Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 4a43e59

Browse files
committedNov 7, 2023
feat(securitycenter): update the api
#### securitycenter:v1 The following keys were added: - schemas.CloudLoggingEntry (Total Keys: 7) - schemas.Finding.properties.logEntries (Total Keys: 2) - schemas.LogEntry (Total Keys: 3) - schemas.Object.properties.containers (Total Keys: 2) #### securitycenter:v1beta1 The following keys were added: - schemas.CloudLoggingEntry (Total Keys: 7) - schemas.Finding.properties.logEntries (Total Keys: 2) - schemas.LogEntry (Total Keys: 3) - schemas.Object.properties.containers (Total Keys: 2) #### securitycenter:v1beta2 The following keys were added: - schemas.CloudLoggingEntry (Total Keys: 7) - schemas.Finding.properties.logEntries (Total Keys: 2) - schemas.LogEntry (Total Keys: 3) - schemas.Object.properties.containers (Total Keys: 2)
1 parent 91a8519 commit 4a43e59

9 files changed

+630
-3
lines changed
 

‎docs/dyn/securitycenter_v1.folders.securityHealthAnalyticsSettings.customModules.html

+24
Original file line numberDiff line numberDiff line change
@@ -845,6 +845,20 @@ <h3>Method Details</h3>
845845
],
846846
&quot;objects&quot;: [ # Kubernetes objects related to the finding.
847847
{ # Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
848+
&quot;containers&quot;: [ # Pod containers associated with this finding, if any.
849+
{ # Container associated with the finding.
850+
&quot;createTime&quot;: &quot;A String&quot;, # The time that the container was created.
851+
&quot;imageId&quot;: &quot;A String&quot;, # Optional container image ID, if provided by the container runtime. Uniquely identifies the container image launched using a container image digest.
852+
&quot;labels&quot;: [ # Container labels, as provided by the container runtime.
853+
{ # Represents a generic name-value label. A label has separate name and value fields to support filtering with the `contains()` function. For more information, see [Filtering on array-type fields](https://cloud.google.com/security-command-center/docs/how-to-api-list-findings#array-contains-filtering).
854+
&quot;name&quot;: &quot;A String&quot;, # Name of the label.
855+
&quot;value&quot;: &quot;A String&quot;, # Value that corresponds to the label&#x27;s name.
856+
},
857+
],
858+
&quot;name&quot;: &quot;A String&quot;, # Name of the container.
859+
&quot;uri&quot;: &quot;A String&quot;, # Container image URI provided when configuring a pod or container. This string can identify a container image version using mutable tags.
860+
},
861+
],
848862
&quot;group&quot;: &quot;A String&quot;, # Kubernetes object group, such as &quot;policy.k8s.io/v1&quot;.
849863
&quot;kind&quot;: &quot;A String&quot;, # Kubernetes object kind, such as “Namespace”.
850864
&quot;name&quot;: &quot;A String&quot;, # Kubernetes object name. For details see https://kubernetes.io/docs/concepts/overview/working-with-objects/names/.
@@ -890,6 +904,16 @@ <h3>Method Details</h3>
890904
&quot;name&quot;: &quot;A String&quot;, # The name of the load balancer associated with the finding.
891905
},
892906
],
907+
&quot;logEntries&quot;: [ # Log entries that are relevant to the finding.
908+
{ # An individual entry in a log.
909+
&quot;cloudLoggingEntry&quot;: { # Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry) # An individual entry in a log stored in Cloud Logging.
910+
&quot;insertId&quot;: &quot;A String&quot;, # A unique identifier for the log entry.
911+
&quot;logId&quot;: &quot;A String&quot;, # The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.
912+
&quot;resourceContainer&quot;: &quot;A String&quot;, # The organization, folder, or project of the monitored resource that produced this log entry.
913+
&quot;timestamp&quot;: &quot;A String&quot;, # The time the event described by the log entry occurred.
914+
},
915+
},
916+
],
893917
&quot;mitreAttack&quot;: { # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org
894918
&quot;additionalTactics&quot;: [ # Additional MITRE ATT&amp;CK tactics related to this finding, if any.
895919
&quot;A String&quot;,

‎docs/dyn/securitycenter_v1.folders.sources.findings.html

+120
Large diffs are not rendered by default.

