#[non_exhaustive]pub struct CloudConfigurationRuleCaseCreate {
pub notifications: Option<Vec<String>>,
pub status: SecurityMonitoringRuleSeverity,
pub additional_properties: BTreeMap<String, Value>,
/* private fields */
}
Expand description
Description of signals.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.notifications: Option<Vec<String>>
Notification targets for each rule case.
status: SecurityMonitoringRuleSeverity
Severity of the Security Signal.
additional_properties: BTreeMap<String, Value>
Implementations§
Source§impl CloudConfigurationRuleCaseCreate
impl CloudConfigurationRuleCaseCreate
Sourcepub fn new(
status: SecurityMonitoringRuleSeverity,
) -> CloudConfigurationRuleCaseCreate
pub fn new( status: SecurityMonitoringRuleSeverity, ) -> CloudConfigurationRuleCaseCreate
Examples found in repository?
examples/v2_security-monitoring_CreateSecurityMonitoringRule_1092490364.rs (lines 23-25)
17async fn main() {
18 let body =
19 SecurityMonitoringRuleCreatePayload::CloudConfigurationRuleCreatePayload(
20 Box::new(
21 CloudConfigurationRuleCreatePayload::new(
22 vec![
23 CloudConfigurationRuleCaseCreate::new(
24 SecurityMonitoringRuleSeverity::INFO,
25 ).notifications(vec!["channel".to_string()])
26 ],
27 CloudConfigurationRuleComplianceSignalOptions::new()
28 .user_activation_status(Some(true))
29 .user_group_by_fields(Some(vec!["@account_id".to_string()])),
30 false,
31 "ddd".to_string(),
32 "Example-Security-Monitoring_cloud".to_string(),
33 CloudConfigurationRuleOptions::new(
34 CloudConfigurationComplianceRuleOptions::new()
35 .complex_rule(false)
36 .rego_rule(
37 CloudConfigurationRegoRule::new(
38 r#"package datadog
39
40import data.datadog.output as dd_output
41
42import future.keywords.contains
43import future.keywords.if
44import future.keywords.in
45
46milliseconds_in_a_day := ((1000 * 60) * 60) * 24
47
48eval(iam_service_account_key) = "skip" if {
49 iam_service_account_key.disabled
50} else = "pass" if {
51 (iam_service_account_key.resource_seen_at / milliseconds_in_a_day) - (iam_service_account_key.valid_after_time / milliseconds_in_a_day) <= 90
52} else = "fail"
53
54# This part remains unchanged for all rules
55results contains result if {
56 some resource in input.resources[input.main_resource_type]
57 result := dd_output.format(resource, eval(resource))
58}
59"#.to_string(),
60 vec!["gcp_compute_disk".to_string()],
61 ),
62 )
63 .resource_type("gcp_compute_disk".to_string()),
64 ),
65 )
66 .filters(
67 vec![
68 SecurityMonitoringFilter::new()
69 .action(SecurityMonitoringFilterAction::REQUIRE)
70 .query("resource_id:helo*".to_string()),
71 SecurityMonitoringFilter::new()
72 .action(SecurityMonitoringFilterAction::SUPPRESS)
73 .query("control:helo*".to_string())
74 ],
75 )
76 .tags(vec!["my:tag".to_string()])
77 .type_(CloudConfigurationRuleType::CLOUD_CONFIGURATION),
78 ),
79 );
80 let configuration = datadog::Configuration::new();
81 let api = SecurityMonitoringAPI::with_config(configuration);
82 let resp = api.create_security_monitoring_rule(body).await;
83 if let Ok(value) = resp {
84 println!("{:#?}", value);
85 } else {
86 println!("{:#?}", resp.unwrap_err());
87 }
88}
Sourcepub fn notifications(self, value: Vec<String>) -> Self
pub fn notifications(self, value: Vec<String>) -> Self
Examples found in repository?
