From e10dcb38d0743f1c0b7e92d35e8609ead7daa740 Mon Sep 17 00:00:00 2001 From: kmvachhani Date: Wed, 12 Mar 2025 10:42:20 -0700 Subject: [PATCH] switch out rule in managed secure policy tests --- sysdig/resource_sysdig_secure_managed_policy_test.go | 8 ++++---- sysdig/resource_sysdig_secure_managed_ruleset_test.go | 8 ++++---- website/docs/r/secure_managed_policy.md | 2 +- website/docs/r/secure_managed_ruleset.md | 2 +- 4 files changed, 10 insertions(+), 10 deletions(-) diff --git a/sysdig/resource_sysdig_secure_managed_policy_test.go b/sysdig/resource_sysdig_secure_managed_policy_test.go index 04aaa3ba..a873f4f0 100644 --- a/sysdig/resource_sysdig_secure_managed_policy_test.go +++ b/sysdig/resource_sysdig_secure_managed_policy_test.go @@ -56,7 +56,7 @@ resource "sysdig_secure_managed_policy" "sample" { name = "Sysdig Runtime Threat Detection" enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions { @@ -80,7 +80,7 @@ resource "sysdig_secure_managed_policy" "sample" { name = "Sysdig Runtime Threat Detection" enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions {} @@ -96,7 +96,7 @@ resource "sysdig_secure_managed_policy" "sample" { name = "Sysdig Runtime Threat Detection" enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions { @@ -123,7 +123,7 @@ func managedPolicyWithKillAction() string { name = "Sysdig Runtime Threat Detection" enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions { diff --git a/sysdig/resource_sysdig_secure_managed_ruleset_test.go b/sysdig/resource_sysdig_secure_managed_ruleset_test.go index cc3d0664..98dbdce9 100644 --- a/sysdig/resource_sysdig_secure_managed_ruleset_test.go +++ b/sysdig/resource_sysdig_secure_managed_ruleset_test.go @@ -66,7 +66,7 @@ resource "sysdig_secure_managed_ruleset" "sample" { } enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions { @@ -95,7 +95,7 @@ resource "sysdig_secure_managed_ruleset" "sample" { } enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions {} @@ -116,7 +116,7 @@ resource "sysdig_secure_managed_ruleset" "sample" { } enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions { @@ -154,7 +154,7 @@ resource "sysdig_secure_managed_ruleset" "sample" { } enabled = true scope = "container.id != \"\"" - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] runbook = "https://sysdig.com" actions { diff --git a/website/docs/r/secure_managed_policy.md b/website/docs/r/secure_managed_policy.md index ac14bff7..bd30bbdd 100644 --- a/website/docs/r/secure_managed_policy.md +++ b/website/docs/r/secure_managed_policy.md @@ -32,7 +32,7 @@ resource "sysdig_secure_managed_policy" "sysdig_runtime_threat_detection" { scope = "container.id != \"\"" // Disabling rules - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] actions { container = "stop" diff --git a/website/docs/r/secure_managed_ruleset.md b/website/docs/r/secure_managed_ruleset.md index edbc43d0..d2d826d0 100644 --- a/website/docs/r/secure_managed_ruleset.md +++ b/website/docs/r/secure_managed_ruleset.md @@ -34,7 +34,7 @@ resource "sysdig_secure_managed_ruleset" "sysdig_runtime_threat_detection_manage scope = "container.id != \"\"" // Disabling rules - disabled_rules = ["Dump memory for credentials"] + disabled_rules = ["Hexadecimal string detected"] actions { container = "stop"