‎docs/dyn/securitycenter_v1.organizations.securityHealthAnalyticsSettings.customModules.html

+24
Original file line numberDiff line numberDiff line change
@@ -845,6 +845,20 @@ <h3>Method Details</h3>
845845
],
846846
&quot;objects&quot;: [ # Kubernetes objects related to the finding.
847847
{ # Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
848+
&quot;containers&quot;: [ # Pod containers associated with this finding, if any.
849+
{ # Container associated with the finding.
850+
&quot;createTime&quot;: &quot;A String&quot;, # The time that the container was created.
851+
&quot;imageId&quot;: &quot;A String&quot;, # Optional container image ID, if provided by the container runtime. Uniquely identifies the container image launched using a container image digest.
852+
&quot;labels&quot;: [ # Container labels, as provided by the container runtime.
853+
{ # Represents a generic name-value label. A label has separate name and value fields to support filtering with the `contains()` function. For more information, see [Filtering on array-type fields](https://cloud.google.com/security-command-center/docs/how-to-api-list-findings#array-contains-filtering).
854+
&quot;name&quot;: &quot;A String&quot;, # Name of the label.
855+
&quot;value&quot;: &quot;A String&quot;, # Value that corresponds to the label&#x27;s name.
856+
},
857+
],
858+
&quot;name&quot;: &quot;A String&quot;, # Name of the container.
859+
&quot;uri&quot;: &quot;A String&quot;, # Container image URI provided when configuring a pod or container. This string can identify a container image version using mutable tags.
860+
},
861+
],
848862
&quot;group&quot;: &quot;A String&quot;, # Kubernetes object group, such as &quot;policy.k8s.io/v1&quot;.
849863
&quot;kind&quot;: &quot;A String&quot;, # Kubernetes object kind, such as “Namespace”.
850864
&quot;name&quot;: &quot;A String&quot;, # Kubernetes object name. For details see https://kubernetes.io/docs/concepts/overview/working-with-objects/names/.
@@ -890,6 +904,16 @@ <h3>Method Details</h3>
890904
&quot;name&quot;: &quot;A String&quot;, # The name of the load balancer associated with the finding.
891905
},
892906
],
907+
&quot;logEntries&quot;: [ # Log entries that are relevant to the finding.
908+
{ # An individual entry in a log.
909+
&quot;cloudLoggingEntry&quot;: { # Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry) # An individual entry in a log stored in Cloud Logging.
910+
&quot;insertId&quot;: &quot;A String&quot;, # A unique identifier for the log entry.
911+
&quot;logId&quot;: &quot;A String&quot;, # The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.
912+
&quot;resourceContainer&quot;: &quot;A String&quot;, # The organization, folder, or project of the monitored resource that produced this log entry.
913+
&quot;timestamp&quot;: &quot;A String&quot;, # The time the event described by the log entry occurred.
914+
},
915+
},
916+
],
893917
&quot;mitreAttack&quot;: { # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org
894918
&quot;additionalTactics&quot;: [ # Additional MITRE ATT&amp;CK tactics related to this finding, if any.
895919
&quot;A String&quot;,

‎docs/dyn/securitycenter_v1.organizations.sources.findings.html

+168
Large diffs are not rendered by default.

