Skip to content

Commit c3176e1

Browse files
v1.75.0
1 parent 6085d24 commit c3176e1

File tree

12 files changed

+279
-25
lines changed

12 files changed

+279
-25
lines changed

docs/data-sources/dql.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
# generated by https://github.com/hashicorp/terraform-plugin-docs
3+
page_title: "dynatrace_dql Data Source - terraform-provider-dynatrace"
4+
subcategory: ""
5+
description: |-
6+
7+
---
8+
9+
# dynatrace_dql (Data Source)
10+
11+
12+
13+
14+
15+
<!-- schema generated by tfplugindocs -->
16+
## Schema
17+
18+
### Required
19+
20+
- `query` (String) example: fetch events | filter event.type == "davis" AND davis.status != "CLOSED" | fields timestamp, davis.title, davis.underMaintenance, davis.status | sort timestamp | limit 10
21+
22+
### Optional
23+
24+
- `default_sampling_ratio` (Number) In case not specified in the DQL string, the sampling ratio defined here is applied. Note that this is only applicable to log queries
25+
- `default_scan_limit_gbytes` (Number) Limit in gigabytes for the amount data that will be scanned during read
26+
- `default_timeframe_end` (String) The query timeframe 'end' timestamp in ISO-8601 or RFC3339 format. If the timeframe 'start' parameter is missing, the whole timeframe is ignored. Note that if a timeframe is specified within the query string (query) then it has precedence over this query request parameter
27+
- `default_timeframe_start` (String) The query timeframe 'start' timestamp in ISO-8601 or RFC3339 format. If the timeframe 'end' parameter is missing, the whole timeframe is ignored. Note that if a timeframe is specified within the query string (query) then it has precedence over this query request parameter
28+
- `fetch_timeout_seconds` (Number) The query will stop reading data after reaching the fetch-timeout. The query execution will continue, providing a partial result based on the read data
29+
- `locale` (String) The query locale. If none specified, then a language/country neutral locale is chosen. The input values take the ISO-639 Language code with an optional ISO-3166 country code appended to it with an underscore. For instance, both values are valid 'en' or 'en_US'
30+
- `max_result_bytes` (Number) The maximum number of result bytes that this query will return
31+
- `max_result_records` (Number) The maximum number of result records that this query will return
32+
- `request_timeout_milliseconds` (Number) The time a client is willing to wait for the query result. In case the query finishes within the specified timeout, the query result is returned. Otherwise, the requestToken is returned, allowing polling for the result
33+
- `timezone` (String) The query timezone. If none is specified, UTC is used as fallback. The list of valid input values matches that of the IANA Time Zone Database (TZDB). It accepts values in their canonical names like 'Europe/Paris', the abbreviated version like CET or the UTC offset format like '+01:00'
34+
35+
### Read-Only
36+
37+
- `id` (String) The ID of this resource.
38+
- `records` (String)

docs/index.md

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -74,17 +74,6 @@ Define `DT_CLIENT_ID`, `DT_CLIENT_SECRET`, `DT_ACCOUNT_ID` based off of the crea
7474
* **View and manage policies** (`iam-policies-management`)
7575
* **View environments** (`account-env-read`)
7676

77-
In addition to using environment variables, the provider itself can also be configured.
78-
```
79-
provider "dynatrace" {
80-
dt_env_url = "<env url>"
81-
dt_api_token = "<api token>"
82-
client_id = "<client id>"
83-
client_secret = "<client secret>"
84-
account_id = "<account id>"
85-
}
86-
```
87-
8877
## Exporting existing configuration from a Dynatrace environment
8978
In addition to the out-of-the-box functionality of Terraform, the provider has the ability to be executed as a standalone executable to export an existing configuration from a Dynatrace environment. Refer to the [Export Utility](https://dt-url.net/h203qmc) page for more information.
9079

docs/resources/attack_allowlist.md

Lines changed: 81 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,38 @@ The full documentation of the export feature is available [here](https://dt-url.
2828

