1. Packages
  2. Dynatrace
  3. API Docs
  4. AppsecNotification
Dynatrace v0.27.0 published on Friday, Mar 21, 2025 by Pulumiverse

dynatrace.AppsecNotification

Explore with Pulumi AI

Create AppsecNotification Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new AppsecNotification(name: string, args: AppsecNotificationArgs, opts?: CustomResourceOptions);
@overload
def AppsecNotification(resource_name: str,
                       args: AppsecNotificationArgs,
                       opts: Optional[ResourceOptions] = None)

@overload
def AppsecNotification(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       display_name: Optional[str] = None,
                       type: Optional[str] = None,
                       trigger: Optional[str] = None,
                       enabled: Optional[bool] = None,
                       attack_candidate_based_webhook_payload: Optional[AppsecNotificationAttackCandidateBasedWebhookPayloadArgs] = None,
                       email_configuration: Optional[AppsecNotificationEmailConfigurationArgs] = None,
                       attack_candidate_based_alerting_profile: Optional[str] = None,
                       jira_configuration: Optional[AppsecNotificationJiraConfigurationArgs] = None,
                       security_problem_based_alerting_profile: Optional[str] = None,
                       security_problem_based_email_payload: Optional[AppsecNotificationSecurityProblemBasedEmailPayloadArgs] = None,
                       security_problem_based_jira_payload: Optional[AppsecNotificationSecurityProblemBasedJiraPayloadArgs] = None,
                       security_problem_based_webhook_payload: Optional[AppsecNotificationSecurityProblemBasedWebhookPayloadArgs] = None,
                       attack_candidate_based_jira_payload: Optional[AppsecNotificationAttackCandidateBasedJiraPayloadArgs] = None,
                       attack_candidate_based_email_payload: Optional[AppsecNotificationAttackCandidateBasedEmailPayloadArgs] = None,
                       webhook_configuration: Optional[AppsecNotificationWebhookConfigurationArgs] = None)
func NewAppsecNotification(ctx *Context, name string, args AppsecNotificationArgs, opts ...ResourceOption) (*AppsecNotification, error)
public AppsecNotification(string name, AppsecNotificationArgs args, CustomResourceOptions? opts = null)
public AppsecNotification(String name, AppsecNotificationArgs args)
public AppsecNotification(String name, AppsecNotificationArgs args, CustomResourceOptions options)
type: dynatrace:AppsecNotification
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. AppsecNotificationArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. AppsecNotificationArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. AppsecNotificationArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. AppsecNotificationArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. AppsecNotificationArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var appsecNotificationResource = new Dynatrace.AppsecNotification("appsecNotificationResource", new()
{
    DisplayName = "string",
    Type = "string",
    Trigger = "string",
    Enabled = false,
    AttackCandidateBasedWebhookPayload = new Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
    {
        Payload = "string",
    },
    EmailConfiguration = new Dynatrace.Inputs.AppsecNotificationEmailConfigurationArgs
    {
        Recipients = new[]
        {
            "string",
        },
        BccRecipients = new[]
        {
            "string",
        },
        CcRecipients = new[]
        {
            "string",
        },
    },
    AttackCandidateBasedAlertingProfile = "string",
    JiraConfiguration = new Dynatrace.Inputs.AppsecNotificationJiraConfigurationArgs
    {
        ApiToken = "string",
        IssueType = "string",
        ProjectKey = "string",
        Url = "string",
        Username = "string",
    },
    SecurityProblemBasedAlertingProfile = "string",
    SecurityProblemBasedEmailPayload = new Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedEmailPayloadArgs
    {
        Body = "string",
        Subject = "string",
    },
    SecurityProblemBasedJiraPayload = new Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedJiraPayloadArgs
    {
        Description = "string",
        Summary = "string",
    },
    SecurityProblemBasedWebhookPayload = new Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
    {
        Payload = "string",
    },
    AttackCandidateBasedJiraPayload = new Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedJiraPayloadArgs
    {
        Description = "string",
        Summary = "string",
    },
    AttackCandidateBasedEmailPayload = new Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedEmailPayloadArgs
    {
        Body = "string",
        Subject = "string",
