zia.SandboxBehavioralAnalysis
Explore with Pulumi AI
The zia_sandbox_behavioral_analysis resource updates the custom list of MD5 file hashes that are blocked by Sandbox. This overwrites a previously generated blocklist. If you need to completely erase the blocklist, submit an empty list.
Note: Only the file types that are supported by Sandbox analysis can be blocked using MD5 hashes.
Example Usage
Add MD5 Hashes To Sandbox
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
// Add MD5 Hashes to Sandbox
const _this = new zia.SandboxBehavioralAnalysis("this", {fileHashesToBeBlockeds: [
"42914d6d213a20a2684064be5c80ffa9",
"c0202cf6aeab8437c638533d14563d35",
]});
import pulumi
import zscaler_pulumi_zia as zia
# Add MD5 Hashes to Sandbox
this = zia.SandboxBehavioralAnalysis("this", file_hashes_to_be_blockeds=[
"42914d6d213a20a2684064be5c80ffa9",
"c0202cf6aeab8437c638533d14563d35",
])
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// Add MD5 Hashes to Sandbox
_, err := zia.NewSandboxBehavioralAnalysis(ctx, "this", &zia.SandboxBehavioralAnalysisArgs{
FileHashesToBeBlockeds: pulumi.StringArray{
pulumi.String("42914d6d213a20a2684064be5c80ffa9"),
pulumi.String("c0202cf6aeab8437c638533d14563d35"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
// Add MD5 Hashes to Sandbox
var @this = new Zia.SandboxBehavioralAnalysis("this", new()
{
FileHashesToBeBlockeds = new[]
{
"42914d6d213a20a2684064be5c80ffa9",
"c0202cf6aeab8437c638533d14563d35",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.SandboxBehavioralAnalysis;
import com.pulumi.zia.SandboxBehavioralAnalysisArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// Add MD5 Hashes to Sandbox
var this_ = new SandboxBehavioralAnalysis("this", SandboxBehavioralAnalysisArgs.builder()
.fileHashesToBeBlockeds(
"42914d6d213a20a2684064be5c80ffa9",
"c0202cf6aeab8437c638533d14563d35")
.build());
}
}
resources:
# Add MD5 Hashes to Sandbox
this:
type: zia:SandboxBehavioralAnalysis
properties:
fileHashesToBeBlockeds:
- 42914d6d213a20a2684064be5c80ffa9
- c0202cf6aeab8437c638533d14563d35
Remove All MD5 Hashes To Sandbox
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
// Remove All MD5 Hashes to Sandbox
const _this = new zia.SandboxBehavioralAnalysis("this", {fileHashesToBeBlockeds: []});
import pulumi
import zscaler_pulumi_zia as zia
# Remove All MD5 Hashes to Sandbox
this = zia.SandboxBehavioralAnalysis("this", file_hashes_to_be_blockeds=[])
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// Remove All MD5 Hashes to Sandbox
_, err := zia.NewSandboxBehavioralAnalysis(ctx, "this", &zia.SandboxBehavioralAnalysisArgs{
FileHashesToBeBlockeds: pulumi.StringArray{},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
// Remove All MD5 Hashes to Sandbox
var @this = new Zia.SandboxBehavioralAnalysis("this", new()
{
FileHashesToBeBlockeds = new[] {},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.SandboxBehavioralAnalysis;
import com.pulumi.zia.SandboxBehavioralAnalysisArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// Remove All MD5 Hashes to Sandbox
var this_ = new SandboxBehavioralAnalysis("this", SandboxBehavioralAnalysisArgs.builder()
.fileHashesToBeBlockeds()
.build());
}
}
resources:
# Remove All MD5 Hashes to Sandbox
this:
type: zia:SandboxBehavioralAnalysis
properties:
fileHashesToBeBlockeds: []
Create SandboxBehavioralAnalysis Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SandboxBehavioralAnalysis(name: string, args?: SandboxBehavioralAnalysisArgs, opts?: CustomResourceOptions);
@overload
def SandboxBehavioralAnalysis(resource_name: str,
args: Optional[SandboxBehavioralAnalysisArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def SandboxBehavioralAnalysis(resource_name: str,
opts: Optional[ResourceOptions] = None,
file_hashes_to_be_blockeds: Optional[Sequence[str]] = None)
func NewSandboxBehavioralAnalysis(ctx *Context, name string, args *SandboxBehavioralAnalysisArgs, opts ...ResourceOption) (*SandboxBehavioralAnalysis, error)
public SandboxBehavioralAnalysis(string name, SandboxBehavioralAnalysisArgs? args = null, CustomResourceOptions? opts = null)
