Skip to content

Commit ea4be98

Browse files
authored
internal(policies) fix policies test: switch out rule in managed policy (#492)
* switch rule within policy test * fix rules in managed policy test in more places
1 parent 0aae6b7 commit ea4be98

File tree

4 files changed

+10
-10
lines changed

4 files changed

+10
-10
lines changed

sysdig/resource_sysdig_secure_managed_policy_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ resource "sysdig_secure_managed_policy" "sample" {
5656
name = "Sysdig Runtime Threat Detection"
5757
enabled = true
5858
scope = "container.id != \"\""
59-
disabled_rules = ["Suspicious Cron Modification"]
59+
disabled_rules = ["Dump memory for credentials"]
6060
runbook = "https://sysdig.com"
6161
6262
actions {
@@ -80,7 +80,7 @@ resource "sysdig_secure_managed_policy" "sample" {
8080
name = "Sysdig Runtime Threat Detection"
8181
enabled = true
8282
scope = "container.id != \"\""
83-
disabled_rules = ["Suspicious Cron Modification"]
83+
disabled_rules = ["Dump memory for credentials"]
8484
runbook = "https://sysdig.com"
8585
8686
actions {}
@@ -96,7 +96,7 @@ resource "sysdig_secure_managed_policy" "sample" {
9696
name = "Sysdig Runtime Threat Detection"
9797
enabled = true
9898
scope = "container.id != \"\""
99-
disabled_rules = ["Suspicious Cron Modification"]
99+
disabled_rules = ["Dump memory for credentials"]
100100
runbook = "https://sysdig.com"
101101
102102
actions {
@@ -123,7 +123,7 @@ func managedPolicyWithKillAction() string {
123123
name = "Sysdig Runtime Threat Detection"
124124
enabled = true
125125
scope = "container.id != \"\""
126-
disabled_rules = ["Suspicious Cron Modification"]
126+
disabled_rules = ["Dump memory for credentials"]
127127
runbook = "https://sysdig.com"
128128
129129
actions {

sysdig/resource_sysdig_secure_managed_ruleset_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
6666
}
6767
enabled = true
6868
scope = "container.id != \"\""
69-
disabled_rules = ["Suspicious Cron Modification"]
69+
disabled_rules = ["Dump memory for credentials"]
7070
runbook = "https://sysdig.com"
7171
7272
actions {
@@ -95,7 +95,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
9595
}
9696
enabled = true
9797
scope = "container.id != \"\""
98-
disabled_rules = ["Suspicious Cron Modification"]
98+
disabled_rules = ["Dump memory for credentials"]
9999
runbook = "https://sysdig.com"
100100
101101
actions {}
@@ -116,7 +116,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
116116
}
117117
enabled = true
118118
scope = "container.id != \"\""
119-
disabled_rules = ["Suspicious Cron Modification"]
119+
disabled_rules = ["Dump memory for credentials"]
120120
runbook = "https://sysdig.com"
121121
122122
actions {
@@ -154,7 +154,7 @@ resource "sysdig_secure_managed_ruleset" "sample" {
154154
}
155155
enabled = true
156156
scope = "container.id != \"\""
157-
disabled_rules = ["Suspicious Cron Modification"]
157+
disabled_rules = ["Dump memory for credentials"]
158158
runbook = "https://sysdig.com"
159159
160160
actions {

website/docs/r/secure_managed_policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ resource "sysdig_secure_managed_policy" "sysdig_runtime_threat_detection" {
3232
scope = "container.id != \"\""
3333
3434
// Disabling rules
35-
disabled_rules = ["Suspicious Cron Modification"]
35+
disabled_rules = ["Dump memory for credentials"]
3636
3737
actions {
3838
container = "stop"

website/docs/r/secure_managed_ruleset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ resource "sysdig_secure_managed_ruleset" "sysdig_runtime_threat_detection_manage
3434
scope = "container.id != \"\""
3535
3636
// Disabling rules
37-
disabled_rules = ["Suspicious Cron Modification"]
37+
disabled_rules = ["Dump memory for credentials"]
3838
3939
actions {
4040
container = "stop"

0 commit comments

Comments
 (0)