diff --git a/docs/resources/notification_channel.md b/docs/resources/notification_channel.md deleted file mode 100644 index e79b134..0000000 --- a/docs/resources/notification_channel.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -# generated by https://github.com/hashicorp/terraform-plugin-docs -page_title: "traceable_notification_channel Resource - terraform-provider-traceable" -subcategory: "" -description: |- - ---- - -# traceable_notification_channel (Resource) - - - -## Example Usage - -```terraform -resource "traceable_notification_channel" "testchannel" { - channel_name = "example_channel1" - - email = [ - "example4@example.com", - "example2@example.com" - ] - - slack_webhook = "https://hooks.slack.com/services/T00000000/B00000000/XXXXXXXXXXXXXXXXXXXXXXXX" - splunk_id=data.traceable_splunk_integration.splunk.splunk_id - # syslog_id="" - custom_webhook { - webhook_url = "https://example.com/webhook" - custom_webhook_headers { - key = "Authorization" - value = "Bearer token123" - is_secret = false - } - custom_webhook_headers { - key = "Authorization1" - value = "Bearer token1232" - is_secret = true - } - custom_webhook_headers { - key = "tets" - value = "Bearer" - is_secret = false - } - } - - s3_webhook { - bucket_name = "your-s3-bucket" - region = "us-west-2" - bucket_arn = "arn:aws:s3:::your-s3-bucket" - } -} -``` - - -## Schema - -### Required - -- `channel_name` (String) Name of the notification channel - -### Optional - -- `custom_webhook` (Block List, Max: 1) Your custom webhook url (see [below for nested schema](#nestedblock--custom_webhook)) -- `email` (Set of String) Email address for notification channel -- `s3_webhook` (Block Set, Max: 1) S3 bucket configuration for notification channel (see [below for nested schema](#nestedblock--s3_webhook)) -- `slack_webhook` (String) Slack webhook config for notification channel -- `splunk_id` (String) Your splunk integration id -- `syslog_id` (String) Your syslog integration id - -### Read-Only - -- `id` (String) The ID of this resource. - - -### Nested Schema for `custom_webhook` - -Required: - -- `webhook_url` (String) Url of custom webhook - -Optional: - -- `custom_webhook_headers` (Block Set) Headers for custom webhook (see [below for nested schema](#nestedblock--custom_webhook--custom_webhook_headers)) - - -### Nested Schema for `custom_webhook.custom_webhook_headers` - -Required: - -- `is_secret` (Boolean) Header is secret or not -- `key` (String) Test header key -- `value` (String) Test header value - - - - -### Nested Schema for `s3_webhook` - -Required: - -- `bucket_arn` (String) S3 bucket arn -- `bucket_name` (String) Name of your s3 bucket -- `region` (String) Region of your s3 bucket diff --git a/docs/resources/notification_rule_actor_severity_change.md b/docs/resources/notification_rule_actor_severity_change.md deleted file mode 100644 index 0945695..0000000 --- a/docs/resources/notification_rule_actor_severity_change.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -# generated by https://github.com/hashicorp/terraform-plugin-docs -page_title: "traceable_notification_rule_actor_severity_change Resource - terraform-provider-traceable" -subcategory: "" -description: |- - ---- - -# traceable_notification_rule_actor_severity_change (Resource) - - - - - - -## Schema - -### Required - -- `actor_ip_reputation_levels` (Set of String) Severites of threat events you want to notify (LOW,MEDIUM,HIGH,CRITICAL) -- `actor_severities` (Set of String) Threat types for which you want notification -- `channel_id` (String) Reporting channel for this notification rule -- `environments` (Set of String) Environments where rule will be applicable -- `name` (String) Name of the notification rule - -### Optional - -- `notification_frequency` (String) No more than one notification every configured notification_frequency (should be in this format PT1H for 1 hr) - -### Read-Only - -- `id` (String) The ID of this resource. diff --git a/docs/resources/notification_rule_blocked_threat_activity.md b/docs/resources/notification_rule_blocked_threat_activity.md deleted file mode 100644 index 5218d8f..0000000 --- a/docs/resources/notification_rule_blocked_threat_activity.md +++ /dev/null @@ -1,31 +0,0 @@ ---- -# generated by https://github.com/hashicorp/terraform-plugin-docs -page_title: "traceable_notification_rule_blocked_threat_activity Resource - terraform-provider-traceable" -subcategory: "" -description: |- - ---- - -# traceable_notification_rule_blocked_threat_activity (Resource) - - - - - - -## Schema - -### Required - -- `channel_id` (String) Reporting channel for this notification rule -- `environments` (Set of String) Environments where rule will be applicable -- `name` (String) Name of the notification rule -- `threat_types` (Set of String) Threat