    },
    WebhookConfiguration = new Dynatrace.Inputs.AppsecNotificationWebhookConfigurationArgs
    {
        AcceptAnyCertificate = false,
        Url = "string",
        Headers = new Dynatrace.Inputs.AppsecNotificationWebhookConfigurationHeadersArgs
        {
            Headers = new[]
            {
                new Dynatrace.Inputs.AppsecNotificationWebhookConfigurationHeadersHeaderArgs
                {
                    Name = "string",
                    Secret = false,
                    SecretValue = "string",
                    Value = "string",
                },
            },
        },
    },
});
Copy
example, err := dynatrace.NewAppsecNotification(ctx, "appsecNotificationResource", &dynatrace.AppsecNotificationArgs{
	DisplayName: pulumi.String("string"),
	Type:        pulumi.String("string"),
	Trigger:     pulumi.String("string"),
	Enabled:     pulumi.Bool(false),
	AttackCandidateBasedWebhookPayload: &dynatrace.AppsecNotificationAttackCandidateBasedWebhookPayloadArgs{
		Payload: pulumi.String("string"),
	},
	EmailConfiguration: &dynatrace.AppsecNotificationEmailConfigurationArgs{
		Recipients: pulumi.StringArray{
			pulumi.String("string"),
		},
		BccRecipients: pulumi.StringArray{
			pulumi.String("string"),
		},
		CcRecipients: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	AttackCandidateBasedAlertingProfile: pulumi.String("string"),
	JiraConfiguration: &dynatrace.AppsecNotificationJiraConfigurationArgs{
		ApiToken:   pulumi.String("string"),
		IssueType:  pulumi.String("string"),
		ProjectKey: pulumi.String("string"),
		Url:        pulumi.String("string"),
		Username:   pulumi.String("string"),
	},
	SecurityProblemBasedAlertingProfile: pulumi.String("string"),
	SecurityProblemBasedEmailPayload: &dynatrace.AppsecNotificationSecurityProblemBasedEmailPayloadArgs{
		Body:    pulumi.String("string"),
		Subject: pulumi.String("string"),
	},
	SecurityProblemBasedJiraPayload: &dynatrace.AppsecNotificationSecurityProblemBasedJiraPayloadArgs{
		Description: pulumi.String("string"),
		Summary:     pulumi.String("string"),
	},
	SecurityProblemBasedWebhookPayload: &dynatrace.AppsecNotificationSecurityProblemBasedWebhookPayloadArgs{
		Payload: pulumi.String("string"),
	},
	AttackCandidateBasedJiraPayload: &dynatrace.AppsecNotificationAttackCandidateBasedJiraPayloadArgs{
		Description: pulumi.String("string"),
		Summary:     pulumi.String("string"),
	},
	AttackCandidateBasedEmailPayload: &dynatrace.AppsecNotificationAttackCandidateBasedEmailPayloadArgs{
		Body:    pulumi.String("string"),
		Subject: pulumi.String("string"),
	},
	WebhookConfiguration: &dynatrace.AppsecNotificationWebhookConfigurationArgs{
		AcceptAnyCertificate: pulumi.Bool(false),
		Url:                  pulumi.String("string"),
		Headers: &dynatrace.AppsecNotificationWebhookConfigurationHeadersArgs{
			Headers: dynatrace.AppsecNotificationWebhookConfigurationHeadersHeaderArray{
				&dynatrace.AppsecNotificationWebhookConfigurationHeadersHeaderArgs{
					Name:        pulumi.String("string"),
					Secret:      pulumi.Bool(false),
					SecretValue: pulumi.String("string"),
					Value:       pulumi.String("string"),
				},
			},
		},
	},
})
Copy
var appsecNotificationResource = new AppsecNotification("appsecNotificationResource", AppsecNotificationArgs.builder()
    .displayName("string")
    .type("string")
    .trigger("string")
    .enabled(false)
    .attackCandidateBasedWebhookPayload(AppsecNotificationAttackCandidateBasedWebhookPayloadArgs.builder()
        .payload("string")
        .build())
    .emailConfiguration(AppsecNotificationEmailConfigurationArgs.builder()
        .recipients("string")
        .bccRecipients("string")
        .ccRecipients("string")
        .build())
    .attackCandidateBasedAlertingProfile("string")
    .jiraConfiguration(AppsecNotificationJiraConfigurationArgs.builder()
        .apiToken("string")
        .issueType("string")
        .projectKey("string")
        .url("string")
        .username("string")
        .build())
    .securityProblemBasedAlertingProfile("string")
    .securityProblemBasedEmailPayload(AppsecNotificationSecurityProblemBasedEmailPayloadArgs.builder()
        .body("string")
        .subject("string")
        .build())
    .securityProblemBasedJiraPayload(AppsecNotificationSecurityProblemBasedJiraPayloadArgs.builder()
        .description("string")
        .summary("string")
        .build())
    .securityProblemBasedWebhookPayload(AppsecNotificationSecurityProblemBasedWebhookPayloadArgs.builder()
        .payload("string")
        .build())
    .attackCandidateBasedJiraPayload(AppsecNotificationAttackCandidateBasedJiraPayloadArgs.builder()
        .description("string")
        .summary("string")
        .build())
    .attackCandidateBasedEmailPayload(AppsecNotificationAttackCandidateBasedEmailPayloadArgs.builder()
