@@ -103,6 +103,8 @@ resource "sysdig_secure_policy" "sample2" {
103103 rule_names = [sysdig_secure_rule_falco.terminal_shell.name]
104104
105105 notification_channels = [sysdig_secure_notification_channel_email.sample_email.id]
106+
107+ actions {}
106108}
107109` , secureNotificationChannelEmailWithName (name ), ruleFalcoTerminalShell (name ), name , name )
108110}
@@ -116,6 +118,7 @@ resource "sysdig_secure_policy" "sample3" {
116118 severity = 4
117119 scope = "container.id != \"\""
118120 rule_names = ["Terminal shell in container"]
121+ actions {}
119122}
120123` , name , name )
121124}
@@ -125,6 +128,7 @@ func policyWithMinimumConfiguration(name string) string {
125128resource "sysdig_secure_policy" "sample4" {
126129 name = "TERRAFORM TEST 4 %s"
127130 description = "TERRAFORM TEST %s"
131+ actions {}
128132}
129133` , name , name )
130134}
@@ -178,6 +182,7 @@ resource "sysdig_secure_policy" "sample4" {
178182 name = "TERRAFORM TEST 4 %s"
179183 description = "TERRAFORM TEST %s"
180184 type = "aws_cloudtrail"
185+ actions {}
181186}
182187` , name , name )
183188}
@@ -188,6 +193,7 @@ resource "sysdig_secure_policy" "sample5" {
188193 name = "TERRAFORM TEST %s"
189194 description = "TERRAFORM TEST %s"
190195 type = "gcp_auditlog"
196+ actions {}
191197}
192198` , name , name )
193199}
@@ -198,6 +204,7 @@ resource "sysdig_secure_policy" "sample6" {
198204 name = "TERRAFORM TEST %s"
199205 description = "TERRAFORM TEST %s"
200206 type = "azure_platformlogs"
207+ actions {}
201208}
202209` , name , name )
203210}
0 commit comments