Skip to content

Commit 68cab2a

Browse files
authored
switch out rule in managed secure policy tests (#610)
1 parent 9b16919 commit 68cab2a

4 files changed

+10
-10
lines changed

sysdig/resource_sysdig_secure_managed_policy_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ resource "sysdig_secure_managed_policy" "sample" {
5656
name = "Sysdig Runtime Threat Detection"
5757
enabled = true
5858
scope = "container.id != \"\""
59-
disabled_rules = ["Dump memory for credentials"]
59+
disabled_rules = ["Hexadecimal string detected"]
6060
runbook = "https://sysdig.com"
6161
6262
actions {
@@ -80,7 +80,7 @@ resource "sysdig_secure_managed_policy" "sample" {
8080
name = "Sysdig Runtime Threat Detection"
8181
enabled = true
8282
scope = "container.id != \"\""
83-
disabled_rules = ["Dump memory for credentials"]
83+
disabled_rules = ["Hexadecimal string detected"]
8484
runbook = "https://sysdig.com"
8585
8686
actions {}
@@ -96,7 +96,7 @@ resource "sysdig_secure_managed_policy" "sample" {
9696
name = "Sysdig Runtime Threat Detection"
9797
enabled = true
9898
scope = "container.id != \"\""
99-
disabled_rules = ["Dump memory for credentials"]
99+
disabled_rules = ["Hexadecimal string detected"]
100100
runbook = "https://sysdig.com"
101101
102102
actions {
@@ -123,7 +123,7 @@ func managedPolicyWithKillAction() string {
123123
name = "Sysdig Runtime Threat Detection"
124124
enabled = true
125125
scope = "container.id != \"\""
126-
disabled_rules = ["Dump memory for credentials"]
126+
disabled_rules = ["Hexadecimal string detected"]
127127
runbook = "https://sysdig.com"
128128
129129
actions {

sysdig/resource_sysdig_secure_managed_ruleset_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
6666
}
6767
enabled = true
6868
scope = "container.id != \"\""
69-
disabled_rules = ["Dump memory for credentials"]
69+
disabled_rules = ["Hexadecimal string detected"]
7070
runbook = "https://sysdig.com"
7171
7272
actions {
@@ -95,7 +95,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
9595
}
9696
enabled = true
9797
scope = "container.id != \"\""
98-
disabled_rules = ["Dump memory for credentials"]
98+
disabled_rules = ["Hexadecimal string detected"]
9999
runbook = "https://sysdig.com"
100100
101101
actions {}
@@ -116,7 +116,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
116116
}
117117
enabled = true
118118
scope = "container.id != \"\""
119-
disabled_rules = ["Dump memory for credentials"]
119+
disabled_rules = ["Hexadecimal string detected"]
120120
runbook = "https://sysdig.com"
121121
122122
actions {
@@ -154,7 +154,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
154154
}
155155
enabled = true
156156
scope = "container.id != \"\""
157-
disabled_rules = ["Dump memory for credentials"]
157+
disabled_rules = ["Hexadecimal string detected"]
158158
runbook = "https://sysdig.com"
159159
160160
actions {

website/docs/r/secure_managed_policy.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ resource "sysdig_secure_managed_policy" "sysdig_runtime_threat_detection" {
3232
scope = "container.id != \"\""
3333
3434
// Disabling rules
35-
disabled_rules = ["Dump memory for credentials"]
35+
disabled_rules = ["Hexadecimal string detected"]
3636
3737
actions {
3838
container = "stop"

website/docs/r/secure_managed_ruleset.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ resource "sysdig_secure_managed_ruleset" "sysdig_runtime_threat_detection_manage
3434
scope = "container.id != \"\""
3535
3636
// Disabling rules
37-
disabled_rules = ["Dump memory for credentials"]
37+
disabled_rules = ["Hexadecimal string detected"]
3838
3939
actions {
4040
container = "stop"

0 commit comments

Comments
 (0)