subcategory | layout | page_title | description |
---|---|---|---|
Sysdig Secure |
sysdig |
Sysdig: sysdig_secure_managed_policy |
Manages configuration of a Sysdig Secure Managed Policy. |
Manages configuration of a Sysdig Secure Managed Policy.
-> Note: Sysdig managed policies are not resources that you create. They are provided by Sysdig. This resource allows you to identify and configure a managed policy. The managed policy is looked up by its name and type.
-> Note: Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a new issue in the GitHub repository.
data "sysdig_secure_notification_channel" "email_notification_channel" {
name = "Test Email Channel"
}
resource "sysdig_secure_managed_policy" "sysdig_runtime_threat_detection" {
name = "Sysdig Runtime Threat Detection"
type = "falco"
enabled = true
runbook = "https://runbook.com"
// Scope selection
scope = "container.id != \"\""
// Disabling rules
disabled_rules = ["Hexadecimal string detected"]
actions {
container = "stop"
capture {
seconds_before_event = 5
seconds_after_event = 10
}
}
notification_channels = [data.sysdig_secure_notification_channel.email_notification_channel.id]
}
-
name
- (Required) The name of the Secure managed policy. It must match the name of an existing managed policy. -
type
- (Optional) Specifies the type of the runtime policy. Must be one of:falco
,list_matching
,k8s_audit
,aws_cloudtrail
,gcp_auditlog
,azure_platformlogs
,awscloudtrail
,okta
,github
,guardduty
. By default it isfalco
. -
enabled
- (Optional) Will secure process with this policy?. By default this is true. -
runbook
- (Optional) Customer provided url that provides a runbook for a given policy.
scope
- (Optional) Limit application scope based in one expression. For example: "host.ip.private = \"10.0.23.1\"". By default the rule won't be scoped and will target the entire infrastructure.
The actions block is optional and supports:
-
container
- (Optional) The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level. -
capture
- (Optional) Captures with Sysdig the stream of system calls:seconds_before_event
- (Required) Captures the system calls during the amount of seconds before the policy was triggered.seconds_after_event
- (Required) Captures the system calls for the amount of seconds after the policy was triggered.name
- (Required) The name of the capture filefilter
- (Optional) Additional filter to apply to the capture. For example:proc.name=cat
bucket_name
- (Optional) Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storagefolder
- (Optional) Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket
disabled_rules
- (Optional) Array with the name of the rules in the managed policy to disable.
notification_channels
- (Optional) IDs of the notification channels to send alerts to when the policy is fired.
No additional attributes are exported.