examples/v2_security-monitoring_CreateSecurityMonitoringRule_1092490364.rs (line 25)
17async fn main() {
18 let body =
19 SecurityMonitoringRuleCreatePayload::CloudConfigurationRuleCreatePayload(
20 Box::new(
21 CloudConfigurationRuleCreatePayload::new(
22 vec![
23 CloudConfigurationRuleCaseCreate::new(
24 SecurityMonitoringRuleSeverity::INFO,
25 ).notifications(vec!["channel".to_string()])
26 ],
27 CloudConfigurationRuleComplianceSignalOptions::new()
28 .user_activation_status(Some(true))
29 .user_group_by_fields(Some(vec!["@account_id".to_string()])),
30 false,
31 "ddd".to_string(),
32 "Example-Security-Monitoring_cloud".to_string(),
33 CloudConfigurationRuleOptions::new(
34 CloudConfigurationComplianceRuleOptions::new()
35 .complex_rule(false)
36 .rego_rule(
37 CloudConfigurationRegoRule::new(
38 r#"package datadog
39
40import data.datadog.output as dd_output
41
42import future.keywords.contains
43import future.keywords.if
44import future.keywords.in
45
46milliseconds_in_a_day := ((1000 * 60) * 60) * 24
47
48eval(iam_service_account_key) = "skip" if {
49 iam_service_account_key.disabled
50} else = "pass" if {
51 (iam_service_account_key.resource_seen_at / milliseconds_in_a_day) - (iam_service_account_key.valid_after_time / milliseconds_in_a_day) <= 90
52} else = "fail"
53
54# This part remains unchanged for all rules
55results contains result if {
56 some resource in input.resources[input.main_resource_type]
57 result := dd_output.format(resource, eval(resource))
58}
59"#.to_string(),
60 vec!["gcp_compute_disk".to_string()],
61 ),
62 )
63 .resource_type("gcp_compute_disk".to_string()),
64 ),
65 )
66 .filters(
67 vec![
68 SecurityMonitoringFilter::new()
69 .action(SecurityMonitoringFilterAction::REQUIRE)
70 .query("resource_id:helo*".to_string()),
71 SecurityMonitoringFilter::new()
72 .action(SecurityMonitoringFilterAction::SUPPRESS)
73 .query("control:helo*".to_string())
74 ],
75 )
76 .tags(vec!["my:tag".to_string()])
77 .type_(CloudConfigurationRuleType::CLOUD_CONFIGURATION),
78 ),
79 );
80 let configuration = datadog::Configuration::new();
81 let api = SecurityMonitoringAPI::with_config(configuration);
82 let resp = api.create_security_monitoring_rule(body).await;
83 if let Ok(value) = resp {
84 println!("{:#?}", value);
85 } else {
86 println!("{:#?}", resp.unwrap_err());
87 }
88}
pub fn additional_properties(self, value: BTreeMap<String, Value>) -> Self
Trait Implementations§
Source§impl Clone for CloudConfigurationRuleCaseCreate
impl Clone for CloudConfigurationRuleCaseCreate
Source§fn clone(&self) -> CloudConfigurationRuleCaseCreate
fn clone(&self) -> CloudConfigurationRuleCaseCreate
Returns a duplicate of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source
. Read moreSource§impl<'de> Deserialize<'de> for CloudConfigurationRuleCaseCreate
impl<'de> Deserialize<'de> for CloudConfigurationRuleCaseCreate
Source§fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>where
D: Deserializer<'de>,
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>where
D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read more
Source§impl PartialEq for CloudConfigurationRuleCaseCreate
impl PartialEq for CloudConfigurationRuleCaseCreate
Source§fn eq(&self, other: &CloudConfigurationRuleCaseCreate) -> bool
fn eq(&self, other: &CloudConfigurationRuleCaseCreate) -> bool
Tests for
self
and other
values to be equal, and is used by ==
.impl StructuralPartialEq for CloudConfigurationRuleCaseCreate
Auto Trait Implementations§
impl Freeze for CloudConfigurationRuleCaseCreate
impl RefUnwindSafe for CloudConfigurationRuleCaseCreate
impl Send for CloudConfigurationRuleCaseCreate
impl Sync for CloudConfigurationRuleCaseCreate
impl Unpin for CloudConfigurationRuleCaseCreate
impl UnwindSafe for CloudConfigurationRuleCaseCreate
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more