1. Packages
  2. Zscaler Internet Access (ZIA)
  3. API Docs
  4. SandboxBehavioralAnalysis
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

zia.SandboxBehavioralAnalysis

Explore with Pulumi AI

zia logo
Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler

    The zia_sandbox_behavioral_analysis resource updates the custom list of MD5 file hashes that are blocked by Sandbox. This overwrites a previously generated blocklist. If you need to completely erase the blocklist, submit an empty list.

    Note: Only the file types that are supported by Sandbox analysis can be blocked using MD5 hashes.

    Example Usage

    Add MD5 Hashes To Sandbox

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    
    // Add MD5 Hashes to Sandbox
    const _this = new zia.SandboxBehavioralAnalysis("this", {fileHashesToBeBlockeds: [
        "42914d6d213a20a2684064be5c80ffa9",
        "c0202cf6aeab8437c638533d14563d35",
    ]});
    
    import pulumi
    import zscaler_pulumi_zia as zia
    
    # Add MD5 Hashes to Sandbox
    this = zia.SandboxBehavioralAnalysis("this", file_hashes_to_be_blockeds=[
        "42914d6d213a20a2684064be5c80ffa9",
        "c0202cf6aeab8437c638533d14563d35",
    ])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// Add MD5 Hashes to Sandbox
    		_, err := zia.NewSandboxBehavioralAnalysis(ctx, "this", &zia.SandboxBehavioralAnalysisArgs{
    			FileHashesToBeBlockeds: pulumi.StringArray{
    				pulumi.String("42914d6d213a20a2684064be5c80ffa9"),
    				pulumi.String("c0202cf6aeab8437c638533d14563d35"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        // Add MD5 Hashes to Sandbox
        var @this = new Zia.SandboxBehavioralAnalysis("this", new()
        {
            FileHashesToBeBlockeds = new[]
            {
                "42914d6d213a20a2684064be5c80ffa9",
                "c0202cf6aeab8437c638533d14563d35",
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.SandboxBehavioralAnalysis;
    import com.pulumi.zia.SandboxBehavioralAnalysisArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // Add MD5 Hashes to Sandbox
            var this_ = new SandboxBehavioralAnalysis("this", SandboxBehavioralAnalysisArgs.builder()
                .fileHashesToBeBlockeds(            
                    "42914d6d213a20a2684064be5c80ffa9",
                    "c0202cf6aeab8437c638533d14563d35")
                .build());
    
        }
    }
    
    resources:
      # Add MD5 Hashes to Sandbox
      this:
        type: zia:SandboxBehavioralAnalysis
        properties:
          fileHashesToBeBlockeds:
            - 42914d6d213a20a2684064be5c80ffa9
            - c0202cf6aeab8437c638533d14563d35
    

    Remove All MD5 Hashes To Sandbox

    import * as pulumi from "@pulumi/pulumi";
    import * as zia from "@bdzscaler/pulumi-zia";
    
    // Remove All MD5 Hashes to Sandbox
    const _this = new zia.SandboxBehavioralAnalysis("this", {fileHashesToBeBlockeds: []});
    
    import pulumi
    import zscaler_pulumi_zia as zia
    
    # Remove All MD5 Hashes to Sandbox
    this = zia.SandboxBehavioralAnalysis("this", file_hashes_to_be_blockeds=[])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/zscaler/pulumi-zia/sdk/go/zia"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// Remove All MD5 Hashes to Sandbox
    		_, err := zia.NewSandboxBehavioralAnalysis(ctx, "this", &zia.SandboxBehavioralAnalysisArgs{
    			FileHashesToBeBlockeds: pulumi.StringArray{},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Zia = zscaler.PulumiPackage.Zia;
    
    return await Deployment.RunAsync(() => 
    {
        // Remove All MD5 Hashes to Sandbox
        var @this = new Zia.SandboxBehavioralAnalysis("this", new()
        {
            FileHashesToBeBlockeds = new[] {},
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.zia.SandboxBehavioralAnalysis;
    import com.pulumi.zia.SandboxBehavioralAnalysisArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // Remove All MD5 Hashes to Sandbox
            var this_ = new SandboxBehavioralAnalysis("this", SandboxBehavioralAnalysisArgs.builder()
                .fileHashesToBeBlockeds()
                .build());
    
        }
    }
    
    resources:
      # Remove All MD5 Hashes to Sandbox
      this:
        type: zia:SandboxBehavioralAnalysis
        properties:
          fileHashesToBeBlockeds: []
    

