // Possible Values: `MONITOR`, `OFF`
}
func (*AttackHandling) MarshalHCL ¶
func (me *AttackHandling) MarshalHCL(properties hcl.Properties) error
func (*AttackHandling) UnmarshalHCL ¶
func (me *AttackHandling) UnmarshalHCL(decoder hcl.Decoder) error
type BlockingStrategy ¶
type BlockingStrategy string
type Criteria ¶
type Criteria struct { AttackPattern *string `json:"attackPattern,omitempty"` // Only consider attacks matching the specified pattern. SourceIp *string `json:"sourceIp,omitempty"` // Source IP }
func (*Criteria) MarshalHCL ¶
func (me *Criteria) MarshalHCL(properties hcl.Properties) error
type DetectionType ¶ added in v1.75.0
type DetectionType string
type Metadata ¶
type Metadata struct {
Comment string `json:"comment"`
}
func (*Metadata) MarshalHCL ¶
func (me *Metadata) MarshalHCL(properties hcl.Properties) error
type ResourceAttributeCondition ¶ added in v1.73.0
type ResourceAttributeCondition struct { Matcher ResourceAttributeValueMatcher `json:"matcher"` // Possible Values: `CONTAINS`, `DOES_NOT_CONTAIN`, `DOES_NOT_END_WITH`, `DOES_NOT_EXIST`, `DOES_NOT_START_WITH`, `ENDS_WITH`, `EQUALS`, `EXISTS`, `NOT_EQUALS`, `STARTS_WITH` ResourceAttributeKey string `json:"resourceAttributeKey"` // Resource attribute key ResourceAttributeValue *string `json:"resourceAttributeValue,omitempty"` // Resource attribute value }
ResourceAttributeCondition. We provide suggestions for resource attribute keys and values based on what we currently see in your environment. You can also enter any value that isn't in the list. Key and value matches are case-sensitive. Resource attributes come out of the box from OneAgent, and you can set them up from [data enrichment](https://docs.dynatrace.com/docs/extend-dynatrace/extend-data).
func (*ResourceAttributeCondition) HandlePreconditions ¶ added in v1.73.0
func (me *ResourceAttributeCondition) HandlePreconditions() error
func (*ResourceAttributeCondition) MarshalHCL ¶ added in v1.73.0
func (me *ResourceAttributeCondition) MarshalHCL(properties hcl.Properties) error
func (*ResourceAttributeCondition) Schema ¶ added in v1.73.0
func (me *ResourceAttributeCondition) Schema() map[string]*schema.Schema
func (*ResourceAttributeCondition) UnmarshalHCL ¶ added in v1.73.0
func (me *ResourceAttributeCondition) UnmarshalHCL(decoder hcl.Decoder) error
type ResourceAttributeConditions ¶ added in v1.75.0
type ResourceAttributeConditions []*ResourceAttributeCondition
func (ResourceAttributeConditions) MarshalHCL ¶ added in v1.75.0
func (me ResourceAttributeConditions) MarshalHCL(properties hcl.Properties) error
func (*ResourceAttributeConditions) Schema ¶ added in v1.75.0
func (me *ResourceAttributeConditions) Schema() map[string]*schema.Schema
func (*ResourceAttributeConditions) UnmarshalHCL ¶ added in v1.75.0
func (me *ResourceAttributeConditions) UnmarshalHCL(decoder hcl.Decoder) error
type ResourceAttributeValueMatcher ¶ added in v1.73.0
type ResourceAttributeValueMatcher string
type Settings ¶
type Settings struct { AttackHandling *AttackHandling `json:"attackHandling"` // Step 1: Define attack control for chosen criteria Enabled bool `json:"enabled"` // This setting is enabled (`true`) or disabled (`false`) Metadata *Metadata `json:"metadata"` // Step 4: Leave comment (optional) ResourceAttributeConditions ResourceAttributeConditions `json:"resourceAttributeConditions,omitempty"` // When you add multiple conditions, the rule applies if all conditions apply.\n\nIf you want the rule to apply only to a subset of your environment, provide the resource attributes that should be used to identify that part of the environment. RuleName *string `json:"ruleName,omitempty"` // Rule name Rules AgentSideCriterias `json:"rules"` // Provide conditions that must be met by the detection finding you want to allowlist. InsertAfter string `json:"-"` }
func (*Settings) MarshalHCL ¶
func (me *Settings) MarshalHCL(properties hcl.Properties) error
Click to show internal directories.
Click to hide internal directories.