AlertRuleScheduled
Manages a Sentinel Scheduled Alert Rule.
Example Usage
using Pulumi;
using Azure = Pulumi.Azure;
class MyStack : Stack
{
public MyStack()
{
var exampleResourceGroup = new Azure.Core.ResourceGroup("exampleResourceGroup", new Azure.Core.ResourceGroupArgs
{
Location = "West Europe",
});
var exampleAnalyticsWorkspace = new Azure.OperationalInsights.AnalyticsWorkspace("exampleAnalyticsWorkspace", new Azure.OperationalInsights.AnalyticsWorkspaceArgs
{
Location = exampleResourceGroup.Location,
ResourceGroupName = exampleResourceGroup.Name,
Sku = "pergb2018",
});
var exampleAlertRuleScheduled = new Azure.Sentinel.AlertRuleScheduled("exampleAlertRuleScheduled", new Azure.Sentinel.AlertRuleScheduledArgs
{
LogAnalyticsWorkspaceId = exampleAnalyticsWorkspace.Id,
DisplayName = "example",
Severity = "High",
Query = @"AzureActivity |
where OperationName == ""Create or Update Virtual Machine"" or OperationName ==""Create Deployment"" |
where ActivityStatus == ""Succeeded"" |
make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller
",
});
}
}
package main
import (
"fmt"
"github.com/pulumi/pulumi-azure/sdk/v3/go/azure/core"
"github.com/pulumi/pulumi-azure/sdk/v3/go/azure/operationalinsights"
"github.com/pulumi/pulumi-azure/sdk/v3/go/azure/sentinel"
"github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
exampleResourceGroup, err := core.NewResourceGroup(ctx, "exampleResourceGroup", &core.ResourceGroupArgs{
Location: pulumi.String("West Europe"),
})
if err != nil {
return err
}
exampleAnalyticsWorkspace, err := operationalinsights.NewAnalyticsWorkspace(ctx, "exampleAnalyticsWorkspace", &operationalinsights.AnalyticsWorkspaceArgs{
Location: exampleResourceGroup.Location,
ResourceGroupName: exampleResourceGroup.Name,
Sku: pulumi.String("pergb2018"),
})
if err != nil {
return err
}
_, err = sentinel.NewAlertRuleScheduled(ctx, "exampleAlertRuleScheduled", &sentinel.AlertRuleScheduledArgs{
LogAnalyticsWorkspaceId: exampleAnalyticsWorkspace.ID(),
DisplayName: pulumi.String("example"),
Severity: pulumi.String("High"),
Query: pulumi.String(fmt.Sprintf("%v%v%v%v", "AzureActivity |\n", " where OperationName == \"Create or Update Virtual Machine\" or OperationName ==\"Create Deployment\" |\n", " where ActivityStatus == \"Succeeded\" |\n", " make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller\n")),
})
if err != nil {
return err
}
return nil
})
}import pulumi
import pulumi_azure as azure
example_resource_group = azure.core.ResourceGroup("exampleResourceGroup", location="West Europe")
example_analytics_workspace = azure.operationalinsights.AnalyticsWorkspace("exampleAnalyticsWorkspace",
location=example_resource_group.location,
resource_group_name=example_resource_group.name,
sku="pergb2018")
example_alert_rule_scheduled = azure.sentinel.AlertRuleScheduled("exampleAlertRuleScheduled",
log_analytics_workspace_id=example_analytics_workspace.id,
display_name="example",
severity="High",
query="""AzureActivity |
where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" |
where ActivityStatus == "Succeeded" |
make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller
""")import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const exampleResourceGroup = new azure.core.ResourceGroup("exampleResourceGroup", {location: "West Europe"});
const exampleAnalyticsWorkspace = new azure.operationalinsights.AnalyticsWorkspace("exampleAnalyticsWorkspace", {
location: exampleResourceGroup.location,
resourceGroupName: exampleResourceGroup.name,
sku: "pergb2018",
});
const exampleAlertRuleScheduled = new azure.sentinel.AlertRuleScheduled("exampleAlertRuleScheduled", {
logAnalyticsWorkspaceId: exampleAnalyticsWorkspace.id,
displayName: "example",
severity: "High",
query: `AzureActivity |
where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment" |
where ActivityStatus == "Succeeded" |
make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller
`,
});Create a AlertRuleScheduled Resource
new AlertRuleScheduled(name: string, args: AlertRuleScheduledArgs, opts?: CustomResourceOptions);def AlertRuleScheduled(resource_name, opts=None, description=None, display_name=None, enabled=None, log_analytics_workspace_id=None, name=None, query=None, query_frequency=None, query_period=None, severity=None, suppression_duration=None, suppression_enabled=None, tactics=None, trigger_operator=None, trigger_threshold=None, __props__=None);func NewAlertRuleScheduled(ctx *Context, name string, args AlertRuleScheduledArgs, opts ...ResourceOption) (*AlertRuleScheduled, error)public AlertRuleScheduled(string name, AlertRuleScheduledArgs args, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args AlertRuleScheduledArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AlertRuleScheduledArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AlertRuleScheduledArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
AlertRuleScheduled Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The AlertRuleScheduled resource accepts the following input properties:
- Display
Name string The friendly name of this Sentinel Scheduled Alert Rule.
- Log
Analytics stringWorkspace Id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Query string
