sysdig.SecureRuleFalco
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as sysdig from "@pulumi/sysdig";
const example = new sysdig.SecureRuleFalco("example", {
    description: "A shell was used as the entrypoint/exec point into a container with an attached terminal.",
    tags: [
        "container",
        "shell",
        "mitre_execution",
    ],
    condition: "spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint",
    output: "A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)",
    priority: "notice",
    source: "syscall",
    exceptions: [
        {
            name: "proc_names",
            fields: ["proc.name"],
            comps: ["in"],
            values: JSON.stringify([[[
                "python",
                "python2",
                "python3",
            ]]]),
        },
        {
            name: "container_proc_name",
            fields: [
                "container.id",
                "proc.name",
            ],
            comps: [
                "=",
                "in",
            ],
            values: JSON.stringify([[
                "host",
                [
                    "docker_binaries",
                    "k8s_binaries",
                    "lxd_binaries",
                    "nsenter",
                ],
            ]]),
        },
        {
            name: "proc_cmdline",
            fields: [
                "proc.name",
                "proc.cmdline",
            ],
            comps: [
                "in",
                "contains",
            ],
            values: JSON.stringify([
                [
                    [
                        "python",
                        "python2",
                        "python3",
                    ],
                    "/opt/draios/bin/sdchecks",
                ],
                [
                    ["java"],
                    "sdjagent.jar",
                ],
            ]),
        },
    ],
});
import pulumi
import json
import pulumi_sysdig as sysdig
example = sysdig.SecureRuleFalco("example",
    description="A shell was used as the entrypoint/exec point into a container with an attached terminal.",
    tags=[
        "container",
        "shell",
        "mitre_execution",
    ],
    condition="spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint",
    output="A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)",
    priority="notice",
    source="syscall",
    exceptions=[
        {
            "name": "proc_names",
            "fields": ["proc.name"],
            "comps": ["in"],
            "values": json.dumps([[[
                "python",
                "python2",
                "python3",
            ]]]),
        },
        {
            "name": "container_proc_name",
            "fields": [
                "container.id",
                "proc.name",
            ],
            "comps": [
                "=",
                "in",
            ],
            "values": json.dumps([[
                "host",
                [
                    "docker_binaries",
                    "k8s_binaries",
                    "lxd_binaries",
                    "nsenter",
                ],
            ]]),
        },
        {
            "name": "proc_cmdline",
            "fields": [
                "proc.name",
                "proc.cmdline",
            ],
            "comps": [
                "in",
                "contains",
            ],
            "values": json.dumps([
                [
                    [
                        "python",
                        "python2",
                        "python3",
                    ],
                    "/opt/draios/bin/sdchecks",
                ],
                [
                    ["java"],
                    "sdjagent.jar",
                ],
            ]),
        },
    ])
package main
import (
	"encoding/json"
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/sysdig"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		tmpJSON0, err := json.Marshal([][][]string{
			[][]string{
				[]string{
					"python",
					"python2",
					"python3",
				},
			},
		})
		if err != nil {
			return err
		}
		json0 := string(tmpJSON0)
		tmpJSON1, err := json.Marshal([][]interface{}{
			[]interface{}{
				"host",
				[]string{
					"docker_binaries",
					"k8s_binaries",
					"lxd_binaries",
					"nsenter",
				},
			},
		})
		if err != nil {
			return err
		}
		json1 := string(tmpJSON1)
		tmpJSON2, err := json.Marshal([]interface{}{
			[]interface{}{
				[]string{
					"python",
					"python2",
					"python3",
				},
				"/opt/draios/bin/sdchecks",
			},
			[]interface{}{
				[]string{
					"java",
				},
				"sdjagent.jar",
			},
		})
		if err != nil {
			return err
		}
		json2 := string(tmpJSON2)
		_, err = sysdig.NewSecureRuleFalco(ctx, "example", &sysdig.SecureRuleFalcoArgs{
			Description: pulumi.String("A shell was used as the entrypoint/exec point into a container with an attached terminal."),
			Tags: pulumi.StringArray{
				pulumi.String("container"),
				pulumi.String("shell"),