‎docs/dyn/securitycenter_v1.projects.securityHealthAnalyticsSettings.customModules.html

+24
Original file line numberDiff line numberDiff line change
@@ -845,6 +845,20 @@ <h3>Method Details</h3>
845845
],
846846
&quot;objects&quot;: [ # Kubernetes objects related to the finding.
847847
{ # Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
848+
&quot;containers&quot;: [ # Pod containers associated with this finding, if any.
849+
{ # Container associated with the finding.
850+
&quot;createTime&quot;: &quot;A String&quot;, # The time that the container was created.
851+
&quot;imageId&quot;: &quot;A String&quot;, # Optional container image ID, if provided by the container runtime. Uniquely identifies the container image launched using a container image digest.
852+
&quot;labels&quot;: [ # Container labels, as provided by the container runtime.
853+
{ # Represents a generic name-value label. A label has separate name and value fields to support filtering with the `contains()` function. For more information, see [Filtering on array-type fields](https://cloud.google.com/security-command-center/docs/how-to-api-list-findings#array-contains-filtering).
854+
&quot;name&quot;: &quot;A String&quot;, # Name of the label.
855+
&quot;value&quot;: &quot;A String&quot;, # Value that corresponds to the label&#x27;s name.
856+
},
857+
],
858+
&quot;name&quot;: &quot;A String&quot;, # Name of the container.
859+
&quot;uri&quot;: &quot;A String&quot;, # Container image URI provided when configuring a pod or container. This string can identify a container image version using mutable tags.
860+
},
861+
],
848862
&quot;group&quot;: &quot;A String&quot;, # Kubernetes object group, such as &quot;policy.k8s.io/v1&quot;.
849863
&quot;kind&quot;: &quot;A String&quot;, # Kubernetes object kind, such as “Namespace”.
850864
&quot;name&quot;: &quot;A String&quot;, # Kubernetes object name. For details see https://kubernetes.io/docs/concepts/overview/working-with-objects/names/.
@@ -890,6 +904,16 @@ <h3>Method Details</h3>
890904
&quot;name&quot;: &quot;A String&quot;, # The name of the load balancer associated with the finding.
891905
},
892906
],
907+
&quot;logEntries&quot;: [ # Log entries that are relevant to the finding.
908+
{ # An individual entry in a log.
909+
&quot;cloudLoggingEntry&quot;: { # Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry) # An individual entry in a log stored in Cloud Logging.
910+
&quot;insertId&quot;: &quot;A String&quot;, # A unique identifier for the log entry.
911+
&quot;logId&quot;: &quot;A String&quot;, # The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.
912+
&quot;resourceContainer&quot;: &quot;A String&quot;, # The organization, folder, or project of the monitored resource that produced this log entry.
913+
&quot;timestamp&quot;: &quot;A String&quot;, # The time the event described by the log entry occurred.
914+
},
915+
},
916+
],
893917
&quot;mitreAttack&quot;: { # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org
894918
&quot;additionalTactics&quot;: [ # Additional MITRE ATT&amp;CK tactics related to this finding, if any.
895919
&quot;A String&quot;,

‎docs/dyn/securitycenter_v1.projects.sources.findings.html

+120
Large diffs are not rendered by default.

