{"name":"lacework","version":"2.2.0","description":"A Pulumi provider dynamically bridged from lacework.","attribution":"This Pulumi package is based on the [`lacework` Terraform Provider](https://github.com/lacework/terraform-provider-lacework).","repository":"https://github.com/lacework/terraform-provider-lacework","publisher":"lacework","meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"language":{"csharp":{"compatibility":"tfbridge20","liftSingleValueMethodReturns":true,"respectSchemaVersion":true},"go":{"generateExtraInputTypes":true,"importBasePath":"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework","liftSingleValueMethodReturns":true,"respectSchemaVersion":true,"rootPackageName":"lacework"},"java":{"basePackage":"","buildFiles":"","gradleNexusPublishPluginVersion":"","gradleTest":""},"nodejs":{"compatibility":"tfbridge20","disableUnionOutputTypes":true,"liftSingleValueMethodReturns":true,"packageDescription":"A Pulumi provider dynamically bridged from lacework.","readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/lacework/terraform-provider-lacework)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-lacework` repo](https://github.com/lacework/terraform-provider-lacework/issues).","respectSchemaVersion":true},"python":{"compatibility":"tfbridge20","pyproject":{"enabled":true},"readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/lacework/terraform-provider-lacework)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-lacework` repo](https://github.com/lacework/terraform-provider-lacework/issues).","respectSchemaVersion":true}},"config":{"variables":{"account":{"type":"string","description":"Lacework account subdomain of URL (i.e. \u003cACCOUNT\u003e.lacework.net)"},"apiKey":{"type":"string","description":"Lacework API access key"},"apiSecret":{"type":"string","description":"Lacework API access secret"},"apiToken":{"type":"string","description":"Lacework API access token"},"organization":{"type":"boolean","description":"Set it to true to access organization level data sets (org admins only)"},"profile":{"type":"string","description":"Lacework profile name to use, profiles are configured at $HOME/.lacework.toml via the Lacework CLI"},"subaccount":{"type":"string","description":"The sub-account name inside your organization (org admins only)"}}},"types":{"lacework:index/AlertChannelAwsS3Credentials:AlertChannelAwsS3Credentials":{"properties":{"externalId":{"type":"string","description":"The external ID for the IAM role.\n"},"roleArn":{"type":"string","description":"The ARN of the IAM role.\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/AlertChannelGcpPubSubCredentials:AlertChannelGcpPubSubCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","description":"The service account private key.\n","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n","secret":true}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/AlertChannelSplunkEventData:AlertChannelSplunkEventData":{"properties":{"index":{"type":"string","description":"Index to store generated events.\n"},"source":{"type":"string","description":"The Splunk source.\n"}},"type":"object","required":["index","source"]},"lacework:index/AlertProfileAlert:AlertProfileAlert":{"properties":{"description":{"type":"string","description":"The summary of the resulting alert.\n"},"eventName":{"type":"string","description":"The name of the resulting alert.\n"},"name":{"type":"string","description":"The name that policies can use to refer to this template when generating alerts.\n"},"subject":{"type":"string","description":"A high-level observation of the resulting alert.\n"}},"type":"object","required":["description","eventName","name","subject"]},"lacework:index/IntegrationAwsAgentlessScanningCredentials:IntegrationAwsAgentlessScanningCredentials":{"properties":{"externalId":{"type":"string","description":"The external id.