Skip to content

azurermSentinelDataConnectorMicrosoftThreatIntelligence

Manages a Microsoft Threat Intelligence Data Connector.

Example Usage

/*Provider bindings are generated by running cdktf get.
See https://cdk.tf/provider-generation for more details.*/
import * as azurerm from "./.gen/providers/azurerm";
/*The following providers are missing schema information and might need manual adjustments to synthesize correctly: azurerm.
For a more precise conversion please use the --provider flag in convert.*/
new azurerm.provider.AzurermProvider(this, "azurerm", {
  features: [{}],
});
const azurermResourceGroupExample = new azurerm.resourceGroup.ResourceGroup(
  this,
  "example",
  {
    location: "east us",
    name: "example-rg",
  }
);
const azurermLogAnalyticsWorkspaceExample =
  new azurerm.logAnalyticsWorkspace.LogAnalyticsWorkspace(this, "example_2", {
    location: azurermResourceGroupExample.location,
    name: "example-workspace",
    resource_group_name: azurermResourceGroupExample.name,
    sku: "PerGB2018",
  });
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermLogAnalyticsWorkspaceExample.overrideLogicalId("example");
const azurermSentinelLogAnalyticsWorkspaceOnboardingExample =
  new azurerm.sentinelLogAnalyticsWorkspaceOnboarding.SentinelLogAnalyticsWorkspaceOnboarding(
    this,
    "example_3",
    {
      workspace_id: azurermLogAnalyticsWorkspaceExample.id,
    }
  );
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermSentinelLogAnalyticsWorkspaceOnboardingExample.overrideLogicalId(
  "example"
);
const azurermSentinelDataConnectorMicrosoftThreatIntelligenceExample =
  new azurerm.sentinelDataConnectorMicrosoftThreatIntelligence.SentinelDataConnectorMicrosoftThreatIntelligence(
    this,
    "example_4",
    {
      bing_safety_phishing_url_lookback_date: "1970-01-01T00:00:00Z",
      log_analytics_workspace_id:
        azurermSentinelLogAnalyticsWorkspaceOnboardingExample.workspaceId,
      microsoft_emerging_threat_feed_lookback_date: "1970-01-01T00:00:00Z",
      name: "example-dc-msti",
    }
  );
/*This allows the Terraform resource name to match the original name. You can remove the call if you don't need them to match.*/
azurermSentinelDataConnectorMicrosoftThreatIntelligenceExample.overrideLogicalId(
  "example"
);

Arguments Reference

The following arguments are supported:

  • name - (Required) The name which should be used for this Microsoft Threat Intelligence Data Connector. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.

  • logAnalyticsWorkspaceId - (Required) The ID of the Log Analytics Workspace. Changing this forces a new Data Connector to be created.

  • bingSafetyPhishingUrlLookbackDate - (Optional) The lookback date for the Bing Safety Phishing Url in RFC3339. Changing this forces a new Data Connector to be created.

  • microsoftEmergingThreatFeedLookbackDate - (Optional) The lookback date for the Microsoft Emerging Threat Feed in RFC3339. Changing this forces a new Data Connector to be created.

-> NOTE: At least one of bingSafetyPhishingUrlLookbackDate and microsoftEmergingThreatFeedLookbackDate must be specified.


  • tenantId - (Optional) The ID of the tenant that this Microsoft Threat Intelligence Data Connector connects to. Changing this forces a new Microsoft Threat Intelligence Data Connector to be created.

-> NOTE Currently, only the same tenant as the running account is allowed. Cross-tenant scenario is not supported yet.

Attributes Reference

In addition to the Arguments listed above - the following Attributes are exported:

  • id - The ID of the sentinel.

Timeouts

The timeouts block allows you to specify timeouts for certain actions:

  • create - (Defaults to 30 minutes) Used when creating the sentinel.
  • read - (Defaults to 5 minutes) Used when retrieving the sentinel.
  • delete - (Defaults to 30 minutes) Used when deleting the sentinel.

Import

sentinels can be imported using the resourceId, e.g.

terraform import azurerm_sentinel_data_connector_microsoft_threat_intelligence.example /subscriptions/12345678-1234-9876-4563-123456789012/resourceGroups/resGroup1/providers/Microsoft.OperationalInsights/workspaces/workspace1/providers/Microsoft.SecurityInsights/dataConnectors/dc1