Skip to content

Commit

Permalink
feat(securitycenter): update the api
Browse files Browse the repository at this point in the history
#### securitycenter:v1

The following keys were added:
- schemas.CloudLoggingEntry (Total Keys: 7)
- schemas.Finding.properties.logEntries (Total Keys: 2)
- schemas.LogEntry (Total Keys: 3)
- schemas.Object.properties.containers (Total Keys: 2)

#### securitycenter:v1beta1

The following keys were added:
- schemas.CloudLoggingEntry (Total Keys: 7)
- schemas.Finding.properties.logEntries (Total Keys: 2)
- schemas.LogEntry (Total Keys: 3)
- schemas.Object.properties.containers (Total Keys: 2)

#### securitycenter:v1beta2

The following keys were added:
- schemas.CloudLoggingEntry (Total Keys: 7)
- schemas.Finding.properties.logEntries (Total Keys: 2)
- schemas.LogEntry (Total Keys: 3)
- schemas.Object.properties.containers (Total Keys: 2)
  • Loading branch information
yoshi-automation committed Nov 7, 2023
1 parent 91a8519 commit 4a43e59
Show file tree
Hide file tree
Showing 9 changed files with 630 additions and 3 deletions.
Expand Up @@ -845,6 +845,20 @@ <h3>Method Details</h3>
],
&quot;objects&quot;: [ # Kubernetes objects related to the finding.
{ # Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
&quot;containers&quot;: [ # Pod containers associated with this finding, if any.
{ # Container associated with the finding.
&quot;createTime&quot;: &quot;A String&quot;, # The time that the container was created.
&quot;imageId&quot;: &quot;A String&quot;, # Optional container image ID, if provided by the container runtime. Uniquely identifies the container image launched using a container image digest.
&quot;labels&quot;: [ # Container labels, as provided by the container runtime.
{ # Represents a generic name-value label. A label has separate name and value fields to support filtering with the `contains()` function. For more information, see [Filtering on array-type fields](https://cloud.google.com/security-command-center/docs/how-to-api-list-findings#array-contains-filtering).
&quot;name&quot;: &quot;A String&quot;, # Name of the label.
&quot;value&quot;: &quot;A String&quot;, # Value that corresponds to the label&#x27;s name.
},
],
&quot;name&quot;: &quot;A String&quot;, # Name of the container.
&quot;uri&quot;: &quot;A String&quot;, # Container image URI provided when configuring a pod or container. This string can identify a container image version using mutable tags.
},
],
&quot;group&quot;: &quot;A String&quot;, # Kubernetes object group, such as &quot;policy.k8s.io/v1&quot;.
&quot;kind&quot;: &quot;A String&quot;, # Kubernetes object kind, such as “Namespace”.
&quot;name&quot;: &quot;A String&quot;, # Kubernetes object name. For details see https://kubernetes.io/docs/concepts/overview/working-with-objects/names/.
Expand Down Expand Up @@ -890,6 +904,16 @@ <h3>Method Details</h3>
&quot;name&quot;: &quot;A String&quot;, # The name of the load balancer associated with the finding.
},
],
&quot;logEntries&quot;: [ # Log entries that are relevant to the finding.
{ # An individual entry in a log.
&quot;cloudLoggingEntry&quot;: { # Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry) # An individual entry in a log stored in Cloud Logging.
&quot;insertId&quot;: &quot;A String&quot;, # A unique identifier for the log entry.
&quot;logId&quot;: &quot;A String&quot;, # The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.
&quot;resourceContainer&quot;: &quot;A String&quot;, # The organization, folder, or project of the monitored resource that produced this log entry.
&quot;timestamp&quot;: &quot;A String&quot;, # The time the event described by the log entry occurred.
},
},
],
&quot;mitreAttack&quot;: { # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org
&quot;additionalTactics&quot;: [ # Additional MITRE ATT&amp;CK tactics related to this finding, if any.
&quot;A String&quot;,
Expand Down
120 changes: 120 additions & 0 deletions docs/dyn/securitycenter_v1.folders.sources.findings.html

Large diffs are not rendered by default.

Expand Up @@ -845,6 +845,20 @@ <h3>Method Details</h3>
],
&quot;objects&quot;: [ # Kubernetes objects related to the finding.
{ # Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
&quot;containers&quot;: [ # Pod containers associated with this finding, if any.
{ # Container associated with the finding.
&quot;createTime&quot;: &quot;A String&quot;, # The time that the container was created.
&quot;imageId&quot;: &quot;A String&quot;, # Optional container image ID, if provided by the container runtime. Uniquely identifies the container image launched using a container image digest.
&quot;labels&quot;: [ # Container labels, as provided by the container runtime.
{ # Represents a generic name-value label. A label has separate name and value fields to support filtering with the `contains()` function. For more information, see [Filtering on array-type fields](https://cloud.google.com/security-command-center/docs/how-to-api-list-findings#array-contains-filtering).
&quot;name&quot;: &quot;A String&quot;, # Name of the label.
&quot;value&quot;: &quot;A String&quot;, # Value that corresponds to the label&#x27;s name.
},
],
&quot;name&quot;: &quot;A String&quot;, # Name of the container.
&quot;uri&quot;: &quot;A String&quot;, # Container image URI provided when configuring a pod or container. This string can identify a container image version using mutable tags.
},
],
&quot;group&quot;: &quot;A String&quot;, # Kubernetes object group, such as &quot;policy.k8s.io/v1&quot;.
&quot;kind&quot;: &quot;A String&quot;, # Kubernetes object kind, such as “Namespace”.
&quot;name&quot;: &quot;A String&quot;, # Kubernetes object name. For details see https://kubernetes.io/docs/concepts/overview/working-with-objects/names/.
Expand Down Expand Up @@ -890,6 +904,16 @@ <h3>Method Details</h3>
&quot;name&quot;: &quot;A String&quot;, # The name of the load balancer associated with the finding.
},
],
&quot;logEntries&quot;: [ # Log entries that are relevant to the finding.
{ # An individual entry in a log.
&quot;cloudLoggingEntry&quot;: { # Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry) # An individual entry in a log stored in Cloud Logging.
&quot;insertId&quot;: &quot;A String&quot;, # A unique identifier for the log entry.
&quot;logId&quot;: &quot;A String&quot;, # The type of the log (part of `log_name`. `log_name` is the resource name of the log to which this log entry belongs). For example: `cloudresourcemanager.googleapis.com/activity`. Note that this field is not URL-encoded, unlike the `LOG_ID` field in `LogEntry`.
&quot;resourceContainer&quot;: &quot;A String&quot;, # The organization, folder, or project of the monitored resource that produced this log entry.
&quot;timestamp&quot;: &quot;A String&quot;, # The time the event described by the log entry occurred.
},
},
],
&quot;mitreAttack&quot;: { # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org # MITRE ATT&amp;CK tactics and techniques related to this finding. See: https://attack.mitre.org
&quot;additionalTactics&quot;: [ # Additional MITRE ATT&amp;CK tactics related to this finding, if any.
&quot;A String&quot;,
Expand Down

0 comments on commit 4a43e59

Please sign in to comment.