#[non_exhaustive]pub struct CloudConfigurationRuleCreatePayload {
pub cases: Vec<CloudConfigurationRuleCaseCreate>,
pub compliance_signal_options: CloudConfigurationRuleComplianceSignalOptions,
pub filters: Option<Vec<SecurityMonitoringFilter>>,
pub is_enabled: bool,
pub message: String,
pub name: String,
pub options: CloudConfigurationRuleOptions,
pub tags: Option<Vec<String>>,
pub type_: Option<CloudConfigurationRuleType>,
pub additional_properties: BTreeMap<String, Value>,
/* private fields */
}
Expand description
Create a new cloud configuration rule.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.cases: Vec<CloudConfigurationRuleCaseCreate>
Description of generated findings and signals (severity and channels to be notified in case of a signal). Must contain exactly one item.
compliance_signal_options: CloudConfigurationRuleComplianceSignalOptions
How to generate compliance signals. Useful for cloud_configuration rules only.
filters: Option<Vec<SecurityMonitoringFilter>>
Additional queries to filter matched events before they are processed.
is_enabled: bool
Whether the rule is enabled.
message: String
Message in markdown format for generated findings and signals.
name: String
The name of the rule.
options: CloudConfigurationRuleOptions
Options on cloud configuration rules.
Tags for generated findings and signals.
type_: Option<CloudConfigurationRuleType>
The rule type.
additional_properties: BTreeMap<String, Value>
Implementations§
Source§impl CloudConfigurationRuleCreatePayload
impl CloudConfigurationRuleCreatePayload
Sourcepub fn new(
cases: Vec<CloudConfigurationRuleCaseCreate>,
compliance_signal_options: CloudConfigurationRuleComplianceSignalOptions,
is_enabled: bool,
message: String,
name: String,
options: CloudConfigurationRuleOptions,
) -> CloudConfigurationRuleCreatePayload
pub fn new( cases: Vec<CloudConfigurationRuleCaseCreate>, compliance_signal_options: CloudConfigurationRuleComplianceSignalOptions, is_enabled: bool, message: String, name: String, options: CloudConfigurationRuleOptions, ) -> CloudConfigurationRuleCreatePayload
Examples found in repository?
examples/v2_security-monitoring_CreateSecurityMonitoringRule_1092490364.rs (lines 21-65)
17async fn main() {
18 let body =
19 SecurityMonitoringRuleCreatePayload::CloudConfigurationRuleCreatePayload(
20 Box::new(
21 CloudConfigurationRuleCreatePayload::new(
22 vec![
23 CloudConfigurationRuleCaseCreate::new(
24 SecurityMonitoringRuleSeverity::INFO,
25 ).notifications(vec!["channel".to_string()])
26 ],
27 CloudConfigurationRuleComplianceSignalOptions::new()
28 .user_activation_status(Some(true))
29 .user_group_by_fields(Some(vec!["@account_id".to_string()])),
30 false,
31 "ddd".to_string(),
32 "Example-Security-Monitoring_cloud".to_string(),
33 CloudConfigurationRuleOptions::new(
34 CloudConfigurationComplianceRuleOptions::new()
35 .complex_rule(false)
36 .rego_rule(
37 CloudConfigurationRegoRule::new(
38 r#"package datadog
39
40import data.datadog.output as dd_output
41
42import future.keywords.contains
43import future.keywords.if
44import future.keywords.in
45
46milliseconds_in_a_day := ((1000 * 60) * 60) * 24
47
48eval(iam_service_account_key) = "skip" if {
49 iam_service_account_key.disabled
50} else = "pass" if {
51 (iam_service_account_key.resource_seen_at / milliseconds_in_a_day) - (iam_service_account_key.valid_after_time / milliseconds_in_a_day) <= 90
52} else = "fail"
53
54# This part remains unchanged for all rules
55results contains result if {
56 some resource in input.resources[input.main_resource_type]
57 result := dd_output.format(resource, eval(resource))
58}
59"#.to_string(),
60 vec!["gcp_compute_disk".to_string()],
61 ),
62 )
63 .resource_type("gcp_compute_disk".to_string()),
64 ),
65 )
66 .filters(
67 vec![
68 SecurityMonitoringFilter::new()
69 .action(SecurityMonitoringFilterAction::REQUIRE)
70 .query("resource_id:helo*".to_string()),
71 SecurityMonitoringFilter::new()
72 .action(SecurityMonitoringFilterAction::SUPPRESS)
73 .query("control:helo*".to_string())
74 ],
75 )
76 .tags(vec!["my:tag".to_string()])
77 .type_(CloudConfigurationRuleType::CLOUD_CONFIGURATION),
78 ),
79 );
80 let configuration = datadog::Configuration::new();
81 let api = SecurityMonitoringAPI::with_config(configuration);
82 let resp = api.create_security_monitoring_rule(body).await;
83 if let Ok(value) = resp {
84 println!("{:#?}", value);
85 } else {
86 println!("{:#?}", resp.unwrap_err());
87 }
88}
Sourcepub fn filters(self, value: Vec<SecurityMonitoringFilter>) -> Self
pub fn filters(self, value: Vec<SecurityMonitoringFilter>) -> Self
Examples found in repository?