\n"},"roleArn":{"type":"string","description":"The role arn.\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/IntegrationAwsCfgCredentials:IntegrationAwsCfgCredentials":{"properties":{"externalId":{"type":"string","description":"The external ID for the IAM role.\n"},"roleArn":{"type":"string","description":"The ARN of the IAM role.\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/IntegrationAwsCtCredentials:IntegrationAwsCtCredentials":{"properties":{"externalId":{"type":"string","description":"The external ID for the IAM role.\n"},"roleArn":{"type":"string","description":"The ARN of the IAM role.\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/IntegrationAwsCtOrgAccountMappings:IntegrationAwsCtOrgAccountMappings":{"properties":{"defaultLaceworkAccount":{"type":"string","description":"The default Lacework account name where any non-mapped AWS account will appear.\n"},"mappings":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtOrgAccountMappingsMapping:IntegrationAwsCtOrgAccountMappingsMapping"},"description":"A map of AWS accounts to Lacework account. This can be specified multiple times to map multiple Lacework accounts. See Mapping below for details.\n"}},"type":"object","required":["defaultLaceworkAccount","mappings"]},"lacework:index/IntegrationAwsCtOrgAccountMappingsMapping:IntegrationAwsCtOrgAccountMappingsMapping":{"properties":{"awsAccounts":{"type":"array","items":{"type":"string"},"description":"The list of AWS account IDs to map.\n"},"laceworkAccount":{"type":"string","description":"The Lacework account name where the CloudTrail activity from the selected AWS accounts will appear.\n"}},"type":"object","required":["awsAccounts","laceworkAccount"]},"lacework:index/IntegrationAwsDspmCredentials:IntegrationAwsDspmCredentials":{"properties":{"externalId":{"type":"string","description":"The external id.\n"},"roleArn":{"type":"string","description":"The ARN of the IAM role used by the DSPM .\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/IntegrationAwsEksAuditLogCredentials:IntegrationAwsEksAuditLogCredentials":{"properties":{"externalId":{"type":"string","description":"The external ID for the IAM role.\n"},"roleArn":{"type":"string","description":"The ARN of the IAM role.\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/IntegrationAwsGovcloudCfgCredentials:IntegrationAwsGovcloudCfgCredentials":{"properties":{"accessKeyId":{"type":"string","description":"The AWS access key ID.\n"},"secretAccessKey":{"type":"string","description":"The AWS secret key for the specified AWS access key.\n","secret":true}},"type":"object","required":["accessKeyId","secretAccessKey"]},"lacework:index/IntegrationAwsGovcloudCtCredentials:IntegrationAwsGovcloudCtCredentials":{"properties":{"accessKeyId":{"type":"string","description":"The AWS access key ID.\n"},"secretAccessKey":{"type":"string","description":"The AWS secret key for the specified AWS access key.\n","secret":true}},"type":"object","required":["accessKeyId","secretAccessKey"]},"lacework:index/IntegrationAwsOrgAgentlessScanningCredentials:IntegrationAwsOrgAgentlessScanningCredentials":{"properties":{"externalId":{"type":"string","description":"The external id.\n"},"roleArn":{"type":"string","description":"The role arn.\n"}},"type":"object","required":["externalId","roleArn"]},"lacework:index/IntegrationAwsOrgAgentlessScanningOrgAccountMapping:IntegrationAwsOrgAgentlessScanningOrgAccountMapping":{"properties":{"defaultLaceworkAccount":{"type":"string","description":"The default Lacework account name where any non-mapped AWS account will appear\n"},"mappings":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningOrgAccountMappingMapping:IntegrationAwsOrgAgentlessScanningOrgAccountMappingMapping"},"description":"A map of AWS accounts to Lacework account. This can be specified multiple times to map multiple Lacework accounts.