				pulumi.String("mitre_execution"),
			},
			Condition: pulumi.String("spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint"),
			Output:    pulumi.String("A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)"),
			Priority:  pulumi.String("notice"),
			Source:    pulumi.String("syscall"),
			Exceptions: sysdig.SecureRuleFalcoExceptionArray{
				&sysdig.SecureRuleFalcoExceptionArgs{
					Name: pulumi.String("proc_names"),
					Fields: pulumi.StringArray{
						pulumi.String("proc.name"),
					},
					Comps: pulumi.StringArray{
						pulumi.String("in"),
					},
					Values: pulumi.String(json0),
				},
				&sysdig.SecureRuleFalcoExceptionArgs{
					Name: pulumi.String("container_proc_name"),
					Fields: pulumi.StringArray{
						pulumi.String("container.id"),
						pulumi.String("proc.name"),
					},
					Comps: pulumi.StringArray{
						pulumi.String("="),
						pulumi.String("in"),
					},
					Values: pulumi.String(json1),
				},
				&sysdig.SecureRuleFalcoExceptionArgs{
					Name: pulumi.String("proc_cmdline"),
					Fields: pulumi.StringArray{
						pulumi.String("proc.name"),
						pulumi.String("proc.cmdline"),
					},
					Comps: pulumi.StringArray{
						pulumi.String("in"),
						pulumi.String("contains"),
					},
					Values: pulumi.String(json2),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using System.Text.Json;
using Pulumi;
using Sysdig = Pulumi.Sysdig;
return await Deployment.RunAsync(() => 
{
    var example = new Sysdig.SecureRuleFalco("example", new()
    {
        Description = "A shell was used as the entrypoint/exec point into a container with an attached terminal.",
        Tags = new[]
        {
            "container",
            "shell",
            "mitre_execution",
        },
        Condition = "spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint",
        Output = "A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)",
        Priority = "notice",
        Source = "syscall",
        Exceptions = new[]
        {
            new Sysdig.Inputs.SecureRuleFalcoExceptionArgs
            {
                Name = "proc_names",
                Fields = new[]
                {
                    "proc.name",
                },
                Comps = new[]
                {
                    "in",
                },
                Values = JsonSerializer.Serialize(new[]
                {
                    new[]
                    {
                        new[]
                        {
                            "python",
                            "python2",
                            "python3",
                        },
                    },
                }),
            },
            new Sysdig.Inputs.SecureRuleFalcoExceptionArgs
            {
                Name = "container_proc_name",
                Fields = new[]
                {
                    "container.id",
                    "proc.name",
                },
                Comps = new[]
                {
                    "=",
                    "in",
                },
                Values = JsonSerializer.Serialize(new[]
                {
                    new object?[]
                    {
                        "host",
                        new[]
                        {
                            "docker_binaries",
                            "k8s_binaries",
                            "lxd_binaries",
                            "nsenter",
                        },
                    },
                }),
            },
            new Sysdig.Inputs.SecureRuleFalcoExceptionArgs
            {
                Name = "proc_cmdline",
                Fields = new[]
                {
                    "proc.name",
                    "proc.cmdline",
                },
                Comps = new[]
                {
                    "in",
                    "contains",
                },
                Values = JsonSerializer.Serialize(new object?[]
                {
                    new object?[]
                    {
                        new[]
                        {
                            "python",
                            "python2",
                            "python3",
                        },
                        "/opt/draios/bin/sdchecks",
                    },
                    new object?[]
                    {
                        new[]
                        {
                            "java",
                        },
                        "sdjagent.jar",
                    },
                }),
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sysdig.SecureRuleFalco;
import com.pulumi.sysdig.SecureRuleFalcoArgs;
import com.pulumi.sysdig.inputs.SecureRuleFalcoExceptionArgs;
import static com.pulumi.codegen.internal.Serialization.*;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var example = new SecureRuleFalco("example", SecureRuleFalcoArgs.builder()
            .description("A shell was used as the entrypoint/exec point into a container with an attached terminal.")