    Create SandboxBehavioralAnalysis Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SandboxBehavioralAnalysis(name: string, args?: SandboxBehavioralAnalysisArgs, opts?: CustomResourceOptions);
    @overload
    def SandboxBehavioralAnalysis(resource_name: str,
                                  args: Optional[SandboxBehavioralAnalysisArgs] = None,
                                  opts: Optional[ResourceOptions] = None)
    
    @overload
    def SandboxBehavioralAnalysis(resource_name: str,
                                  opts: Optional[ResourceOptions] = None,
                                  file_hashes_to_be_blockeds: Optional[Sequence[str]] = None)
    func NewSandboxBehavioralAnalysis(ctx *Context, name string, args *SandboxBehavioralAnalysisArgs, opts ...ResourceOption) (*SandboxBehavioralAnalysis, error)
    public SandboxBehavioralAnalysis(string name, SandboxBehavioralAnalysisArgs? args = null, CustomResourceOptions? opts = null)
    public SandboxBehavioralAnalysis(String name, SandboxBehavioralAnalysisArgs args)
    public SandboxBehavioralAnalysis(String name, SandboxBehavioralAnalysisArgs args, CustomResourceOptions options)
    
    type: zia:SandboxBehavioralAnalysis
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SandboxBehavioralAnalysisArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SandboxBehavioralAnalysisArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SandboxBehavioralAnalysisArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SandboxBehavioralAnalysisArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SandboxBehavioralAnalysisArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var sandboxBehavioralAnalysisResource = new Zia.SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", new()
    {
        FileHashesToBeBlockeds = new[]
        {
            "string",
        },
    });
    
    example, err := zia.NewSandboxBehavioralAnalysis(ctx, "sandboxBehavioralAnalysisResource", &zia.SandboxBehavioralAnalysisArgs{
    	FileHashesToBeBlockeds: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    })
    
    var sandboxBehavioralAnalysisResource = new SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", SandboxBehavioralAnalysisArgs.builder()
        .fileHashesToBeBlockeds("string")
        .build());
    
    sandbox_behavioral_analysis_resource = zia.SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", file_hashes_to_be_blockeds=["string"])
    
    const sandboxBehavioralAnalysisResource = new zia.SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", {fileHashesToBeBlockeds: ["string"]});
    
    type: zia:SandboxBehavioralAnalysis
    properties:
        fileHashesToBeBlockeds:
            - string
    

    SandboxBehavioralAnalysis Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SandboxBehavioralAnalysis resource accepts the following input properties:

    FileHashesToBeBlockeds List<string>
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    FileHashesToBeBlockeds []string
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    fileHashesToBeBlockeds List<String>
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    fileHashesToBeBlockeds string[]
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    file_hashes_to_be_blockeds Sequence[str]
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    fileHashesToBeBlockeds List<String>
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SandboxBehavioralAnalysis resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing SandboxBehavioralAnalysis Resource

    Get an existing SandboxBehavioralAnalysis resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SandboxBehavioralAnalysisState, opts?: CustomResourceOptions): SandboxBehavioralAnalysis
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            file_hashes_to_be_blockeds: Optional[Sequence[str]] = None) -> SandboxBehavioralAnalysis
    func GetSandboxBehavioralAnalysis(ctx *Context, name string, id IDInput, state *SandboxBehavioralAnalysisState, opts ...ResourceOption) (*SandboxBehavioralAnalysis, error)
    public static SandboxBehavioralAnalysis Get(string name, Input<string> id, SandboxBehavioralAnalysisState? state, CustomResourceOptions? opts = null)
    public static SandboxBehavioralAnalysis get(String name, Output<String> id, SandboxBehavioralAnalysisState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    FileHashesToBeBlockeds List<string>
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    FileHashesToBeBlockeds []string
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    fileHashesToBeBlockeds List<String>
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    fileHashesToBeBlockeds string[]
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    file_hashes_to_be_blockeds Sequence[str]
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
    fileHashesToBeBlockeds List<String>
    A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked

    Import

    Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.

    Visit

    zia_sandbox_behavioral_analysis can be imported by using sandbox_settings as the import ID.

    For example:

    $ pulumi import zia:index/sandboxBehavioralAnalysis:SandboxBehavioralAnalysis example sandbox_settings
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    zia zscaler/pulumi-zia
    License
    MIT
    Notes
    This Pulumi package is based on the zia Terraform Provider.
    zia logo
    Zscaler Internet Access v0.0.7 published on Tuesday, Jul 30, 2024 by Zscaler