\n"}},"type":"object","required":["defaultLaceworkAccount","mappings"]},"lacework:index/IntegrationAwsOrgAgentlessScanningOrgAccountMappingMapping:IntegrationAwsOrgAgentlessScanningOrgAccountMappingMapping":{"properties":{"awsAccounts":{"type":"array","items":{"type":"string"},"description":"The list of AWS account IDs to map.\n"},"laceworkAccount":{"type":"string","description":"The Lacework account name where the CloudTrail activity from the selected AWS accounts will appear.\n"}},"type":"object","required":["awsAccounts","laceworkAccount"]},"lacework:index/IntegrationAzureAdAlCredentials:IntegrationAzureAdAlCredentials":{"properties":{"clientId":{"type":"string","description":"The application client ID.\n"},"clientSecret":{"type":"string","description":"The client secret.\n","secret":true}},"type":"object","required":["clientId","clientSecret"]},"lacework:index/IntegrationAzureAgentlessScanningCredentials:IntegrationAzureAgentlessScanningCredentials":{"properties":{"clientId":{"type":"string","description":"Client Id from credentials file.\n"},"clientSecret":{"type":"string","description":"Client secret from credentials file.\n"}},"type":"object","required":["clientId","clientSecret"]},"lacework:index/IntegrationAzureAlCredentials:IntegrationAzureAlCredentials":{"properties":{"clientId":{"type":"string","description":"The application client ID.\n"},"clientSecret":{"type":"string","description":"The client secret.\n","secret":true}},"type":"object","required":["clientId","clientSecret"]},"lacework:index/IntegrationAzureCfgCredentials:IntegrationAzureCfgCredentials":{"properties":{"clientId":{"type":"string","description":"The application client ID.\n"},"clientSecret":{"type":"string","description":"The client secret.\n","secret":true}},"type":"object","required":["clientId","clientSecret"]},"lacework:index/IntegrationAzureDspmCredentials:IntegrationAzureDspmCredentials":{"properties":{"clientId":{"type":"string","description":"The clientID of the Azure SP used by Lacework platform.\n"},"clientSecret":{"type":"string","description":"The client secret of the Azure SP used by Lacework platform.\n"}},"type":"object","required":["clientId","clientSecret"]},"lacework:index/IntegrationDockerHubLimitByLabel:IntegrationDockerHubLimitByLabel":{"properties":{"key":{"type":"string","description":"The key of the label.\n"},"value":{"type":"string","description":"The value of the label.\n\nFor example, to limit by the label \u003cspan pulumi-lang-nodejs=\"`key`\" pulumi-lang-dotnet=\"`Key`\" pulumi-lang-go=\"`key`\" pulumi-lang-python=\"`key`\" pulumi-lang-yaml=\"`key`\" pulumi-lang-java=\"`key`\"\u003e`key`\u003c/span\u003e with values \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`value2`\" pulumi-lang-dotnet=\"`Value2`\" pulumi-lang-go=\"`value2`\" pulumi-lang-python=\"`value2`\" pulumi-lang-yaml=\"`value2`\" pulumi-lang-java=\"`value2`\"\u003e`value2`\u003c/span\u003e, plus the label \u003cspan pulumi-lang-nodejs=\"`key1`\" pulumi-lang-dotnet=\"`Key1`\" pulumi-lang-go=\"`key1`\" pulumi-lang-python=\"`key1`\" pulumi-lang-yaml=\"`key1`\" pulumi-lang-java=\"`key1`\"\u003e`key1`\u003c/span\u003e with value \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e.\n"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationDockerV2LimitByLabel:IntegrationDockerV2LimitByLabel":{"properties":{"key":{"type":"string","description":"The key of the label.\n"},"value":{"type":"string","description":"The value of the label.