|
| 1 | +--- |
| 2 | +subcategory: "Sysdig Secure" |
| 3 | +layout: "sysdig" |
| 4 | +page_title: "Sysdig: sysdig_secure_managed_ruleset" |
| 5 | +description: |- |
| 6 | + Retrieves a Sysdig Secure Managed Ruleset. |
| 7 | +--- |
| 8 | + |
| 9 | +# sysdig_secure_managed_ruleset |
| 10 | + |
| 11 | +Retrieves the information of an existing Sysdig Secure Managed Ruleset. |
| 12 | + |
| 13 | +-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository. |
| 14 | + |
| 15 | +## Example Usage |
| 16 | + |
| 17 | +```terraform |
| 18 | +data "sysdig_secure_managed_ruleset" "example" { |
| 19 | + name = "Sysdig Runtime Threat Detection - Managed Ruleset" |
| 20 | + type = "falco" |
| 21 | +} |
| 22 | +``` |
| 23 | + |
| 24 | +## Argument Reference |
| 25 | + |
| 26 | +* `name` - (Required) The name of the Secure managed ruleset. |
| 27 | + |
| 28 | +* `type` - (Optional) Specifies the type of the runtime policy. Must be one of: `falco`, `list_matching`, `k8s_audit`, |
| 29 | + `aws_cloudtrail`, `gcp_auditlog`, `azure_platformlogs`. By default it is `falco`. |
| 30 | + |
| 31 | +## Attributes Reference |
| 32 | + |
| 33 | +In addition to all arguments above, the following attributes are exported: |
| 34 | + |
| 35 | +* `id` - The id for the managed policy. |
| 36 | + |
| 37 | +* `description` - The description for the managed policy. |
| 38 | + |
| 39 | +* `severity` - The severity of Secure policy. The accepted values |
| 40 | + are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). |
| 41 | + |
| 42 | +* `enabled` - Whether the policy is enabled or not. |
| 43 | + |
| 44 | +* `runbook` - Customer provided url that provides a runbook for a given policy. |
| 45 | + |
| 46 | +* `scope` - The application scope for the policy. |
| 47 | + |
| 48 | +* `rules` - An array of rules with the properties `name` and `enabled` to identify the rule name and whether it is enabled. |
| 49 | + |
| 50 | +* `notification_channels` - IDs of the notification channels to send alerts to |
| 51 | + when the policy is fired. |
| 52 | + |
| 53 | +### Actions block |
| 54 | + |
| 55 | +The actions block is optional and supports: |
| 56 | + |
| 57 | +* `container` - (Optional) The action applied to container when this Policy is |
| 58 | + triggered. Can be *stop*, *pause* or *kill*. If this is not specified, |
| 59 | + no action will be applied at the container level. |
| 60 | + |
| 61 | +* `capture` - (Optional) Captures with Sysdig the stream of system calls: |
| 62 | + * `seconds_before_event` - (Required) Captures the system calls during the |
| 63 | + amount of seconds before the policy was triggered. |
| 64 | + * `seconds_after_event` - (Required) Captures the system calls for the amount |
| 65 | + of seconds after the policy was triggered. |
| 66 | + * `name` - (Optional) The name of the capture file |
0 commit comments