File tree Expand file tree Collapse file tree 4 files changed +20
-6
lines changed Expand file tree Collapse file tree 4 files changed +20
-6
lines changed Original file line number Diff line number Diff line change @@ -15,6 +15,10 @@ Creates a Sysdig Secure Custom Policy.
1515## Example Usage
1616
1717``` terraform
18+ data "sysdig_secure_notification_channel" "email_notification_channel" {
19+ name = "Test Email Channel"
20+ }
21+
1822resource "sysdig_secure_custom_policy" "write_apt_database" {
1923 name = "Write apt database"
2024 description = "an attempt to write to the dpkg database by any non-dpkg related program"
@@ -40,8 +44,7 @@ resource "sysdig_secure_custom_policy" "write_apt_database" {
4044 }
4145 }
4246
43- notification_channels = [10000]
44-
47+ notification_channels = [data.sysdig_secure_notification_channel.email_notification_channel.id]
4548}
4649```
4750
Original file line number Diff line number Diff line change @@ -18,6 +18,10 @@ allows you to identify and configure a managed policy. The managed policy is loo
1818## Example Usage
1919
2020``` terraform
21+ data "sysdig_secure_notification_channel" "email_notification_channel" {
22+ name = "Test Email Channel"
23+ }
24+
2125resource "sysdig_secure_managed_policy" "sysdig_runtime_threat_detection" {
2226 name = "Sysdig Runtime Threat Detection"
2327 type = "falco"
@@ -38,7 +42,7 @@ resource "sysdig_secure_managed_policy" "sysdig_runtime_threat_detection" {
3842 }
3943 }
4044
41- notification_channels = [10000 ]
45+ notification_channels = [data.sysdig_secure_notification_channel.email_notification_channel.id ]
4246}
4347```
4448
Original file line number Diff line number Diff line change @@ -15,6 +15,10 @@ Creates a Sysdig Secure Managed Ruleset
1515## Example Usage
1616
1717``` terraform
18+ data "sysdig_secure_notification_channel" "email_notification_channel" {
19+ name = "Test Email Channel"
20+ }
21+
1822resource "sysdig_secure_managed_ruleset" "sysdig_runtime_threat_detection_managed_ruleset" {
1923 name = "Sysdig Runtime Threat Detection - Managed Ruleset"
2024 description = "Managed ruleset for Sysdig Runtime Threat Detection"
@@ -40,7 +44,7 @@ resource "sysdig_secure_managed_ruleset" "sysdig_runtime_threat_detection_manage
4044 }
4145 }
4246
43- notification_channels = [10000 ]
47+ notification_channels = [data.sysdig_secure_notification_channel.email_notification_channel.id ]
4448}
4549```
4650
Original file line number Diff line number Diff line change @@ -19,6 +19,10 @@ of policy.
1919## Example Usage
2020
2121``` terraform
22+ data "sysdig_secure_notification_channel" "email_notification_channel" {
23+ name = "Test Email Channel"
24+ }
25+
2226resource "sysdig_secure_policy" "write_apt_database" {
2327 name = "Write apt database"
2428 description = "an attempt to write to the dpkg database by any non-dpkg related program"
@@ -40,8 +44,7 @@ resource "sysdig_secure_policy" "write_apt_database" {
4044 }
4145 }
4246
43- notification_channels = [10000]
44-
47+ notification_channels = [data.sysdig_secure_notification_channel.email_notification_channel.id]
4548}
4649```
4750
You can’t perform that action at this time.
0 commit comments