2929
```terraform
3030
resource "dynatrace_attack_allowlist" "#name#" {
31-
criteria {
32-
source_ip = "192.168.0.1"
33-
}
34-
enabled = false
31+
enabled = true
32+
insert_after = ""
33+
rule_name = "#name#"
3534
attack_handling {
3635
blocking_strategy = "MONITOR"
3736
}
3837
metadata {
39-
comment = ""
38+
comment = "Example"
39+
}
40+
resource_attribute_conditions {
41+
resource_attribute_condition {
42+
matcher = "STARTS_WITH"
43+
resource_attribute_key = "AttributeKey2"
44+
resource_attribute_value = "AttributeValue2"
45+
}
46+
resource_attribute_condition {
47+
matcher = "EQUALS"
48+
resource_attribute_key = "AttributeKey1"
49+
resource_attribute_value = "AttributeValue1"
50+
}
51+
}
52+
rules {
53+
rule {
54+
criteria_key = "DETECTION_TYPE"
55+
criteria_matcher = "EQUALS"
56+
criteria_value_detection_type = "SSRF"
57+
}
58+
rule {
59+
criteria_key = "ACTOR_IP"
60+
criteria_matcher = "CONTAINS"
61+
criteria_value_free_text = "192.168.1.2"
62+
}
4063
}
4164
}
4265
```
@@ -46,14 +69,19 @@ resource "dynatrace_attack_allowlist" "#name#" {
4669

4770
### Required
4871

49-
- `attack_handling` (Block List, Min: 1, Max: 1) Step 2: Define attack control for chosen criteria (see [below for nested schema](#nestedblock--attack_handling))
50-
- `criteria` (Block List, Min: 1, Max: 1) Step 1: Define criteria. Please specify at least one of source IP or attack pattern. (see [below for nested schema](#nestedblock--criteria))
72+
- `attack_handling` (Block List, Min: 1, Max: 1) Step 1: Define attack control for chosen criteria (see [below for nested schema](#nestedblock--attack_handling))
5173
- `enabled` (Boolean) This setting is enabled (`true`) or disabled (`false`)
52-
- `metadata` (Block List, Min: 1, Max: 1) Step 3: Leave comment (see [below for nested schema](#nestedblock--metadata))
74+
- `metadata` (Block List, Min: 1, Max: 1) Step 4: Leave comment (optional) (see [below for nested schema](#nestedblock--metadata))
75+
- `rules` (Block List, Min: 1, Max: 1) Provide conditions that must be met by the detection finding you want to allowlist. (see [below for nested schema](#nestedblock--rules))
5376

5477
### Optional
5578

79+
- `criteria` (Block List, Max: 1, Deprecated) Step 1: Define criteria. Please specify at least one of source IP or attack pattern. (see [below for nested schema](#nestedblock--criteria))
5680
- `insert_after` (String) Because this resource allows for ordering you may specify the ID of the resource instance that comes before this instance regarding order. If not specified when creating the setting will be added to the end of the list. If not specified during update the order will remain untouched
81+
- `resource_attribute_conditions` (Block List, Max: 1) When you add multiple conditions, the rule applies if all conditions apply.
82+
83+
If you want the rule to apply only to a subset of your environment, provide the resource attributes that should be used to identify that part of the environment. (see [below for nested schema](#nestedblock--resource_attribute_conditions))
84+
- `rule_name` (String) Rule name
5785

5886
### Read-Only
5987

@@ -67,6 +95,36 @@ Required:
6795
- `blocking_strategy` (String) Possible Values: `MONITOR`, `OFF`
6896

