azurermSentinelDataConnectorMicrosoftThreatIntelligence
Manages a Microsoft Threat Intelligence Data Connector.
Example Usage
/*Provider bindings are generated by running cdktf get.
See https://cdk.tf/provider-generation for more details.*/
import * as azurerm from "./.gen/providers/azurerm";
/*The following providers are missing schema information and might need manual adjustments to synthesize correctly: azurerm.
For a more precise conversion please use the --provider flag in convert.*/
new azurerm.provider.AzurermProvider(this, "azurerm", {
features: [{}],
});
const azurermResourceGroupExample = new azurerm.resourceGroup.ResourceGroup(
this,
"example",
{
location: "east us",
name: "example-rg",
}
);
const azurermLogAnalyticsWorkspaceExample =
new azurerm.logAnalyticsWorkspace.LogAnalyticsWorkspace(this, "example_2", {
location: azurermResourceGroupExample.location,
name: "example-workspace",
resource_group_name: azurermResourceGroupExample.name,
sku: "PerGB2018",
});
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermLogAnalyticsWorkspaceExample.overrideLogicalId("example");
const azurermSentinelLogAnalyticsWorkspaceOnboardingExample =
new azurerm.sentinelLogAnalyticsWorkspaceOnboarding.SentinelLogAnalyticsWorkspaceOnboarding(
this,
"example_3",
{
workspace_id: azurermLogAnalyticsWorkspaceExample.id,
}
);
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermSentinelLogAnalyticsWorkspaceOnboardingExample.overrideLogicalId(
"example"
);
const azurermSentinelDataConnectorMicrosoftThreatIntelligenceExample =
new azurerm.sentinelDataConnectorMicrosoftThreatIntelligence.SentinelDataConnectorMicrosoftThreatIntelligence(
this,
"example_4",
{
bing_safety_phishing_url_lookback_date: "1970-01-01T00:00:00Z",
log_analytics_workspace_id:
azurermSentinelLogAnalyticsWorkspaceOnboardingExample.workspaceId,
microsoft_emerging_threat_feed_lookback_date: "1970-01-01T00:00:00Z",
name: "example-dc-msti",
}
);
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermSentinelDataConnectorMicrosoftThreatIntelligenceExample.overrideLogicalId(
"example"
);
Arguments Reference
The following arguments are supported:
-
name
- (Required) The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created. -
logAnalyticsWorkspaceId
- (Required) The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created. -
bingSafetyPhishingUrlLookbackDate
- (Optional) The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created. -
microsoftEmergingThreatFeedLookbackDate
- (Optional) The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.
-> NOTE: At least one of bingSafetyPhishingUrlLookbackDate
and microsoftEmergingThreatFeedLookbackDate
must be specified.
tenantId
- (Optional) The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.
-> NOTE Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.
Attributes Reference
In addition to the Arguments listed above - the following Attributes are exported:
id
- The ID of the sentinel.
Timeouts
The timeouts
block allows you to specify timeouts for certain actions:
create
- (Defaults to 30 minutes) Used when creating the sentinel.read
- (Defaults to 5 minutes) Used when retrieving the sentinel.delete
- (Defaults to 30 minutes) Used when deleting the sentinel.
Import
sentinels can be imported using the resourceId
, e.g.