\n\nFor example, to limit by the label \u003cspan pulumi-lang-nodejs=\"`key`\" pulumi-lang-dotnet=\"`Key`\" pulumi-lang-go=\"`key`\" pulumi-lang-python=\"`key`\" pulumi-lang-yaml=\"`key`\" pulumi-lang-java=\"`key`\"\u003e`key`\u003c/span\u003e with values \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`value2`\" pulumi-lang-dotnet=\"`Value2`\" pulumi-lang-go=\"`value2`\" pulumi-lang-python=\"`value2`\" pulumi-lang-yaml=\"`value2`\" pulumi-lang-java=\"`value2`\"\u003e`value2`\u003c/span\u003e, plus the label \u003cspan pulumi-lang-nodejs=\"`key1`\" pulumi-lang-dotnet=\"`Key1`\" pulumi-lang-go=\"`key1`\" pulumi-lang-python=\"`key1`\" pulumi-lang-yaml=\"`key1`\" pulumi-lang-java=\"`key1`\"\u003e`key1`\u003c/span\u003e with value \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e.\n"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationEcrCredentials:IntegrationEcrCredentials":{"properties":{"accessKeyId":{"type":"string","description":"The AWS access key ID for an AWS IAM user that has a role with permissions to access the Amazon Container Registry (ECR).\n"},"externalId":{"type":"string","description":"The external ID for the IAM role.\n\n**For AWS Access Key-Based Authentication, only both of these arguments are required:**\n"},"roleArn":{"type":"string","description":"The ARN of the IAM role with permissions to access the Amazon Container Registry (ECR).\n"},"secretAccessKey":{"type":"string","description":"The AWS secret key for the specified AWS access key.\n","secret":true}},"type":"object"},"lacework:index/IntegrationEcrLimitByLabel:IntegrationEcrLimitByLabel":{"properties":{"key":{"type":"string","description":"The key of the label.\n"},"value":{"type":"string","description":"The value of the label.\n\nFor example, to limit by the label \u003cspan pulumi-lang-nodejs=\"`key`\" pulumi-lang-dotnet=\"`Key`\" pulumi-lang-go=\"`key`\" pulumi-lang-python=\"`key`\" pulumi-lang-yaml=\"`key`\" pulumi-lang-java=\"`key`\"\u003e`key`\u003c/span\u003e with values \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`value2`\" pulumi-lang-dotnet=\"`Value2`\" pulumi-lang-go=\"`value2`\" pulumi-lang-python=\"`value2`\" pulumi-lang-yaml=\"`value2`\" pulumi-lang-java=\"`value2`\"\u003e`value2`\u003c/span\u003e, plus the label \u003cspan pulumi-lang-nodejs=\"`key1`\" pulumi-lang-dotnet=\"`Key1`\" pulumi-lang-go=\"`key1`\" pulumi-lang-python=\"`key1`\" pulumi-lang-yaml=\"`key1`\" pulumi-lang-java=\"`key1`\"\u003e`key1`\u003c/span\u003e with value \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e.\n"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationGarCredentials:IntegrationGarCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n","secret":true}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGarLimitByLabel:IntegrationGarLimitByLabel":{"properties":{"key":{"type":"string","description":"The key of the label.\n"},"value":{"type":"string","description":"The value of the label.\n\nFor example, to limit by the label \u003cspan pulumi-lang-nodejs=\"`key`\" pulumi-lang-dotnet=\"`Key`\" pulumi-lang-go=\"`key`\" pulumi-lang-python=\"`key`\" pulumi-lang-yaml=\"`key`\" pulumi-lang-java=\"`key`\"\u003e`key`\u003c/span\u003e with values \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`value2`\" pulumi-lang-dotnet=\"`Value2`\" pulumi-lang-go=\"`value2`\" pulumi-lang-python=\"`value2`\" pulumi-lang-yaml=\"`value2`\" pulumi-lang-java=\"`value2`\"\u003e`value2`\u003c/span\u003e, plus the label \u003cspan pulumi-lang-nodejs=\"`key1`\" pulumi-lang-dotnet=\"`Key1`\" pulumi-lang-go=\"`key1`\" pulumi-lang-python=\"`key1`\" pulumi-lang-yaml=\"`key1`\" pulumi-lang-java=\"`key1`\"\u003e`key1`\u003c/span\u003e with value \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e.\n"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationGcpAgentlessScanningCredentials:IntegrationGcpAgentlessScanningCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account Client Id.\n"},"privateKey":{"type":"string","description":"The service account private key.\n","secret":true},"privateKeyId":{"type":"string","description":"The service account Private Key Id.\n"},"tokenUri":{"type":"string","description":"Token URI from credentials file.