6997

98+
<a id="nestedblock--metadata"></a>
99+
### Nested Schema for `metadata`
100+
101+
Required:
102+
103+
- `comment` (String) no documentation available
104+
105+
106+
<a id="nestedblock--rules"></a>
107+
### Nested Schema for `rules`
108+
109+
Required:
110+
111+
- `rule` (Block List, Min: 1) (see [below for nested schema](#nestedblock--rules--rule))
112+
113+
<a id="nestedblock--rules--rule"></a>
114+
### Nested Schema for `rules.rule`
115+
116+
Required:
117+
118+
- `criteria_key` (String) Possible Values: `ACTOR_IP`, `DETECTION_TYPE`, `ENTRY_POINT_PAYLOAD`, `ENTRY_POINT_PAYLOAD_DOMAIN`, `ENTRY_POINT_PAYLOAD_PORT`, `ENTRY_POINT_URL_PATH`
119+
- `criteria_matcher` (String) Possible Values: `CONTAINS`, `DOES_NOT_CONTAIN`, `DOES_NOT_END_WITH`, `DOES_NOT_STARTS_WITH`, `ENDS_WITH`, `EQUALS`, `IP_CIDR`, `NOT_EQUALS`, `NOT_IN_IP_CIDR`, `STARTS_WITH`
120+
121+
Optional:
122+
123+
- `criteria_value_detection_type` (String) Possible Values: `CMD_INJECTION`, `JNDI_INJECTION`, `SQL_INJECTION`, `SSRF`
124+
- `criteria_value_free_text` (String) Value
125+
126+
127+
70128
<a id="nestedblock--criteria"></a>
71129
### Nested Schema for `criteria`
72130

@@ -76,10 +134,22 @@ Optional:
76134
- `source_ip` (String) Source IP
77135

78136

79-
<a id="nestedblock--metadata"></a>
80-
### Nested Schema for `metadata`
137+
<a id="nestedblock--resource_attribute_conditions"></a>
138+
### Nested Schema for `resource_attribute_conditions`
81139

82140
Required:
83141

84-
- `comment` (String) no documentation available
142+
- `resource_attribute_condition` (Block List, Min: 1) (see [below for nested schema](#nestedblock--resource_attribute_conditions--resource_attribute_condition))
143+
144+
<a id="nestedblock--resource_attribute_conditions--resource_attribute_condition"></a>
145+
### Nested Schema for `resource_attribute_conditions.resource_attribute_condition`
146+
147+
Required:
148+
149+
- `matcher` (String) Possible Values: `CONTAINS`, `DOES_NOT_CONTAIN`, `DOES_NOT_END_WITH`, `DOES_NOT_EXIST`, `DOES_NOT_START_WITH`, `ENDS_WITH`, `EQUALS`, `EXISTS`, `NOT_EQUALS`, `STARTS_WITH`
150+
- `resource_attribute_key` (String) Resource attribute key
151+
152+
Optional:
153+
154+
- `resource_attribute_value` (String) Resource attribute value
85155

docs/resources/automation_workflow.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,7 @@ resource "dynatrace_automation_workflow" "Sample_Worklow_TF" {
132132
- `owner` (String) The ID of the owner of this workflow
133133
- `private` (Boolean) Defines whether this workflow is private to the owner or not. Default is `true`
134134
- `trigger` (Block List, Max: 1) Configures how executions of the workflows are getting triggered. If no trigger is specified it means the workflow is getting manually triggered (see [below for nested schema](#nestedblock--trigger))
135+
- `type` (String) The type of the workflow. Possible values are `STANDARD` and `SIMPLE`. Defaults to `STANDARD`. Workflows of type `SIMPLE` are allowed to contain only one action
135136

136137
### Read-Only
137138

docs/resources/iam_policy_bindings_v2.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,5 +130,6 @@ Required:
130130