‎googleapiclient/discovery_cache/documents/securitycenter.v1.json

+50-1
Original file line numberDiff line numberDiff line change
@@ -5110,7 +5110,7 @@
51105110
}
51115111
}
51125112
},
5113-
"revision": "20231026",
5113+
"revision": "20231102",
51145114
"rootUrl": "https://securitycenter.googleapis.com/",
51155115
"schemas": {
51165116
"Access": {
@@ -5615,6 +5615,30 @@
56155615
},
56165616
"type": "object"
56175617
},
5618+
"CloudLoggingEntry": {
5619+
"description": "Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry)",
5620+
"id": "CloudLoggingEntry",
5621+
"properties": {
5622+
"insertId": {
5623+
"description": "A unique identifier for the log entry.",
5624+
"type": "string"
5625+
},
5626+
"logId": {
5627+
"description": "The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.",
5628+
"type": "string"
5629+
},
5630+
"resourceContainer": {
5631+
"description": "The organization, folder, or project of the monitored resource that produced this log entry.",
5632+
"type": "string"
5633+
},
5634+
"timestamp": {
5635+
"description": "The time the event described by the log entry occurred.",
5636+
"format": "google-datetime",
5637+
"type": "string"
5638+
}
5639+
},
5640+
"type": "object"
5641+
},
56185642
"Compliance": {
56195643
"description": "Contains compliance information about a security standard indicating unmet recommendations.",
56205644
"id": "Compliance",
@@ -6324,6 +6348,13 @@
63246348
},
63256349
"type": "array"
63266350
},
6351+
"logEntries": {
6352+
"description": "Log entries that are relevant to the finding.",
6353+
"items": {
6354+
"$ref": "LogEntry"
6355+
},
6356+
"type": "array"
6357+
},
63276358
"mitreAttack": {
63286359
"$ref": "MitreAttack",
63296360
"description": "MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org"
@@ -7892,6 +7923,17 @@
78927923
},
78937924
"type": "object"
78947925
},
7926+
"LogEntry": {
7927+
"description": "An individual entry in a log.",
7928+
"id": "LogEntry",
7929+
"properties": {
7930+
"cloudLoggingEntry": {
7931+
"$ref": "CloudLoggingEntry",
7932+
"description": "An individual entry in a log stored in Cloud Logging."
7933+
}
7934+
},
7935+
"type": "object"
7936+
},
78957937
"MemoryHashSignature": {
78967938
"description": "A signature corresponding to memory page hashes.",
78977939
"id": "MemoryHashSignature",
@@ -8231,6 +8273,13 @@
82318273
"description": "Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.",
82328274
"id": "Object",
82338275
"properties": {
8276+
"containers": {
8277+
"description": "Pod containers associated with this finding, if any.",
8278+
"items": {
8279+
"$ref": "Container"
8280+
},
8281+
"type": "array"
8282+
},
82348283
"group": {
82358284
"description": "Kubernetes object group, such as \"policy.k8s.io/v1\".",
82368285
"type": "string"

‎googleapiclient/discovery_cache/documents/securitycenter.v1beta1.json

+50-1
Original file line numberDiff line numberDiff line change
@@ -896,7 +896,7 @@
896896
}
897897
}
898898
},
899-
"revision": "20231026",
899+
"revision": "20231102",
900900
"rootUrl": "https://securitycenter.googleapis.com/",
901901
"schemas": {
902902
"Access": {
@@ -1227,6 +1227,30 @@
12271227
},
12281228
"type": "object"
12291229
},
1230+
"CloudLoggingEntry": {
1231+
"description": "Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry)",
1232+
"id": "CloudLoggingEntry",
1233+
"properties": {
1234+
"insertId": {
1235+
"description": "A unique identifier for the log entry.",
1236+
"type": "string"
1237+
},
1238+
"logId": {
1239+
"description": "The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.",
1240+
"type": "string"
1241+
},
1242+
"resourceContainer": {
1243+
"description": "The organization, folder, or project of the monitored resource that produced this log entry.",
1244+
"type": "string"
1245+
},
1246+
"timestamp": {
1247+
"description": "The time the event described by the log entry occurred.",
1248+
"format": "google-datetime",
1249+
"type": "string"
1250+
}
1251+
},
1252+
"type": "object"
1253+
},
12301254
"Compliance": {
12311255
"description": "Contains compliance information about a security standard indicating unmet recommendations.",
12321256
"id": "Compliance",
@@ -1829,6 +1853,13 @@
18291853
},
18301854
"type": "array"
18311855
},
1856+
"logEntries": {
1857+
"description": "Log entries that are relevant to the finding.",
1858+
"items": {
1859+
"$ref": "LogEntry"
1860+
},
1861+
"type": "array"
1862+
},
18321863
"mitreAttack": {
18331864
"$ref": "MitreAttack",
18341865
"description": "MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org"
@@ -3235,6 +3266,17 @@
32353266
},
32363267
"type": "object"
32373268
},
3269+
"LogEntry": {
3270+
"description": "An individual entry in a log.",
3271+
"id": "LogEntry",
3272+
"properties": {
3273+
"cloudLoggingEntry": {
3274+
"$ref": "CloudLoggingEntry",
3275+
"description": "An individual entry in a log stored in Cloud Logging."
3276+
}
3277+
},
3278+
"type": "object"
3279+
},
32383280
"MemoryHashSignature": {
32393281
"description": "A signature corresponding to memory page hashes.",
32403282
"id": "MemoryHashSignature",
@@ -3546,6 +3588,13 @@
35463588
"description": "Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.",
35473589
"id": "Object",
35483590
"properties": {
3591+
"containers": {
3592+
"description": "Pod containers associated with this finding, if any.",
3593+
"items": {
3594+
"$ref": "Container"
3595+
},
3596+
"type": "array"
3597+
},
35493598
"group": {
35503599
"description": "Kubernetes object group, such as \"policy.k8s.io/v1\".",
35513600
"type": "string"