        .body("string")
        .subject("string")
        .build())
    .webhookConfiguration(AppsecNotificationWebhookConfigurationArgs.builder()
        .acceptAnyCertificate(false)
        .url("string")
        .headers(AppsecNotificationWebhookConfigurationHeadersArgs.builder()
            .headers(AppsecNotificationWebhookConfigurationHeadersHeaderArgs.builder()
                .name("string")
                .secret(false)
                .secretValue("string")
                .value("string")
                .build())
            .build())
        .build())
    .build());
Copy
appsec_notification_resource = dynatrace.AppsecNotification("appsecNotificationResource",
    display_name="string",
    type="string",
    trigger="string",
    enabled=False,
    attack_candidate_based_webhook_payload={
        "payload": "string",
    },
    email_configuration={
        "recipients": ["string"],
        "bcc_recipients": ["string"],
        "cc_recipients": ["string"],
    },
    attack_candidate_based_alerting_profile="string",
    jira_configuration={
        "api_token": "string",
        "issue_type": "string",
        "project_key": "string",
        "url": "string",
        "username": "string",
    },
    security_problem_based_alerting_profile="string",
    security_problem_based_email_payload={
        "body": "string",
        "subject": "string",
    },
    security_problem_based_jira_payload={
        "description": "string",
        "summary": "string",
    },
    security_problem_based_webhook_payload={
        "payload": "string",
    },
    attack_candidate_based_jira_payload={
        "description": "string",
        "summary": "string",
    },
    attack_candidate_based_email_payload={
        "body": "string",
        "subject": "string",
    },
    webhook_configuration={
        "accept_any_certificate": False,
        "url": "string",
        "headers": {
            "headers": [{
                "name": "string",
                "secret": False,
                "secret_value": "string",
                "value": "string",
            }],
        },
    })
Copy
const appsecNotificationResource = new dynatrace.AppsecNotification("appsecNotificationResource", {
    displayName: "string",
    type: "string",
    trigger: "string",
    enabled: false,
    attackCandidateBasedWebhookPayload: {
        payload: "string",
    },
    emailConfiguration: {
        recipients: ["string"],
        bccRecipients: ["string"],
        ccRecipients: ["string"],
    },
    attackCandidateBasedAlertingProfile: "string",
    jiraConfiguration: {
        apiToken: "string",
        issueType: "string",
        projectKey: "string",
        url: "string",
        username: "string",
    },
    securityProblemBasedAlertingProfile: "string",
    securityProblemBasedEmailPayload: {
        body: "string",
        subject: "string",
    },
    securityProblemBasedJiraPayload: {
        description: "string",
        summary: "string",
    },
    securityProblemBasedWebhookPayload: {
        payload: "string",
    },
    attackCandidateBasedJiraPayload: {
        description: "string",
        summary: "string",
    },
    attackCandidateBasedEmailPayload: {
        body: "string",
        subject: "string",
    },
    webhookConfiguration: {
        acceptAnyCertificate: false,
        url: "string",
        headers: {
            headers: [{
                name: "string",
                secret: false,
                secretValue: "string",
                value: "string",
            }],
        },
    },
});
Copy
type: dynatrace:AppsecNotification
properties:
    attackCandidateBasedAlertingProfile: string
    attackCandidateBasedEmailPayload:
        body: string
        subject: string
    attackCandidateBasedJiraPayload:
        description: string
        summary: string
    attackCandidateBasedWebhookPayload:
        payload: string
    displayName: string
    emailConfiguration:
        bccRecipients:
            - string
        ccRecipients:
            - string
        recipients:
            - string
    enabled: false
    jiraConfiguration:
        apiToken: string
        issueType: string
        projectKey: string
        url: string
        username: string
    securityProblemBasedAlertingProfile: string
    securityProblemBasedEmailPayload:
        body: string
        subject: string
    securityProblemBasedJiraPayload:
        description: string
        summary: string
    securityProblemBasedWebhookPayload:
        payload: string
    trigger: string
    type: string
    webhookConfiguration:
        acceptAnyCertificate: false
        headers:
            headers:
                - name: string
                  secret: false
                  secretValue: string
                  value: string
        url: string
Copy