types for which you want notification - -### Optional - -- `notification_frequency` (String) No more than one notification every configured notification_frequency (should be in this format PT1H for 1 hr) - -### Read-Only - -- `id` (String) The ID of this resource. diff --git a/docs/resources/notification_rule_logged_threat_activity.md b/docs/resources/notification_rule_logged_threat_activity.md deleted file mode 100644 index b1e6b81..0000000 --- a/docs/resources/notification_rule_logged_threat_activity.md +++ /dev/null @@ -1,46 +0,0 @@ ---- -# generated by https://github.com/hashicorp/terraform-plugin-docs -page_title: "traceable_notification_rule_logged_threat_activity Resource - terraform-provider-traceable" -subcategory: "" -description: |- - ---- - -# traceable_notification_rule_logged_threat_activity (Resource) - - - -## Example Usage - -```terraform -resource "traceable_notification_rule_logged_threat_activity" "rule1" { - name = "example_notification_rule" - environments = [] - channel_id = data.traceable_notification_channels.mychannel.channel_id - threat_types = ["SQLInjection","bola"] - severities = ["HIGH", "MEDIUM","LOW","CRITICAL"] - impact = ["LOW", "HIGH"] - confidence = ["HIGH", "MEDIUM"] -} -``` - - -## Schema - -### Required - -- `channel_id` (String) Reporting channel for this notification rule -- `confidence` (Set of String) Confidence of threat events you want to notify (LOW,MEDIUM,HIGH) -- `environments` (Set of String) Environments where rule will be applicable -- `impact` (Set of String) Impact of threat events you want to notify (LOW,MEDIUM,HIGH) -- `name` (String) Name of the notification rule -- `severities` (Set of String) Severites of threat events you want to notify (LOW,MEDIUM,HIGH,CRITICAL) -- `threat_types` (Set of String) Threat types for which you want notification - -### Optional - -- `notification_frequency` (String) No more than one notification every configured notification_frequency (should be in this format PT1H for 1 hr) - -### Read-Only - -- `id` (String) The ID of this resource. diff --git a/docs/resources/notification_rule_threat_actor_status.md b/docs/resources/notification_rule_threat_actor_status.md deleted file mode 100644 index d3df857..0000000 --- a/docs/resources/notification_rule_threat_actor_status.md +++ /dev/null @@ -1,31 +0,0 @@ ---- -# generated by https://github.com/hashicorp/terraform-plugin-docs -page_title: "traceable_notification_rule_threat_actor_status Resource - terraform-provider-traceable" -subcategory: "" -description: |- - ---- - -# traceable_notification_rule_threat_actor_status (Resource) - - - - - - -## Schema - -### Required - -- `actor_states` (Set of String) Actor states for which you want notification -- `channel_id` (String) Reporting channel for this notification rule -- `environments` (Set of String) Environments where rule will be applicable -- `name` (String) Name of the notification rule - -### Optional - -- `notification_frequency` (String) No more than one notification every configured notification_frequency (should be in this format PT1H for 1 hr) - -### Read-Only - -- `id` (String) The ID of this resource. diff --git a/provider/provider.go b/provider/provider.go index 2c0668a..62a1573 100644 --- a/provider/provider.go +++ b/provider/provider.go @@ -26,11 +26,11 @@ func Provider() *schema.Provider { "traceable_user_attribution_rule_response_body": resourceUserAttributionResponseBodyRule(), "traceable_user_attribution_rule_custom_json": resourceUserAttributionCustomJsonRule(), "traceable_user_attribution_rule_custom_token": resourceUserAttributionCustomTokenRule(), - "traceable_notification_channel": resourceNotificationChannelRule(), - "traceable_notification_rule_logged_threat_activity": resourceNotificationRuleLoggedThreatActivity(), - "traceable_notification_rule_blocked_threat_activity": resourceNotificationRuleBlockedThreatActivity(), - "traceable_notification_rule_threat_actor_status": resourceNotificationRuleThreatActorStatusChange(), - "traceable_notification_rule_actor_severity_change": resourceNotificationRuleActorSeverityChange(), + // "traceable_notification_channel": resourceNotificationChannelRule(), + // "traceable_notification_rule_logged_threat_activity": resourceNotificationRuleLoggedThreatActivity(), + // "traceable_notification_rule_blocked_threat_activity": resourceNotificationRuleBlockedThreatActivity(), + // "traceable_notification_rule_threat_actor_status": resourceNotificationRuleThreatActorStatusChange(), + // "traceable_notification_rule_actor_severity_change": resourceNotificationRuleActorSeverityChange(), "traceable_api_naming_rule": resourceApiNamingRule(), // "traceable_api_exclusion_rule": resourceApiExclusionRule(), "traceable_label_creation_rule": resourceLabelCreationRule(),