            .tags(            
                "container",
                "shell",
                "mitre_execution")
            .condition("spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint")
            .output("A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)")
            .priority("notice")
            .source("syscall")
            .exceptions(            
                SecureRuleFalcoExceptionArgs.builder()
                    .name("proc_names")
                    .fields("proc.name")
                    .comps("in")
                    .values(serializeJson(
                        jsonArray(jsonArray(jsonArray(
                            "python", 
                            "python2", 
                            "python3"
                        )))))
                    .build(),
                SecureRuleFalcoExceptionArgs.builder()
                    .name("container_proc_name")
                    .fields(                    
                        "container.id",
                        "proc.name")
                    .comps(                    
                        "=",
                        "in")
                    .values(serializeJson(
                        jsonArray(jsonArray(
                            "host", 
                            jsonArray(
                                "docker_binaries", 
                                "k8s_binaries", 
                                "lxd_binaries", 
                                "nsenter"
                            )
                        ))))
                    .build(),
                SecureRuleFalcoExceptionArgs.builder()
                    .name("proc_cmdline")
                    .fields(                    
                        "proc.name",
                        "proc.cmdline")
                    .comps(                    
                        "in",
                        "contains")
                    .values(serializeJson(
                        jsonArray(
                            jsonArray(
                                jsonArray(
                                    "python", 
                                    "python2", 
                                    "python3"
                                ), 
                                "/opt/draios/bin/sdchecks"
                            ), 
                            jsonArray(
                                jsonArray("java"), 
                                "sdjagent.jar"
                            )
                        )))
                    .build())
            .build());
    }
}
resources:
  example:
    type: sysdig:SecureRuleFalco
    properties:
      # ID
      description: A shell was used as the entrypoint/exec point into a container with an attached terminal.
      tags:
        - container
        - shell
        - mitre_execution
      condition: spawned_process and container and shell_procs and proc.tty != 0 and container_entrypoint
      output: A shell was spawned in a container with an attached terminal (user=%user.name %container.info shell=%proc.name parent=%proc.pname cmdline=%proc.cmdline terminal=%proc.tty container_id=%container.id image=%container.image.repository)
      priority: notice
      source: syscall
      exceptions:
        - name: proc_names
          fields:
            - proc.name
          comps:
            - in
          values:
            fn::toJSON:
              - - - python
                  - python2
                  - python3
        - name: container_proc_name
          fields:
            - container.id
            - proc.name
          comps:
            - =
            - in
          values:
            fn::toJSON:
              - - host
                - - docker_binaries
                  - k8s_binaries
                  - lxd_binaries
                  - nsenter
        - name: proc_cmdline
          fields:
            - proc.name
            - proc.cmdline
          comps:
            - in
            - contains
          values:
            fn::toJSON:
              - - - python
                  - python2
                  - python3
                - /opt/draios/bin/sdchecks
              - - - java
                - sdjagent.jar
Create SecureRuleFalco Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecureRuleFalco(name: string, args?: SecureRuleFalcoArgs, opts?: CustomResourceOptions);@overload
def SecureRuleFalco(resource_name: str,
                    args: Optional[SecureRuleFalcoArgs] = None,
                    opts: Optional[ResourceOptions] = None)
@overload
def SecureRuleFalco(resource_name: str,
                    opts: Optional[ResourceOptions] = None,
                    append: Optional[bool] = None,
                    condition: Optional[str] = None,
                    description: Optional[str] = None,
                    exceptions: Optional[Sequence[SecureRuleFalcoExceptionArgs]] = None,
                    minimum_engine_version: Optional[float] = None,
                    name: Optional[str] = None,
                    output: Optional[str] = None,
                    priority: Optional[str] = None,
                    secure_rule_falco_id: Optional[str] = None,
                    source: Optional[str] = None,
                    tags: Optional[Sequence[str]] = None,