The query of this Sentinel Scheduled Alert Rule.
- Severity string
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- Description string
The description of this Sentinel Scheduled Alert Rule.
- Enabled bool
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- Name string
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Query
Frequency string The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- Query
Period string The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- Suppression
Duration string If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- Suppression
Enabled bool Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- Tactics List<string>
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- Trigger
Operator string The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- Trigger
Threshold int The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
- Display
Name string The friendly name of this Sentinel Scheduled Alert Rule.
- Log
Analytics stringWorkspace Id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Query string
The query of this Sentinel Scheduled Alert Rule.
- Severity string
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- Description string
The description of this Sentinel Scheduled Alert Rule.
- Enabled bool
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- Name string
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Query
Frequency string The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- Query
Period string The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- Suppression
Duration string If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- Suppression
Enabled bool Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- Tactics []string
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- Trigger
Operator string The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- Trigger
Threshold int The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
- display
Name string The friendly name of this Sentinel Scheduled Alert Rule.
- log
Analytics stringWorkspace Id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- query string
The query of this Sentinel Scheduled Alert Rule.
- severity string
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- description string
The description of this Sentinel Scheduled Alert Rule.
- enabled boolean
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- name string
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- query
Frequency string The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- query
Period string The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- suppression
Duration string If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- suppression
Enabled boolean Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- tactics string[]
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- trigger
Operator string The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- trigger
Threshold number The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
- display_
name str The friendly name of this Sentinel Scheduled Alert Rule.
- log_
analytics_ strworkspace_ id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- query str
The query of this Sentinel Scheduled Alert Rule.
- severity str
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- description str
The description of this Sentinel Scheduled Alert Rule.
- enabled bool
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- name str
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- query_
frequency str The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- query_
period str The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- suppression_
duration str If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- suppression_
enabled bool Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- tactics List[str]
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- trigger_
operator str The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- trigger_
threshold float The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
Outputs
All input properties are implicitly available as output properties. Additionally, the AlertRuleScheduled resource produces the following output properties:
Look up an Existing AlertRuleScheduled Resource
Get an existing AlertRuleScheduled resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AlertRuleScheduledState, opts?: CustomResourceOptions): AlertRuleScheduledstatic get(resource_name, id, opts=None, description=None, display_name=None, enabled=None, log_analytics_workspace_id=None, name=None, query=None, query_frequency=None, query_period=None, severity=None, suppression_duration=None, suppression_enabled=None, tactics=None, trigger_operator=None, trigger_threshold=None, __props__=None);func GetAlertRuleScheduled(ctx *Context, name string, id IDInput, state *AlertRuleScheduledState, opts ...ResourceOption) (*AlertRuleScheduled, error)public static AlertRuleScheduled Get(string name, Input<string> id, AlertRuleScheduledState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Description string
The description of this Sentinel Scheduled Alert Rule.