‎googleapiclient/discovery_cache/documents/securitycenter.v1beta2.json

+50-1
Original file line numberDiff line numberDiff line change
@@ -1906,7 +1906,7 @@
19061906
}
19071907
}
19081908
},
1909-
"revision": "20231026",
1909+
"revision": "20231102",
19101910
"rootUrl": "https://securitycenter.googleapis.com/",
19111911
"schemas": {
19121912
"Access": {
@@ -2097,6 +2097,30 @@
20972097
},
20982098
"type": "object"
20992099
},
2100+
"CloudLoggingEntry": {
2101+
"description": "Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry)",
2102+
"id": "CloudLoggingEntry",
2103+
"properties": {
2104+
"insertId": {
2105+
"description": "A unique identifier for the log entry.",
2106+
"type": "string"
2107+
},
2108+
"logId": {
2109+
"description": "The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.",
2110+
"type": "string"
2111+
},
2112+
"resourceContainer": {
2113+
"description": "The organization, folder, or project of the monitored resource that produced this log entry.",
2114+
"type": "string"
2115+
},
2116+
"timestamp": {
2117+
"description": "The time the event described by the log entry occurred.",
2118+
"format": "google-datetime",
2119+
"type": "string"
2120+
}
2121+
},
2122+
"type": "object"
2123+
},
21002124
"Compliance": {
21012125
"description": "Contains compliance information about a security standard indicating unmet recommendations.",
21022126
"id": "Compliance",
@@ -2846,6 +2870,13 @@
28462870
},
28472871
"type": "array"
28482872
},
2873+
"logEntries": {
2874+
"description": "Log entries that are relevant to the finding.",
2875+
"items": {
2876+
"$ref": "LogEntry"
2877+
},
2878+
"type": "array"
2879+
},
28492880
"mitreAttack": {
28502881
"$ref": "MitreAttack",
28512882
"description": "MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org"
@@ -3899,6 +3930,17 @@
38993930
},
39003931
"type": "object"
39013932
},
3933+
"LogEntry": {
3934+
"description": "An individual entry in a log.",
3935+
"id": "LogEntry",
3936+
"properties": {
3937+
"cloudLoggingEntry": {
3938+
"$ref": "CloudLoggingEntry",
3939+
"description": "An individual entry in a log stored in Cloud Logging."
3940+
}
3941+
},
3942+
"type": "object"
3943+
},
39023944
"MemoryHashSignature": {
39033945
"description": "A signature corresponding to memory page hashes.",
39043946
"id": "MemoryHashSignature",
@@ -4210,6 +4252,13 @@
42104252
"description": "Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.",
42114253
"id": "Object",
42124254
"properties": {
4255+
"containers": {
4256+
"description": "Pod containers associated with this finding, if any.",
4257+
"items": {
4258+
"$ref": "Container"
4259+
},
4260+
"type": "array"
4261+
},
42134262
"group": {
42144263
"description": "Kubernetes object group, such as \"policy.k8s.io/v1\".",
42154264
"type": "string"

0 commit comments

Comments
 (0)
Please sign in to comment.