AppsecNotification Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The AppsecNotification resource accepts the following input properties:

DisplayName This property is required. string
Display name of the security notification
Enabled This property is required. bool
Enable/Disable the security notification, enabled (true) or disabled (false)
Trigger This property is required. string
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
Type This property is required. string
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
AttackCandidateBasedAlertingProfile string
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
AttackCandidateBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedEmailPayload
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
AttackCandidateBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedJiraPayload
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
AttackCandidateBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedWebhookPayload
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
EmailConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationEmailConfiguration
Email configuration, required when type equals EMAIL
JiraConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationJiraConfiguration
Jira configuration, required when type equals JIRA
SecurityProblemBasedAlertingProfile string
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
SecurityProblemBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedEmailPayload
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
SecurityProblemBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedJiraPayload
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
SecurityProblemBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedWebhookPayload
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
WebhookConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationWebhookConfiguration
Webhook configuration, required when type equals WEBHOOK
DisplayName This property is required. string
Display name of the security notification
Enabled This property is required. bool
Enable/Disable the security notification, enabled (true) or disabled (false)
Trigger This property is required. string
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
Type This property is required. string
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
AttackCandidateBasedAlertingProfile string
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
AttackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
AttackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
AttackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
EmailConfiguration AppsecNotificationEmailConfigurationArgs
Email configuration, required when type equals EMAIL
JiraConfiguration AppsecNotificationJiraConfigurationArgs
Jira configuration, required when type equals JIRA
SecurityProblemBasedAlertingProfile string
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
SecurityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
SecurityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
SecurityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
WebhookConfiguration AppsecNotificationWebhookConfigurationArgs
Webhook configuration, required when type equals WEBHOOK
displayName This property is required. String
Display name of the security notification
enabled This property is required. Boolean
Enable/Disable the security notification, enabled (true) or disabled (false)
trigger This property is required. String
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type This property is required. String
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
attackCandidateBasedAlertingProfile String
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
emailConfiguration AppsecNotificationEmailConfiguration
Email configuration, required when type equals EMAIL
jiraConfiguration AppsecNotificationJiraConfiguration
Jira configuration, required when type equals JIRA
securityProblemBasedAlertingProfile String
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
webhookConfiguration AppsecNotificationWebhookConfiguration
Webhook configuration, required when type equals WEBHOOK
displayName This property is required. string
Display name of the security notification
enabled This property is required. boolean
Enable/Disable the security notification, enabled (true) or disabled (false)
trigger This property is required. string
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type This property is required. string
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
attackCandidateBasedAlertingProfile string
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
emailConfiguration AppsecNotificationEmailConfiguration
Email configuration, required when type equals EMAIL
jiraConfiguration AppsecNotificationJiraConfiguration
Jira configuration, required when type equals JIRA
securityProblemBasedAlertingProfile string
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
webhookConfiguration AppsecNotificationWebhookConfiguration
Webhook configuration, required when type equals WEBHOOK
display_name This property is required. str
Display name of the security notification
enabled This property is required. bool
Enable/Disable the security notification, enabled (true) or disabled (false)
trigger This property is required. str
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type This property is required. str
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
attack_candidate_based_alerting_profile str
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attack_candidate_based_email_payload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attack_candidate_based_jira_payload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attack_candidate_based_webhook_payload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
email_configuration AppsecNotificationEmailConfigurationArgs
Email configuration, required when type equals EMAIL
jira_configuration AppsecNotificationJiraConfigurationArgs
Jira configuration, required when type equals JIRA
security_problem_based_alerting_profile str
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
security_problem_based_email_payload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
security_problem_based_jira_payload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
security_problem_based_webhook_payload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
webhook_configuration AppsecNotificationWebhookConfigurationArgs
Webhook configuration, required when type equals WEBHOOK
displayName This property is required. String
Display name of the security notification
enabled This property is required. Boolean
Enable/Disable the security notification, enabled (true) or disabled (false)
trigger This property is required. String
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type This property is required. String
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
attackCandidateBasedAlertingProfile String
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attackCandidateBasedEmailPayload Property Map
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attackCandidateBasedJiraPayload Property Map
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attackCandidateBasedWebhookPayload Property Map
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
emailConfiguration Property Map
Email configuration, required when type equals EMAIL
jiraConfiguration Property Map
Jira configuration, required when type equals JIRA
securityProblemBasedAlertingProfile String
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
securityProblemBasedEmailPayload Property Map
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
securityProblemBasedJiraPayload Property Map
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
securityProblemBasedWebhookPayload Property Map
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
webhookConfiguration Property Map
Webhook configuration, required when type equals WEBHOOK

Outputs

All input properties are implicitly available as output properties. Additionally, the AppsecNotification resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing AppsecNotification Resource