                    timeouts: Optional[SecureRuleFalcoTimeoutsArgs] = None)func NewSecureRuleFalco(ctx *Context, name string, args *SecureRuleFalcoArgs, opts ...ResourceOption) (*SecureRuleFalco, error)public SecureRuleFalco(string name, SecureRuleFalcoArgs? args = null, CustomResourceOptions? opts = null)
public SecureRuleFalco(String name, SecureRuleFalcoArgs args)
public SecureRuleFalco(String name, SecureRuleFalcoArgs args, CustomResourceOptions options)
type: sysdig:SecureRuleFalco
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecureRuleFalcoArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecureRuleFalcoArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecureRuleFalcoArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecureRuleFalcoArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecureRuleFalcoArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var secureRuleFalcoResource = new Sysdig.SecureRuleFalco("secureRuleFalcoResource", new()
{
    Append = false,
    Condition = "string",
    Description = "string",
    Exceptions = new[]
    {
        new Sysdig.Inputs.SecureRuleFalcoExceptionArgs
        {
            Name = "string",
            Values = "string",
            Comps = new[]
            {
                "string",
            },
            Fields = new[]
            {
                "string",
            },
        },
    },
    MinimumEngineVersion = 0,
    Name = "string",
    Output = "string",
    Priority = "string",
    SecureRuleFalcoId = "string",
    Source = "string",
    Tags = new[]
    {
        "string",
    },
    Timeouts = new Sysdig.Inputs.SecureRuleFalcoTimeoutsArgs
    {
        Create = "string",
        Delete = "string",
        Read = "string",
        Update = "string",
    },
});
example, err := sysdig.NewSecureRuleFalco(ctx, "secureRuleFalcoResource", &sysdig.SecureRuleFalcoArgs{
Append: pulumi.Bool(false),
Condition: pulumi.String("string"),
Description: pulumi.String("string"),
Exceptions: .SecureRuleFalcoExceptionArray{
&.SecureRuleFalcoExceptionArgs{
Name: pulumi.String("string"),
Values: pulumi.String("string"),
Comps: pulumi.StringArray{
pulumi.String("string"),
},
Fields: pulumi.StringArray{
pulumi.String("string"),
},
},
},
MinimumEngineVersion: pulumi.Float64(0),
Name: pulumi.String("string"),
Output: pulumi.String("string"),
Priority: pulumi.String("string"),
SecureRuleFalcoId: pulumi.String("string"),
Source: pulumi.String("string"),
Tags: pulumi.StringArray{
pulumi.String("string"),
},
Timeouts: &.SecureRuleFalcoTimeoutsArgs{
Create: pulumi.String("string"),
Delete: pulumi.String("string"),
Read: pulumi.String("string"),
Update: pulumi.String("string"),
},
})
var secureRuleFalcoResource = new SecureRuleFalco("secureRuleFalcoResource", SecureRuleFalcoArgs.builder()
    .append(false)
    .condition("string")
    .description("string")
    .exceptions(SecureRuleFalcoExceptionArgs.builder()
        .name("string")
        .values("string")
        .comps("string")
        .fields("string")
        .build())
    .minimumEngineVersion(0)
    .name("string")
    .output("string")
    .priority("string")
    .secureRuleFalcoId("string")
    .source("string")
    .tags("string")
    .timeouts(SecureRuleFalcoTimeoutsArgs.builder()
        .create("string")
        .delete("string")
        .read("string")
        .update("string")
        .build())
    .build());
secure_rule_falco_resource = sysdig.SecureRuleFalco("secureRuleFalcoResource",
    append=False,
    condition="string",
    description="string",
    exceptions=[{
        "name": "string",
        "values": "string",
        "comps": ["string"],
        "fields": ["string"],
    }],
    minimum_engine_version=0,
    name="string",
    output="string",
    priority="string",
    secure_rule_falco_id="string",
    source="string",
    tags=["string"],
    timeouts={
        "create": "string",
        "delete": "string",
        "read": "string",
        "update": "string",
    })
const secureRuleFalcoResource = new sysdig.SecureRuleFalco("secureRuleFalcoResource", {
    append: false,
    condition: "string",
    description: "string",
    exceptions: [{
        name: "string",
        values: "string",
        comps: ["string"],
        fields: ["string"],
    }],
    minimumEngineVersion: 0,
    name: "string",
    output: "string",
    priority: "string",
    secureRuleFalcoId: "string",
    source: "string",
    tags: ["string"],
    timeouts: {
        create: "string",
        "delete": "string",
        read: "string",
        update: "string",
    },
});
type: sysdig:SecureRuleFalco
properties:
    append: false
    condition: string
    description: string
    exceptions:
        - comps:
            - string
          fields:
            - string
          name: string
          values: string
    minimumEngineVersion: 0
    name: string
    output: string
    priority: string
    secureRuleFalcoId: string
    source: string
    tags:
        - string
    timeouts:
        create: string
        delete: string
        read: string
        update: string
SecureRuleFalco Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecureRuleFalco resource accepts the following input properties:
- Append bool
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- Condition string
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- Description string
- The description of Secure rule. By default is empty.