131131
Optional:
132132

133+
- `boundaries` (Set of String)
133134
- `metadata` (Map of String)
134135
- `parameters` (Map of String)
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
layout: ""
3+
page_title: "dynatrace_iam_policy_boundary Resource - terraform-provider-dynatrace"
4+
subcategory: "IAM"
5+
description: |-
6+
The resource `dynatrace_iam_policy_boundary` covers boundaries that can get specified when binding policies to user groups via Account Management API for SaaS Accounts.
7+
---
8+
9+
# dynatrace_iam_policy_boundary (Resource)
10+
11+
-> **Dynatrace SaaS only**
12+
13+
-> To utilize this resource, please define the environment variables `DT_CLIENT_ID`, `DT_CLIENT_SECRET`, `DT_ACCOUNT_ID` with an OAuth client including the following permissions: **Allow IAM policy configuration for environments** (`iam-policies-management`) and **View environments** (`account-env-read`).
14+
15+
-> This resource is excluded by default in the export utility, please explicitly specify the resource to retrieve existing configuration.
16+
17+
## Dynatrace Documentation
18+
19+
- Dynatrace IAM Group Permissions - https://docs.dynatrace.com/docs/manage/identity-access-management/permission-management/manage-user-permissions-policies
20+
21+
- Settings API - https://www.dynatrace.com/support/help/how-to-use-dynatrace/user-management-and-sso/manage-groups-and-permissions/iam/iam-getting-started
22+
23+
## Resource Example Usage
24+
25+
```terraform
26+
resource "dynatrace_iam_policy_boundary" "this" {
27+
name = "Foo"
28+
query = "environment:management-zone startsWith \"[Foo]\";"
29+
}
30+
31+
resource "dynatrace_iam_policy_bindings_v2" "this" {
32+
environment = "########"
33+
group = dynatrace_iam_group.this.id
34+
35+
policy {
36+
id = dynatrace_iam_policy.this.id
37+
boundaries = [dynatrace_iam_policy_boundary.this.id]
38+
}
39+
}
40+
41+
resource "dynatrace_iam_group" "this" {
42+
name = "my-group-name"
43+
}
44+
45+
resource "dynatrace_iam_policy" "this" {
46+
name = "this"
47+
account = "########-####-####-####-############"
48+
statement_query = "ALLOW settings:objects:read, settings:schemas:read WHERE settings:schemaId = \"#########\";"
49+
}
50+
```
51+
52+
<!-- schema generated by tfplugindocs -->
53+
## Schema
54+
55+
### Required
56+
57+
- `name` (String) The name of the policy
58+
- `query` (String) The boundary query
59+
60+
### Read-Only
61+
62+
- `id` (String) The ID of this resource.

docs/resources/log_sensitive_data_masking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Required:
106106

107107
Required:
108108

109-
- `attribute` (String) Possible Values: `Container_name`, `Dt_entity_container_group`, `Dt_entity_process_group`, `Host_tag`, `Journald_unit`, `K8s_container_name`, `K8s_deployment_name`, `K8s_namespace_name`, `K8s_pod_annotation`, `K8s_pod_label`, `K8s_workload_kind`, `K8s_workload_name`, `Log_source`, `Log_source_origin`, `Process_technology`
109+
- `attribute` (String) Possible Values: `Container_name`, `Dt_entity_container_group`, `Dt_entity_process_group`, `Host_tag`, `K8s_container_name`, `K8s_deployment_name`, `K8s_namespace_name`, `K8s_pod_annotation`, `K8s_pod_label`, `K8s_workload_kind`, `K8s_workload_name`, `Log_source`, `Log_source_origin`, `Process_technology`
110110
- `operator` (String) Possible Values: `MATCHES`
111111
- `values` (Set of String) no documentation available
112112

docs/resources/log_timestamp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Required:
8383