Get an existing AppsecNotification resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: AppsecNotificationState, opts?: CustomResourceOptions): AppsecNotification
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        attack_candidate_based_alerting_profile: Optional[str] = None,
        attack_candidate_based_email_payload: Optional[AppsecNotificationAttackCandidateBasedEmailPayloadArgs] = None,
        attack_candidate_based_jira_payload: Optional[AppsecNotificationAttackCandidateBasedJiraPayloadArgs] = None,
        attack_candidate_based_webhook_payload: Optional[AppsecNotificationAttackCandidateBasedWebhookPayloadArgs] = None,
        display_name: Optional[str] = None,
        email_configuration: Optional[AppsecNotificationEmailConfigurationArgs] = None,
        enabled: Optional[bool] = None,
        jira_configuration: Optional[AppsecNotificationJiraConfigurationArgs] = None,
        security_problem_based_alerting_profile: Optional[str] = None,
        security_problem_based_email_payload: Optional[AppsecNotificationSecurityProblemBasedEmailPayloadArgs] = None,
        security_problem_based_jira_payload: Optional[AppsecNotificationSecurityProblemBasedJiraPayloadArgs] = None,
        security_problem_based_webhook_payload: Optional[AppsecNotificationSecurityProblemBasedWebhookPayloadArgs] = None,
        trigger: Optional[str] = None,
        type: Optional[str] = None,
        webhook_configuration: Optional[AppsecNotificationWebhookConfigurationArgs] = None) -> AppsecNotification
func GetAppsecNotification(ctx *Context, name string, id IDInput, state *AppsecNotificationState, opts ...ResourceOption) (*AppsecNotification, error)
public static AppsecNotification Get(string name, Input<string> id, AppsecNotificationState? state, CustomResourceOptions? opts = null)
public static AppsecNotification get(String name, Output<String> id, AppsecNotificationState state, CustomResourceOptions options)
resources:  _:    type: dynatrace:AppsecNotification    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AttackCandidateBasedAlertingProfile string
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
AttackCandidateBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedEmailPayload
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
AttackCandidateBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedJiraPayload
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
AttackCandidateBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationAttackCandidateBasedWebhookPayload
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
DisplayName string
Display name of the security notification
EmailConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationEmailConfiguration
Email configuration, required when type equals EMAIL
Enabled bool
Enable/Disable the security notification, enabled (true) or disabled (false)
JiraConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationJiraConfiguration
Jira configuration, required when type equals JIRA
SecurityProblemBasedAlertingProfile string
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
SecurityProblemBasedEmailPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedEmailPayload
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
SecurityProblemBasedJiraPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedJiraPayload
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
SecurityProblemBasedWebhookPayload Pulumiverse.Dynatrace.Inputs.AppsecNotificationSecurityProblemBasedWebhookPayload
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
Trigger string
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
Type string
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
WebhookConfiguration Pulumiverse.Dynatrace.Inputs.AppsecNotificationWebhookConfiguration
Webhook configuration, required when type equals WEBHOOK
AttackCandidateBasedAlertingProfile string
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
AttackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
AttackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
AttackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
DisplayName string
Display name of the security notification
EmailConfiguration AppsecNotificationEmailConfigurationArgs
Email configuration, required when type equals EMAIL
Enabled bool
Enable/Disable the security notification, enabled (true) or disabled (false)
JiraConfiguration AppsecNotificationJiraConfigurationArgs
Jira configuration, required when type equals JIRA
SecurityProblemBasedAlertingProfile string
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
SecurityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
SecurityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
SecurityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
Trigger string
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
Type string
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
WebhookConfiguration AppsecNotificationWebhookConfigurationArgs
Webhook configuration, required when type equals WEBHOOK
attackCandidateBasedAlertingProfile String
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
displayName String
Display name of the security notification
emailConfiguration AppsecNotificationEmailConfiguration
Email configuration, required when type equals EMAIL
enabled Boolean
Enable/Disable the security notification, enabled (true) or disabled (false)
jiraConfiguration AppsecNotificationJiraConfiguration
Jira configuration, required when type equals JIRA
securityProblemBasedAlertingProfile String
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
trigger String
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type String
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
webhookConfiguration AppsecNotificationWebhookConfiguration
Webhook configuration, required when type equals WEBHOOK
attackCandidateBasedAlertingProfile string
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attackCandidateBasedEmailPayload AppsecNotificationAttackCandidateBasedEmailPayload
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attackCandidateBasedJiraPayload AppsecNotificationAttackCandidateBasedJiraPayload
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attackCandidateBasedWebhookPayload AppsecNotificationAttackCandidateBasedWebhookPayload
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
displayName string
Display name of the security notification
emailConfiguration AppsecNotificationEmailConfiguration
Email configuration, required when type equals EMAIL
enabled boolean
Enable/Disable the security notification, enabled (true) or disabled (false)
jiraConfiguration AppsecNotificationJiraConfiguration
Jira configuration, required when type equals JIRA
securityProblemBasedAlertingProfile string
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
securityProblemBasedEmailPayload AppsecNotificationSecurityProblemBasedEmailPayload
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
securityProblemBasedJiraPayload AppsecNotificationSecurityProblemBasedJiraPayload
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
securityProblemBasedWebhookPayload AppsecNotificationSecurityProblemBasedWebhookPayload
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
trigger string
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type string
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
webhookConfiguration AppsecNotificationWebhookConfiguration
Webhook configuration, required when type equals WEBHOOK
attack_candidate_based_alerting_profile str
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attack_candidate_based_email_payload AppsecNotificationAttackCandidateBasedEmailPayloadArgs
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attack_candidate_based_jira_payload AppsecNotificationAttackCandidateBasedJiraPayloadArgs
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attack_candidate_based_webhook_payload AppsecNotificationAttackCandidateBasedWebhookPayloadArgs
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
display_name str
Display name of the security notification
email_configuration AppsecNotificationEmailConfigurationArgs
Email configuration, required when type equals EMAIL
enabled bool
Enable/Disable the security notification, enabled (true) or disabled (false)
jira_configuration AppsecNotificationJiraConfigurationArgs
Jira configuration, required when type equals JIRA
security_problem_based_alerting_profile str
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
security_problem_based_email_payload AppsecNotificationSecurityProblemBasedEmailPayloadArgs
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
security_problem_based_jira_payload AppsecNotificationSecurityProblemBasedJiraPayloadArgs
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
security_problem_based_webhook_payload AppsecNotificationSecurityProblemBasedWebhookPayloadArgs
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
trigger str
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type str
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
webhook_configuration AppsecNotificationWebhookConfigurationArgs
Webhook configuration, required when type equals WEBHOOK
attackCandidateBasedAlertingProfile String
For attack candidate alerts, select an alerting profile to control the delivery of security notifications related to this integration.
attackCandidateBasedEmailPayload Property Map
Attack candidate based email payload, required when trigger equals ATTACK_CANDIDATE and type equals EMAIL
attackCandidateBasedJiraPayload Property Map
Attack candidate based Jira payload, required when trigger equals ATTACK_CANDIDATE and type equals JIRA
attackCandidateBasedWebhookPayload Property Map
Attack candidate based webhook payload, required when trigger equals ATTACK_CANDIDATE and type equals WEBHOOK
displayName String
Display name of the security notification
emailConfiguration Property Map
Email configuration, required when type equals EMAIL
enabled Boolean
Enable/Disable the security notification, enabled (true) or disabled (false)
jiraConfiguration Property Map
Jira configuration, required when type equals JIRA
securityProblemBasedAlertingProfile String
For security problem alerts, select an alerting profile to control the delivery of security notifications related to this integration.
securityProblemBasedEmailPayload Property Map
Security problem based email payload, required when trigger equals SECURITY_PROBLEM and type equals EMAIL
securityProblemBasedJiraPayload Property Map
Security problem based Jira payload, required when trigger equals SECURITY_PROBLEM and type equals JIRA
securityProblemBasedWebhookPayload Property Map
Security problem based webhook payload, required when trigger equals SECURITY_PROBLEM and type equals WEBHOOK
trigger String
Security alert type, possible Values: ATTACK_CANDIDATE, SECURITY_PROBLEM
type String
Notification type, possible Values: EMAIL, JIRA, WEBHOOK
webhookConfiguration Property Map
Webhook configuration, required when type equals WEBHOOK