- Exceptions
List<SecureRule Falco Exception> 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- MinimumEngine doubleVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- Name string
- The name of the Secure rule. It must be unique.
- Output string
- Add additional information to each Falco notification's output. Required if append is false.
- Priority string
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- SecureRule stringFalco Id 
- Source string
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- List<string>
- A list of tags for this rule.
- Timeouts
SecureRule Falco Timeouts 
- Append bool
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- Condition string
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- Description string
- The description of Secure rule. By default is empty.
- Exceptions
[]SecureRule Falco Exception Args 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- MinimumEngine float64Version 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- Name string
- The name of the Secure rule. It must be unique.
- Output string
- Add additional information to each Falco notification's output. Required if append is false.
- Priority string
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- SecureRule stringFalco Id 
- Source string
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- []string
- A list of tags for this rule.
- Timeouts
SecureRule Falco Timeouts Args 
- append Boolean
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition String
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description String
- The description of Secure rule. By default is empty.
- exceptions
List<SecureRule Falco Exception> 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimumEngine DoubleVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name String
- The name of the Secure rule. It must be unique.
- output String
- Add additional information to each Falco notification's output. Required if append is false.
- priority String
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secureRule StringFalco Id 
- source String
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- List<String>
- A list of tags for this rule.
- timeouts
SecureRule Falco Timeouts 
- append boolean
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition string
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description string
- The description of Secure rule. By default is empty.
- exceptions
SecureRule Falco Exception[] 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimumEngine numberVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name string
- The name of the Secure rule. It must be unique.
- output string
- Add additional information to each Falco notification's output. Required if append is false.
- priority string
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secureRule stringFalco Id 
- source string
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- string[]
- A list of tags for this rule.
- timeouts
SecureRule Falco Timeouts 
- append bool
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition str
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description str
- The description of Secure rule. By default is empty.
- exceptions
Sequence[SecureRule Falco Exception Args] 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimum_engine_ floatversion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name str
- The name of the Secure rule. It must be unique.
- output str
- Add additional information to each Falco notification's output. Required if append is false.
- priority str
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secure_rule_ strfalco_ id 
- source str
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- Sequence[str]
- A list of tags for this rule.
- timeouts
SecureRule Falco Timeouts Args 
- append Boolean
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition String
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description String
- The description of Secure rule. By default is empty.
- exceptions List<Property Map>
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimumEngine NumberVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name String
- The name of the Secure rule. It must be unique.
- output String
- Add additional information to each Falco notification's output. Required if append is false.
- priority String
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secureRule StringFalco Id 
- source String
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- List<String>
- A list of tags for this rule.