examples/v2_security-monitoring_CreateSecurityMonitoringRule_1092490364.rs (lines 66-75)
17async fn main() {
18 let body =
19 SecurityMonitoringRuleCreatePayload::CloudConfigurationRuleCreatePayload(
20 Box::new(
21 CloudConfigurationRuleCreatePayload::new(
22 vec![
23 CloudConfigurationRuleCaseCreate::new(
24 SecurityMonitoringRuleSeverity::INFO,
25 ).notifications(vec!["channel".to_string()])
26 ],
27 CloudConfigurationRuleComplianceSignalOptions::new()
28 .user_activation_status(Some(true))
29 .user_group_by_fields(Some(vec!["@account_id".to_string()])),
30 false,
31 "ddd".to_string(),
32 "Example-Security-Monitoring_cloud".to_string(),
33 CloudConfigurationRuleOptions::new(
34 CloudConfigurationComplianceRuleOptions::new()
35 .complex_rule(false)
36 .rego_rule(
37 CloudConfigurationRegoRule::new(
38 r#"package datadog
39
40import data.datadog.output as dd_output
41
42import future.keywords.contains
43import future.keywords.if
44import future.keywords.in
45
46milliseconds_in_a_day := ((1000 * 60) * 60) * 24
47
48eval(iam_service_account_key) = "skip" if {
49 iam_service_account_key.disabled
50} else = "pass" if {
51 (iam_service_account_key.resource_seen_at / milliseconds_in_a_day) - (iam_service_account_key.valid_after_time / milliseconds_in_a_day) <= 90
52} else = "fail"
53
54# This part remains unchanged for all rules
55results contains result if {
56 some resource in input.resources[input.main_resource_type]
57 result := dd_output.format(resource, eval(resource))
58}
59"#.to_string(),
60 vec!["gcp_compute_disk".to_string()],
61 ),
62 )
63 .resource_type("gcp_compute_disk".to_string()),
64 ),
65 )
66 .filters(
67 vec![
68 SecurityMonitoringFilter::new()
69 .action(SecurityMonitoringFilterAction::REQUIRE)
70 .query("resource_id:helo*".to_string()),
71 SecurityMonitoringFilter::new()
72 .action(SecurityMonitoringFilterAction::SUPPRESS)
73 .query("control:helo*".to_string())
74 ],
75 )
76 .tags(vec!["my:tag".to_string()])
77 .type_(CloudConfigurationRuleType::CLOUD_CONFIGURATION),
78 ),
79 );
80 let configuration = datadog::Configuration::new();
81 let api = SecurityMonitoringAPI::with_config(configuration);
82 let resp = api.create_security_monitoring_rule(body).await;
83 if let Ok(value) = resp {
84 println!("{:#?}", value);
85 } else {
86 println!("{:#?}", resp.unwrap_err());
87 }
88}
Examples found in repository?
examples/v2_security-monitoring_CreateSecurityMonitoringRule_1092490364.rs (line 76)
17async fn main() {
18 let body =
19 SecurityMonitoringRuleCreatePayload::CloudConfigurationRuleCreatePayload(
20 Box::new(
21 CloudConfigurationRuleCreatePayload::new(
22 vec![
23 CloudConfigurationRuleCaseCreate::new(
24 SecurityMonitoringRuleSeverity::INFO,
25 ).notifications(vec!["channel".to_string()])
26 ],
27 CloudConfigurationRuleComplianceSignalOptions::new()
28 .user_activation_status(Some(true))
29 .user_group_by_fields(Some(vec!["@account_id".to_string()])),
30 false,
31 "ddd".to_string(),
32 "Example-Security-Monitoring_cloud".to_string(),
33 CloudConfigurationRuleOptions::new(
34 CloudConfigurationComplianceRuleOptions::new()
35 .complex_rule(false)
36 .rego_rule(
37 CloudConfigurationRegoRule::new(
38 r#"package datadog
39
40import data.datadog.output as dd_output
41
42import future.keywords.contains
43import future.keywords.if
44import future.keywords.in
45
46milliseconds_in_a_day := ((1000 * 60) * 60) * 24
47
48eval(iam_service_account_key) = "skip" if {
49 iam_service_account_key.disabled
50} else = "pass" if {
51 (iam_service_account_key.resource_seen_at / milliseconds_in_a_day) - (iam_service_account_key.valid_after_time / milliseconds_in_a_day) <= 90
52} else = "fail"
53
54# This part remains unchanged for all rules
55results contains result if {
56 some resource in input.resources[input.main_resource_type]
57 result := dd_output.format(resource, eval(resource))
58}
59"#.to_string(),
60 vec!["gcp_compute_disk".to_string()],
61 ),
62 )
63 .resource_type("gcp_compute_disk".to_string()),
64 ),
65 )
66 .filters(
67 vec![
68 SecurityMonitoringFilter::new()
69 .action(SecurityMonitoringFilterAction::REQUIRE)
70 .query("resource_id:helo*".to_string()),
71 SecurityMonitoringFilter::new()
72 .action(SecurityMonitoringFilterAction::SUPPRESS)
73 .query("control:helo*".to_string())
74 ],
75 )
76 .tags(vec!["my:tag".to_string()])
77 .type_(CloudConfigurationRuleType::CLOUD_CONFIGURATION),
78 ),
79 );
80 let configuration = datadog::Configuration::new();
81 let api = SecurityMonitoringAPI::with_config(configuration);
82 let resp = api.create_security_monitoring_rule(body).await;
83 if let Ok(value) = resp {
84 println!("{:#?}", value);
85 } else {
86 println!("{:#?}", resp.unwrap_err());
87 }
88}
Sourcepub fn type_(self, value: CloudConfigurationRuleType) -> Self
pub fn type_(self, value: CloudConfigurationRuleType) -> Self
Examples found in repository?