Supporting Types

AppsecNotificationAttackCandidateBasedEmailPayload
, AppsecNotificationAttackCandidateBasedEmailPayloadArgs

Body This property is required. string

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

Subject This property is required. string
The subject of the email notifications.. Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
Body This property is required. string

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

Subject This property is required. string
The subject of the email notifications.. Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
body This property is required. String

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

subject This property is required. String
The subject of the email notifications.. Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
body This property is required. string

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

subject This property is required. string
The subject of the email notifications.. Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
body This property is required. str

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

subject This property is required. str
The subject of the email notifications.. Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.
body This property is required. String

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

subject This property is required. String
The subject of the email notifications.. Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

AppsecNotificationAttackCandidateBasedJiraPayload
, AppsecNotificationAttackCandidateBasedJiraPayloadArgs

Description This property is required. string

The description of the Jira issue to be created by this notification.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

Summary This property is required. string

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

Description This property is required. string

The description of the Jira issue to be created by this notification.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

Summary This property is required. string

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

description This property is required. String

The description of the Jira issue to be created by this notification.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

summary This property is required. String

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

description This property is required. string

The description of the Jira issue to be created by this notification.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

summary This property is required. string

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

description This property is required. str

The description of the Jira issue to be created by this notification.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

summary This property is required. str

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

description This property is required. String

The description of the Jira issue to be created by this notification.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

summary This property is required. String

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example, "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

AppsecNotificationAttackCandidateBasedWebhookPayload
, AppsecNotificationAttackCandidateBasedWebhookPayloadArgs

Payload This property is required. string

This is the content your notification message will include when users view it.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

Payload This property is required. string

This is the content your notification message will include when users view it.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

payload This property is required. String

This is the content your notification message will include when users view it.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

payload This property is required. string

This is the content your notification message will include when users view it.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

payload This property is required. str

This is the content your notification message will include when users view it.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

payload This property is required. String

This is the content your notification message will include when users view it.
In case a value of an attack is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{AttackDisplayId}: The unique identifier assigned by Dynatrace, for example: "A-1234".
{Title}: Location of the attack, for example: "com.dynatrace.Class.method():120"
{Type}: The type of attack, for example: "SQL Injection".
{AttackUrl}: URL of the attack in Dynatrace.
{ProcessGroupId}: Details about the process group attacked.
{EntryPoint}: The entry point of the attack into the process, for example: "/login". Can be empty.
{Status}: The status of the attack, for example: "Exploited"
{Timestamp}: When the attack happened.
{VulnerabilityName}: Name of the associated code-level vulnerability, for example: "InMemoryDatabaseCaller.getAccountInfo():51". Can be empty.

