Skip to content

Commit 67416c9

Browse files
api-clients-generation-pipeline[bot]ci.datadog-api-spec
andauthored
Security Monitoring Suppression - Add data_exclusion_query field (#1797)
Co-authored-by: ci.datadog-api-spec <[email protected]> Co-authored-by: api-clients-generation-pipeline[bot] <54105614+api-clients-generation-pipeline[bot]@users.noreply.github.com>
1 parent 4657da5 commit 67416c9

15 files changed

+178
-60
lines changed

.apigentools-info

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@
44
"spec_versions": {
55
"v1": {
66
"apigentools_version": "1.6.6",
7-
"regenerated": "2024-04-09 18:06:05.043770",
8-
"spec_repo_commit": "fc718bc2"
7+
"regenerated": "2024-04-10 15:00:59.509061",
8+
"spec_repo_commit": "7e61ac0f"
99
},
1010
"v2": {
1111
"apigentools_version": "1.6.6",
12-
"regenerated": "2024-04-09 18:06:05.061038",
13-
"spec_repo_commit": "fc718bc2"
12+
"regenerated": "2024-04-10 15:00:59.527080",
13+
"spec_repo_commit": "7e61ac0f"
1414
}
1515
}
1616
}

.generator/schemas/v2/openapi.yaml

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18282,6 +18282,13 @@ components:
1828218282
type: integer
1828318283
creator:
1828418284
$ref: '#/components/schemas/SecurityMonitoringUser'
18285+
data_exclusion_query:
18286+
description: An exclusion query on the input data of the security rules,
18287+
which could be logs, Agent events, or other types of data based on the
18288+
security rule. Events matching this query are ignored by any detection
18289+
rules referenced in the suppression rule.
18290+
example: source:cloudtrail account_id:12345
18291+
type: string
1828518292
description:
1828618293
description: A description for the suppression rule.
1828718294
example: This rule suppresses low-severity signals in staging environments.
@@ -18330,6 +18337,13 @@ components:
1833018337
description: Object containing the attributes of the suppression rule to be
1833118338
created.
1833218339
properties:
18340+
data_exclusion_query:
18341+
description: An exclusion query on the input data of the security rules,
18342+
which could be logs, Agent events, or other types of data based on the
18343+
security rule. Events matching this query are ignored by any detection
18344+
rules referenced in the suppression rule.
18345+
example: source:cloudtrail account_id:12345
18346+
type: string
1833318347
description:
1833418348
description: A description for the suppression rule.
1833518349
example: This rule suppresses low-severity signals in staging environments.
@@ -18355,15 +18369,14 @@ components:
1835518369
type: string
1835618370
suppression_query:
1835718371
description: The suppression query of the suppression rule. If a signal
18358-
matches this query, it is suppressed and is not triggered . Same syntax
18359-
as the queries to search signals in the signal explorer.
18372+
matches this query, it is suppressed and is not triggered. It uses the
18373+
same syntax as the queries to search signals in the Signals Explorer.
1836018374
example: env:staging status:low
1836118375
type: string
1836218376
required:
1836318377
- name
1836418378
- enabled
1836518379
- rule_query
18366-
- suppression_query
1836718380
type: object
1836818381
SecurityMonitoringSuppressionCreateData:
1836918382
description: Object for a single suppression rule.
@@ -18407,6 +18420,13 @@ components:
1840718420
SecurityMonitoringSuppressionUpdateAttributes:
1840818421
description: The suppression rule properties to be updated.
1840918422
properties:
18423+
data_exclusion_query:
18424+
description: An exclusion query on the input data of the security rules,
18425+
which could be logs, Agent events, or other types of data based on the
18426+
security rule. Events matching this query are ignored by any detection
18427+
rules referenced in the suppression rule.
18428+
example: source:cloudtrail account_id:12345
18429+
type: string
1841018430
description:
1841118431
description: A description for the suppression rule.
1841218432
example: This rule suppresses low-severity signals in staging environments.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2024-01-11T10:06:23.179Z
1+
2024-04-08T09:56:58.589Z

cassettes/features/v2/security_monitoring/Create-a-suppression-rule-returns-OK-response.yml

Lines changed: 6 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
2024-04-08T09:57:01.815Z

cassettes/features/v2/security_monitoring/Create-a-suppression-rule-with-an-exclusion-query-returns-OK-response.yml

Lines changed: 48 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2024-01-11T10:06:31.876Z
1+
2024-04-08T09:57:31.186Z

cassettes/features/v2/security_monitoring/Get-a-suppression-rule-returns-OK-response.yml

Lines changed: 8 additions & 8 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2024-01-11T10:06:37.000Z
1+
2024-04-08T09:57:43.431Z

cassettes/features/v2/security_monitoring/Update-a-suppression-rule-returns-OK-response.yml

Lines changed: 9 additions & 9 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)