- Display
Name string The friendly name of this Sentinel Scheduled Alert Rule.
- Enabled bool
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- Log
Analytics stringWorkspace Id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Name string
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Query string
The query of this Sentinel Scheduled Alert Rule.
- Query
Frequency string The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- Query
Period string The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- Severity string
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- Suppression
Duration string If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- Suppression
Enabled bool Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- Tactics List<string>
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- Trigger
Operator string The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- Trigger
Threshold int The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
- Description string
The description of this Sentinel Scheduled Alert Rule.
- Display
Name string The friendly name of this Sentinel Scheduled Alert Rule.
- Enabled bool
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- Log
Analytics stringWorkspace Id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Name string
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- Query string
The query of this Sentinel Scheduled Alert Rule.
- Query
Frequency string The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- Query
Period string The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- Severity string
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- Suppression
Duration string If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- Suppression
Enabled bool Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- Tactics []string
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- Trigger
Operator string The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- Trigger
Threshold int The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
- description string
The description of this Sentinel Scheduled Alert Rule.
- display
Name string The friendly name of this Sentinel Scheduled Alert Rule.
- enabled boolean
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- log
Analytics stringWorkspace Id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- name string
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- query string
The query of this Sentinel Scheduled Alert Rule.
- query
Frequency string The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- query
Period string The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- severity string
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- suppression
Duration string If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- suppression
Enabled boolean Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- tactics string[]
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- trigger
Operator string The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- trigger
Threshold number The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
- description str
The description of this Sentinel Scheduled Alert Rule.
- display_
name str The friendly name of this Sentinel Scheduled Alert Rule.
- enabled bool
Should the Sentinel Scheduled Alert Rule be enabled? Defaults to
true.- log_
analytics_ strworkspace_ id The ID of the Log Analytics Workspace this Sentinel Scheduled Alert Rule belongs to. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- name str
The name which should be used for this Sentinel Scheduled Alert Rule. Changing this forces a new Sentinel Scheduled Alert Rule to be created.
- query str
The query of this Sentinel Scheduled Alert Rule.
- query_
frequency str The ISO 8601 timespan duration between two consecutive queries. Defaults to
PT5H.- query_
period str The ISO 8601 timespan duration, which determine the time period of the data covered by the query. For example, it can query the past 10 minutes of data, or the past 6 hours of data. Defaults to
PT5H.- severity str
The alert severity of this Sentinel Scheduled Alert Rule. Possible values are
High,Medium,LowandInformational.- suppression_
duration str If
suppression_enabledistrue, this is ISO 8601 timespan duration, which specifies the amount of time the query should stop running after alert is generated. Defaults toPT5H.- suppression_
enabled bool Should the Sentinel Scheduled Alert Rulea stop running query after alert is generated? Defaults to
false.- tactics List[str]
A list of categories of attacks by which to classify the rule. Possible values are
Collection,CommandAndControl,CredentialAccess,DefenseEvasion,Discovery,Execution,Exfiltration,Impact,InitialAccess,LateralMovement,PersistenceandPrivilegeEscalation.- trigger_
operator str The alert trigger operator, combined with
trigger_threshold, setting alert threshold of this Sentinel Scheduled Alert Rule. Possible values areEqual,GreaterThan,LessThan,NotEqual.- trigger_
threshold float The baseline number of query results generated, combined with
trigger_operator, setting alert threshold of this Sentinel Scheduled Alert Rule.
Package Details
- Repository
- https://github.com/pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
azurermTerraform Provider.