AppsecNotificationEmailConfiguration
, AppsecNotificationEmailConfigurationArgs

Recipients This property is required. List<string>
To
BccRecipients List<string>
BCC
CcRecipients List<string>
CC
Recipients This property is required. []string
To
BccRecipients []string
BCC
CcRecipients []string
CC
recipients This property is required. List<String>
To
bccRecipients List<String>
BCC
ccRecipients List<String>
CC
recipients This property is required. string[]
To
bccRecipients string[]
BCC
ccRecipients string[]
CC
recipients This property is required. Sequence[str]
To
bcc_recipients Sequence[str]
BCC
cc_recipients Sequence[str]
CC
recipients This property is required. List<String>
To
bccRecipients List<String>
BCC
ccRecipients List<String>
CC

AppsecNotificationJiraConfiguration
, AppsecNotificationJiraConfigurationArgs

ApiToken This property is required. string
The API token for the Jira profile. Using password authentication was deprecated by Jira
IssueType This property is required. string

The type of the Jira issue to be created by this notification.

To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

ProjectKey This property is required. string
The project key of the Jira issue to be created by this notification.
Url This property is required. string
The URL of the Jira API endpoint.
Username This property is required. string
The username of the Jira profile.
ApiToken This property is required. string
The API token for the Jira profile. Using password authentication was deprecated by Jira
IssueType This property is required. string

The type of the Jira issue to be created by this notification.

To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

ProjectKey This property is required. string
The project key of the Jira issue to be created by this notification.
Url This property is required. string
The URL of the Jira API endpoint.
Username This property is required. string
The username of the Jira profile.
apiToken This property is required. String
The API token for the Jira profile. Using password authentication was deprecated by Jira
issueType This property is required. String

The type of the Jira issue to be created by this notification.

To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

projectKey This property is required. String
The project key of the Jira issue to be created by this notification.
url This property is required. String
The URL of the Jira API endpoint.
username This property is required. String
The username of the Jira profile.
apiToken This property is required. string
The API token for the Jira profile. Using password authentication was deprecated by Jira
issueType This property is required. string

The type of the Jira issue to be created by this notification.

To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

projectKey This property is required. string
The project key of the Jira issue to be created by this notification.
url This property is required. string
The URL of the Jira API endpoint.
username This property is required. string
The username of the Jira profile.
api_token This property is required. str
The API token for the Jira profile. Using password authentication was deprecated by Jira
issue_type This property is required. str

The type of the Jira issue to be created by this notification.

To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

project_key This property is required. str
The project key of the Jira issue to be created by this notification.
url This property is required. str
The URL of the Jira API endpoint.
username This property is required. str
The username of the Jira profile.
apiToken This property is required. String
The API token for the Jira profile. Using password authentication was deprecated by Jira
issueType This property is required. String

The type of the Jira issue to be created by this notification.

To find all available issue types or create your own, in Jira, go to Project settings > Issue types.

projectKey This property is required. String
The project key of the Jira issue to be created by this notification.
url This property is required. String
The URL of the Jira API endpoint.
username This property is required. String
The username of the Jira profile.

AppsecNotificationSecurityProblemBasedEmailPayload
, AppsecNotificationSecurityProblemBasedEmailPayloadArgs

Body This property is required. string

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

Subject This property is required. string
The subject of the email notifications.. Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
Body This property is required. string

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

Subject This property is required. string
The subject of the email notifications.. Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
body This property is required. String

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

subject This property is required. String
The subject of the email notifications.. Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
body This property is required. string

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

subject This property is required. string
The subject of the email notifications.. Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
body This property is required. str

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

subject This property is required. str
The subject of the email notifications.. Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".
body This property is required. String

The template of the email notifications.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

subject This property is required. String
The subject of the email notifications.. Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

AppsecNotificationSecurityProblemBasedJiraPayload
, AppsecNotificationSecurityProblemBasedJiraPayloadArgs

Description This property is required. string

The description of the Jira issue to be created by this notification.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

Summary This property is required. string

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

Description This property is required. string

The description of the Jira issue to be created by this notification.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

Summary This property is required. string

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

description This property is required. String

The description of the Jira issue to be created by this notification.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

summary This property is required. String

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

description This property is required. string

The description of the Jira issue to be created by this notification.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

summary This property is required. string

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

description This property is required. str

The description of the Jira issue to be created by this notification.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

summary This property is required. str

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

description This property is required. String

The description of the Jira issue to be created by this notification.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

summary This property is required. String

The summary of the Jira issue to be created by this notification.. Note: The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

AppsecNotificationSecurityProblemBasedWebhookPayload
, AppsecNotificationSecurityProblemBasedWebhookPayloadArgs

Payload This property is required. string

This is the content your notification message will include when users view it.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

Payload This property is required. string

This is the content your notification message will include when users view it.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

payload This property is required. String

This is the content your notification message will include when users view it.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

payload This property is required. string

This is the content your notification message will include when users view it.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

payload This property is required. str

This is the content your notification message will include when users view it.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

payload This property is required. String

This is the content your notification message will include when users view it.
In case a value of a security problem is not set, the placeholder will be replaced by an empty string.. Note: Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.