- timeouts Property Map
Outputs
All input properties are implicitly available as output properties. Additionally, the SecureRuleFalco resource produces the following output properties:
Look up Existing SecureRuleFalco Resource
Get an existing SecureRuleFalco resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecureRuleFalcoState, opts?: CustomResourceOptions): SecureRuleFalco@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        append: Optional[bool] = None,
        condition: Optional[str] = None,
        description: Optional[str] = None,
        exceptions: Optional[Sequence[SecureRuleFalcoExceptionArgs]] = None,
        minimum_engine_version: Optional[float] = None,
        name: Optional[str] = None,
        output: Optional[str] = None,
        priority: Optional[str] = None,
        secure_rule_falco_id: Optional[str] = None,
        source: Optional[str] = None,
        tags: Optional[Sequence[str]] = None,
        timeouts: Optional[SecureRuleFalcoTimeoutsArgs] = None,
        version: Optional[float] = None) -> SecureRuleFalcofunc GetSecureRuleFalco(ctx *Context, name string, id IDInput, state *SecureRuleFalcoState, opts ...ResourceOption) (*SecureRuleFalco, error)public static SecureRuleFalco Get(string name, Input<string> id, SecureRuleFalcoState? state, CustomResourceOptions? opts = null)public static SecureRuleFalco get(String name, Output<String> id, SecureRuleFalcoState state, CustomResourceOptions options)resources:  _:    type: sysdig:SecureRuleFalco    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Append bool
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- Condition string
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- Description string
- The description of Secure rule. By default is empty.
- Exceptions
List<SecureRule Falco Exception> 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- MinimumEngine doubleVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- Name string
- The name of the Secure rule. It must be unique.
- Output string
- Add additional information to each Falco notification's output. Required if append is false.
- Priority string
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- SecureRule stringFalco Id 
- Source string
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- List<string>
- A list of tags for this rule.
- Timeouts
SecureRule Falco Timeouts 
- Version double
- Current version of the resource in Sysdig Secure.
- Append bool
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- Condition string
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- Description string
- The description of Secure rule. By default is empty.
- Exceptions
[]SecureRule Falco Exception Args 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- MinimumEngine float64Version 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- Name string
- The name of the Secure rule. It must be unique.
- Output string
- Add additional information to each Falco notification's output. Required if append is false.
- Priority string
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- SecureRule stringFalco Id 
- Source string
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- []string
- A list of tags for this rule.
- Timeouts
SecureRule Falco Timeouts Args 
- Version float64
- Current version of the resource in Sysdig Secure.
- append Boolean
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition String
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description String
- The description of Secure rule. By default is empty.
- exceptions
List<SecureRule Falco Exception> 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimumEngine DoubleVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name String
- The name of the Secure rule. It must be unique.
- output String
- Add additional information to each Falco notification's output. Required if append is false.
- priority String
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secureRule StringFalco Id 
- source String
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- List<String>
- A list of tags for this rule.
- timeouts
SecureRule Falco Timeouts 
- version Double
- Current version of the resource in Sysdig Secure.
- append boolean
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition string
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description string
- The description of Secure rule. By default is empty.
- exceptions
SecureRule Falco Exception[] 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimumEngine numberVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name string
- The name of the Secure rule. It must be unique.
- output string
- Add additional information to each Falco notification's output. Required if append is false.
- priority string
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secureRule stringFalco Id 
- source string
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- string[]
- A list of tags for this rule.
- timeouts
SecureRule Falco Timeouts 
- version number
- Current version of the resource in Sysdig Secure.
- append bool
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition str
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description str
- The description of Secure rule. By default is empty.
- exceptions
Sequence[SecureRule Falco Exception Args] 
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimum_engine_ floatversion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name str
- The name of the Secure rule. It must be unique.
- output str
- Add additional information to each Falco notification's output. Required if append is false.
- priority str
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secure_rule_ strfalco_ id 
- source str
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- Sequence[str]
- A list of tags for this rule.
- timeouts
SecureRule Falco Timeouts Args 
- version float
- Current version of the resource in Sysdig Secure.
- append Boolean
- This indicates that the rule being created appends the condition to an existing Sysdig-provided rule. By default this is false. Appending to user-created rules is not supported by the API.
- condition String
- A Falco condition is simply a Boolean predicate on Sysdig events expressed using the Sysdig filter syntax and macro terms.