examples/v2_security-monitoring_CreateSecurityMonitoringRule_1092490364.rs (line 77)
17async fn main() {
18 let body =
19 SecurityMonitoringRuleCreatePayload::CloudConfigurationRuleCreatePayload(
20 Box::new(
21 CloudConfigurationRuleCreatePayload::new(
22 vec![
23 CloudConfigurationRuleCaseCreate::new(
24 SecurityMonitoringRuleSeverity::INFO,
25 ).notifications(vec!["channel".to_string()])
26 ],
27 CloudConfigurationRuleComplianceSignalOptions::new()
28 .user_activation_status(Some(true))
29 .user_group_by_fields(Some(vec!["@account_id".to_string()])),
30 false,
31 "ddd".to_string(),
32 "Example-Security-Monitoring_cloud".to_string(),
33 CloudConfigurationRuleOptions::new(
34 CloudConfigurationComplianceRuleOptions::new()
35 .complex_rule(false)
36 .rego_rule(
37 CloudConfigurationRegoRule::new(
38 r#"package datadog
39
40import data.datadog.output as dd_output
41
42import future.keywords.contains
43import future.keywords.if
44import future.keywords.in
45
46milliseconds_in_a_day := ((1000 * 60) * 60) * 24
47
48eval(iam_service_account_key) = "skip" if {
49 iam_service_account_key.disabled
50} else = "pass" if {
51 (iam_service_account_key.resource_seen_at / milliseconds_in_a_day) - (iam_service_account_key.valid_after_time / milliseconds_in_a_day) <= 90
52} else = "fail"
53
54# This part remains unchanged for all rules
55results contains result if {
56 some resource in input.resources[input.main_resource_type]
57 result := dd_output.format(resource, eval(resource))
58}
59"#.to_string(),
60 vec!["gcp_compute_disk".to_string()],
61 ),
62 )
63 .resource_type("gcp_compute_disk".to_string()),
64 ),
65 )
66 .filters(
67 vec![
68 SecurityMonitoringFilter::new()
69 .action(SecurityMonitoringFilterAction::REQUIRE)
70 .query("resource_id:helo*".to_string()),
71 SecurityMonitoringFilter::new()
72 .action(SecurityMonitoringFilterAction::SUPPRESS)
73 .query("control:helo*".to_string())
74 ],
75 )
76 .tags(vec!["my:tag".to_string()])
77 .type_(CloudConfigurationRuleType::CLOUD_CONFIGURATION),
78 ),
79 );
80 let configuration = datadog::Configuration::new();
81 let api = SecurityMonitoringAPI::with_config(configuration);
82 let resp = api.create_security_monitoring_rule(body).await;
83 if let Ok(value) = resp {
84 println!("{:#?}", value);
85 } else {
86 println!("{:#?}", resp.unwrap_err());
87 }
88}
pub fn additional_properties(self, value: BTreeMap<String, Value>) -> Self
Trait Implementations§
Source§impl Clone for CloudConfigurationRuleCreatePayload
impl Clone for CloudConfigurationRuleCreatePayload
Source§fn clone(&self) -> CloudConfigurationRuleCreatePayload
fn clone(&self) -> CloudConfigurationRuleCreatePayload
Returns a duplicate of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source
. Read moreSource§impl<'de> Deserialize<'de> for CloudConfigurationRuleCreatePayload
impl<'de> Deserialize<'de> for CloudConfigurationRuleCreatePayload
Source§fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>where
D: Deserializer<'de>,
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>where
D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read more
Source§impl PartialEq for CloudConfigurationRuleCreatePayload
impl PartialEq for CloudConfigurationRuleCreatePayload
Source§fn eq(&self, other: &CloudConfigurationRuleCreatePayload) -> bool
fn eq(&self, other: &CloudConfigurationRuleCreatePayload) -> bool
Tests for
self
and other
values to be equal, and is used by ==
.impl StructuralPartialEq for CloudConfigurationRuleCreatePayload
Auto Trait Implementations§
impl Freeze for CloudConfigurationRuleCreatePayload
impl RefUnwindSafe for CloudConfigurationRuleCreatePayload
impl Send for CloudConfigurationRuleCreatePayload
impl Sync for CloudConfigurationRuleCreatePayload
impl Unpin for CloudConfigurationRuleCreatePayload
impl UnwindSafe for CloudConfigurationRuleCreatePayload
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more