Available placeholders:
{SecurityProblemId}: The unique identifier assigned by Dynatrace, for example, "S-1234".
{Title}: A short summary of the type of vulnerability that was found, for example, "Remote Code Execution".
{Description}: A more detailed description of the vulnerability.
{CvssScore}: CVSS score of the identified vulnerability, for example, "10.0". Can be empty. {DavisSecurityScore}: Davis Security Score is an enhanced risk-calculation score based on the CVSS, for example, "10.0".
{Severity}: The security problem severity, for example, "Critical" or "Medium".
{SecurityProblemUrl}: URL of the security problem in Dynatrace.
{AffectedEntities}: Details about the entities affected by the security problem in a json array.
{ManagementZones}: Comma-separated list of all management zones affected by the vulnerability at the time of detection.
{Tags}: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: "PROD, owner:John". Assign the tag's key in square brackets: {Tags[key]} to get all associated values. For example: "{Tags[owner]}" will be resolved as "John". Tags without an assigned value will be resolved as empty string.
{Exposed}: Describes whether one or more affected process is exposed to the public Internet. Can be "true" or "false".
{DataAssetsReachable}: Describes whether one or more affected process can reach data assets. Can be "true" or "false".
{ExploitAvailable}: Describes whether there's an exploit available for the vulnerability. Can be "true" or "false".

AppsecNotificationWebhookConfiguration
, AppsecNotificationWebhookConfigurationArgs

AcceptAnyCertificate This property is required. bool
Accept any SSL certificate (including self-signed and invalid certificates)
Url This property is required. string
Webhook endpoint URL
Headers Pulumiverse.Dynatrace.Inputs.AppsecNotificationWebhookConfigurationHeaders

Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

AcceptAnyCertificate This property is required. bool
Accept any SSL certificate (including self-signed and invalid certificates)
Url This property is required. string
Webhook endpoint URL
Headers AppsecNotificationWebhookConfigurationHeaders

Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

acceptAnyCertificate This property is required. Boolean
Accept any SSL certificate (including self-signed and invalid certificates)
url This property is required. String
Webhook endpoint URL
headers AppsecNotificationWebhookConfigurationHeaders

Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

acceptAnyCertificate This property is required. boolean
Accept any SSL certificate (including self-signed and invalid certificates)
url This property is required. string
Webhook endpoint URL
headers AppsecNotificationWebhookConfigurationHeaders

Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

accept_any_certificate This property is required. bool
Accept any SSL certificate (including self-signed and invalid certificates)
url This property is required. str
Webhook endpoint URL
headers AppsecNotificationWebhookConfigurationHeaders

Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

acceptAnyCertificate This property is required. Boolean
Accept any SSL certificate (including self-signed and invalid certificates)
url This property is required. String
Webhook endpoint URL
headers Property Map

Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.

Note that JSON-based webhook endpoints require the addition of the Content-Type: application/json header to enable escaping of special characters and to avoid malformed JSON content.

AppsecNotificationWebhookConfigurationHeaders
, AppsecNotificationWebhookConfigurationHeadersArgs

headers This property is required. List<Property Map>

AppsecNotificationWebhookConfigurationHeadersHeader
, AppsecNotificationWebhookConfigurationHeadersHeaderArgs

Name This property is required. string
no documentation available
Secret This property is required. bool
Secret HTTP header value
SecretValue string
The secret value of the HTTP header. May contain an empty value.
Value string
The value of the HTTP header. May contain an empty value.
Name This property is required. string
no documentation available
Secret This property is required. bool
Secret HTTP header value
SecretValue string
The secret value of the HTTP header. May contain an empty value.
Value string
The value of the HTTP header. May contain an empty value.
name This property is required. String
no documentation available
secret This property is required. Boolean
Secret HTTP header value
secretValue String
The secret value of the HTTP header. May contain an empty value.
value String
The value of the HTTP header. May contain an empty value.
name This property is required. string
no documentation available
secret This property is required. boolean
Secret HTTP header value
secretValue string
The secret value of the HTTP header. May contain an empty value.
value string
The value of the HTTP header. May contain an empty value.
name This property is required. str
no documentation available
secret This property is required. bool
Secret HTTP header value
secret_value str
The secret value of the HTTP header. May contain an empty value.
value str
The value of the HTTP header. May contain an empty value.
name This property is required. String
no documentation available
secret This property is required. Boolean
Secret HTTP header value
secretValue String
The secret value of the HTTP header. May contain an empty value.
value String
The value of the HTTP header. May contain an empty value.

Package Details

Repository
dynatrace pulumiverse/pulumi-dynatrace
License
Apache-2.0
Notes
This Pulumi package is based on the dynatrace Terraform Provider.