- description String
- The description of Secure rule. By default is empty.
- exceptions List<Property Map>
- The exceptions key is a list of identifier plus list of tuples of filtercheck fields. See below for details.
- minimumEngine NumberVersion 
- This is used to indicate that the rule requires a minimum engine version. This can allow you to add rules that would not normally pass validation with older agents in your environment. The rule will only be processed by agents that support the minimum_engine_version specified.
- name String
- The name of the Secure rule. It must be unique.
- output String
- Add additional information to each Falco notification's output. Required if append is false.
- priority String
- The priority of the Falco rule. It can be: "emergency", "alert", "critical", "error", "warning", "notice", "info" or "debug". By default is "warning".
- secureRule StringFalco Id 
- source String
- The source of the event. It can be either "syscall", "k8s_audit", "aws_cloudtrail", "gcp_auditlog", "azure_platformlogs", "awscloudtrail", "okta", "github", or "guardduty". Required if append is false.
- List<String>
- A list of tags for this rule.
- timeouts Property Map
- version Number
- Current version of the resource in Sysdig Secure.
Supporting Types
SecureRuleFalcoException, SecureRuleFalcoExceptionArgs        
- Name string
- The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has append = true.
- Values string
- Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field
and comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value
of this field must be supplied in JSON format. You can use the default jsonencodefunction to provide this value. See the usage example on the top.
- Comps List<string>
- Contains comparison operators that align 1-1 with the items in the fields property.
- Fields List<string>
- Contains one or more fields that will extract a value from the syscall/k8s_audit events.
- Name string
- The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has append = true.
- Values string
- Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field
and comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value
of this field must be supplied in JSON format. You can use the default jsonencodefunction to provide this value. See the usage example on the top.
- Comps []string
- Contains comparison operators that align 1-1 with the items in the fields property.
- Fields []string
- Contains one or more fields that will extract a value from the syscall/k8s_audit events.
- name String
- The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has append = true.
- values String
- Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field
and comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value
of this field must be supplied in JSON format. You can use the default jsonencodefunction to provide this value. See the usage example on the top.
- comps List<String>
- Contains comparison operators that align 1-1 with the items in the fields property.
- fields List<String>
- Contains one or more fields that will extract a value from the syscall/k8s_audit events.
- name string
- The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has append = true.
- values string
- Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field
and comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value
of this field must be supplied in JSON format. You can use the default jsonencodefunction to provide this value. See the usage example on the top.
- comps string[]
- Contains comparison operators that align 1-1 with the items in the fields property.
- fields string[]
- Contains one or more fields that will extract a value from the syscall/k8s_audit events.
- name str
- The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has append = true.
- values str
- Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field
and comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value
of this field must be supplied in JSON format. You can use the default jsonencodefunction to provide this value. See the usage example on the top.
- comps Sequence[str]
- Contains comparison operators that align 1-1 with the items in the fields property.
- fields Sequence[str]
- Contains one or more fields that will extract a value from the syscall/k8s_audit events.
- name String
- The name of the exception. Only used to provide a handy name, and to potentially link together values in a later rule that has append = true.
- values String
- Contains tuples of values. Each item in the tuple should align 1-1 with the corresponding field
and comparison operator. Since the value can be a string, a list of strings or a list of a list of strings, the value
of this field must be supplied in JSON format. You can use the default jsonencodefunction to provide this value. See the usage example on the top.
- comps List<String>
- Contains comparison operators that align 1-1 with the items in the fields property.
- fields List<String>
- Contains one or more fields that will extract a value from the syscall/k8s_audit events.
SecureRuleFalcoTimeouts, SecureRuleFalcoTimeoutsArgs        
Import
Secure Falco runtime rules can be imported using the ID, e.g.
$ pulumi import sysdig:index/secureRuleFalco:SecureRuleFalco example 12345
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- sysdig sysdiglabs/terraform-provider-sysdig
- License
- Notes
- This Pulumi package is based on the sysdigTerraform Provider.