8484
Required:
8585

86-
- `attribute` (String) Possible Values: `Container_name`, `Dt_entity_container_group`, `Dt_entity_process_group`, `Host_tag`, `Journald_unit`, `K8s_container_name`, `K8s_deployment_name`, `K8s_namespace_name`, `K8s_pod_annotation`, `K8s_pod_label`, `K8s_workload_kind`, `K8s_workload_name`, `Log_source`, `Log_source_origin`, `Process_technology`
86+
- `attribute` (String) Possible Values: `Container_name`, `Dt_entity_container_group`, `Dt_entity_process_group`, `Host_tag`, `K8s_container_name`, `K8s_deployment_name`, `K8s_namespace_name`, `K8s_pod_annotation`, `K8s_pod_label`, `K8s_workload_kind`, `K8s_workload_name`, `Log_source`, `Log_source_origin`, `Process_technology`
8787
- `operator` (String) Possible Values: `MATCHES`
8888
- `values` (Set of String) no documentation available
8989

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
layout: ""
3+
page_title: dynatrace_monitored_technologies_python Resource - terraform-provider-dynatrace"
4+
subcategory: "Monitored Technologies"
5+
description: |-
6+
The resource `dynatrace_monitored_technologies_python` covers configuration to enable/disable Python monitoring
7+
---
8+
9+
# dynatrace_monitored_technologies_python (Resource)
10+
11+
-> This resource requires the API token scopes **Read settings** (`settings.read`) and **Write settings** (`settings.write`)
12+
13+
## Dynatrace Documentation
14+
15+
- Hosts - https://www.dynatrace.com/support/help/platform-modules/infrastructure-monitoring/hosts
16+
17+
- Settings API - https://www.dynatrace.com/support/help/dynatrace-api/environment-api/settings (schemaId: `builtin:monitored-technologies.python`)
18+
19+
## Export Example Usage
20+
21+
- `terraform-provider-dynatrace -export dynatrace_monitored_technologies_python` downloads all existing Python monitoring configuration
22+
23+
The full documentation of the export feature is available [here](https://dt-url.net/h203qmc).
24+
25+
## Resource Example Usage
26+
27+
```terraform
28+
resource "dynatrace_monitored_technologies_python" "#name#" {
29+
enabled = false
30+
host_id = "environment"
31+
}
32+
```
33+
34+
<!-- schema generated by tfplugindocs -->
35+
## Schema
36+
37+
### Required
38+
39+
- `enabled` (Boolean) This setting is enabled (`true`) or disabled (`false`)
40+
41+
### Optional
42+
43+
- `host_id` (String) The scope of this settings. If the settings should cover the whole environment, just don't specify any scope.
44+
45+
### Read-Only
46+
47+
- `id` (String) The ID of this resource.
48+

docs/resources/security_context.md

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
layout: ""
3+
page_title: dynatrace_security_context Resource - terraform-provider-dynatrace"
4+
subcategory: "Platform"
5+
description: |-
6+
The resource `dynatrace_security_context` covers configuration for security context settings
7+
---
8+
9+
# dynatrace_security_context (Resource)
10+
11+
-> This resource requires the API token scopes **Read settings** (`settings.read`) and **Write settings** (`settings.write`)
12+
13+
## Dynatrace Documentation
14+
15+
- Permissions in Grail - https://docs.dynatrace.com/docs/discover-dynatrace/platform/grail/data-model/assign-permissions-in-grail
16+
17+
- Settings API - https://www.dynatrace.com/support/help/dynatrace-api/environment-api/settings (schemaId: `builtin:security-context`)
18+
19+
## Export Example Usage
20+
21+
- `terraform-provider-dynatrace -export dynatrace_security_context` downloads existing security context configuration
22+
23+
The full documentation of the export feature is available [here](https://dt-url.net/h203qmc).
24+
25+
## Resource Example Usage
26+
27+
```terraform
28+
resource "dynatrace_security_context" "#name#" {
29+
enabled = true
30+
}
31+
```
32+
33+
<!-- schema generated by tfplugindocs -->
34+
## Schema
35+
36+
### Required
37+
38+
- `enabled` (Boolean) This setting is enabled (`true`) or disabled (`false`)
39+
40+
### Read-Only
41+
42+
- `id` (String) The ID of this resource.
43+

0 commit comments

Comments
 (0)