public SandboxBehavioralAnalysis(String name, SandboxBehavioralAnalysisArgs args)
public SandboxBehavioralAnalysis(String name, SandboxBehavioralAnalysisArgs args, CustomResourceOptions options)
type: zia:SandboxBehavioralAnalysis
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SandboxBehavioralAnalysisArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SandboxBehavioralAnalysisArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SandboxBehavioralAnalysisArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SandboxBehavioralAnalysisArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SandboxBehavioralAnalysisArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var sandboxBehavioralAnalysisResource = new Zia.SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", new()
{
FileHashesToBeBlockeds = new[]
{
"string",
},
});
example, err := zia.NewSandboxBehavioralAnalysis(ctx, "sandboxBehavioralAnalysisResource", &zia.SandboxBehavioralAnalysisArgs{
FileHashesToBeBlockeds: pulumi.StringArray{
pulumi.String("string"),
},
})
var sandboxBehavioralAnalysisResource = new SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", SandboxBehavioralAnalysisArgs.builder()
.fileHashesToBeBlockeds("string")
.build());
sandbox_behavioral_analysis_resource = zia.SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", file_hashes_to_be_blockeds=["string"])
const sandboxBehavioralAnalysisResource = new zia.SandboxBehavioralAnalysis("sandboxBehavioralAnalysisResource", {fileHashesToBeBlockeds: ["string"]});
type: zia:SandboxBehavioralAnalysis
properties:
fileHashesToBeBlockeds:
- string
SandboxBehavioralAnalysis Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SandboxBehavioralAnalysis resource accepts the following input properties:
- File
Hashes List<string>To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- File
Hashes []stringTo Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file
Hashes List<String>To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file
Hashes string[]To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file_
hashes_ Sequence[str]to_ be_ blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file
Hashes List<String>To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
Outputs
All input properties are implicitly available as output properties. Additionally, the SandboxBehavioralAnalysis resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SandboxBehavioralAnalysis Resource
Get an existing SandboxBehavioralAnalysis resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SandboxBehavioralAnalysisState, opts?: CustomResourceOptions): SandboxBehavioralAnalysis
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
file_hashes_to_be_blockeds: Optional[Sequence[str]] = None) -> SandboxBehavioralAnalysis
func GetSandboxBehavioralAnalysis(ctx *Context, name string, id IDInput, state *SandboxBehavioralAnalysisState, opts ...ResourceOption) (*SandboxBehavioralAnalysis, error)
public static SandboxBehavioralAnalysis Get(string name, Input<string> id, SandboxBehavioralAnalysisState? state, CustomResourceOptions? opts = null)
public static SandboxBehavioralAnalysis get(String name, Output<String> id, SandboxBehavioralAnalysisState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- File
Hashes List<string>To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- File
Hashes []stringTo Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file
Hashes List<String>To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file
Hashes string[]To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file_
hashes_ Sequence[str]to_ be_ blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
- file
Hashes List<String>To Be Blockeds - A custom list of unique MD5 file hashes that must be blocked by Sandbox. A maximum of 10000 MD5 file hashes can be blocked
Import
Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
Visit
zia_sandbox_behavioral_analysis can be imported by using sandbox_settings
as the import ID.
For example:
$ pulumi import zia:index/sandboxBehavioralAnalysis:SandboxBehavioralAnalysis example sandbox_settings
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.