\n"}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGcpAtCredentials:IntegrationGcpAtCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","description":"The service account private key.\n","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n"}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGcpCfgCredentials:IntegrationGcpCfgCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","description":"The service account private key.\n","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n"}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGcpGkeAuditLogCredentials:IntegrationGcpGkeAuditLogCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","description":"The service account private key.\n","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n","secret":true}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGcpPubSubAuditLogCredentials:IntegrationGcpPubSubAuditLogCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","description":"The service account private key.\n","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n","secret":true}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGcrCredentials:IntegrationGcrCredentials":{"properties":{"clientEmail":{"type":"string","description":"The service account client email.\n"},"clientId":{"type":"string","description":"The service account client ID.\n"},"privateKey":{"type":"string","secret":true},"privateKeyId":{"type":"string","description":"The service account private key ID.\n"}},"type":"object","required":["clientEmail","clientId","privateKey","privateKeyId"]},"lacework:index/IntegrationGcrLimitByLabel:IntegrationGcrLimitByLabel":{"properties":{"key":{"type":"string","description":"The key of the label.\n"},"value":{"type":"string","description":"The value of the label.\n\nFor example, to limit by the label \u003cspan pulumi-lang-nodejs=\"`key`\" pulumi-lang-dotnet=\"`Key`\" pulumi-lang-go=\"`key`\" pulumi-lang-python=\"`key`\" pulumi-lang-yaml=\"`key`\" pulumi-lang-java=\"`key`\"\u003e`key`\u003c/span\u003e with values \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`value2`\" pulumi-lang-dotnet=\"`Value2`\" pulumi-lang-go=\"`value2`\" pulumi-lang-python=\"`value2`\" pulumi-lang-yaml=\"`value2`\" pulumi-lang-java=\"`value2`\"\u003e`value2`\u003c/span\u003e, plus the label \u003cspan pulumi-lang-nodejs=\"`key1`\" pulumi-lang-dotnet=\"`Key1`\" pulumi-lang-go=\"`key1`\" pulumi-lang-python=\"`key1`\" pulumi-lang-yaml=\"`key1`\" pulumi-lang-java=\"`key1`\"\u003e`key1`\u003c/span\u003e with value \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e.\n"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationGhcrLimitByLabel:IntegrationGhcrLimitByLabel":{"properties":{"key":{"type":"string","description":"The key of the label.\n"},"value":{"type":"string","description":"The value of the label.\n\nFor example, to limit by the label \u003cspan pulumi-lang-nodejs=\"`key`\" pulumi-lang-dotnet=\"`Key`\" pulumi-lang-go=\"`key`\" pulumi-lang-python=\"`key`\" pulumi-lang-yaml=\"`key`\" pulumi-lang-java=\"`key`\"\u003e`key`\u003c/span\u003e with values \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`value2`\" pulumi-lang-dotnet=\"`Value2`\" pulumi-lang-go=\"`value2`\" pulumi-lang-python=\"`value2`\" pulumi-lang-yaml=\"`value2`\" pulumi-lang-java=\"`value2`\"\u003e`value2`\u003c/span\u003e, plus the label \u003cspan pulumi-lang-nodejs=\"`key1`\" pulumi-lang-dotnet=\"`Key1`\" pulumi-lang-go=\"`key1`\" pulumi-lang-python=\"`key1`\" pulumi-lang-yaml=\"`key1`\" pulumi-lang-java=\"`key1`\"\u003e`key1`\u003c/span\u003e with value \u003cspan pulumi-lang-nodejs=\"`value`\" pulumi-lang-dotnet=\"`Value`\" pulumi-lang-go=\"`value`\" pulumi-lang-python=\"`value`\" pulumi-lang-yaml=\"`value`\" pulumi-lang-java=\"`value`\"\u003e`value`\u003c/span\u003e.\n"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationInlineScannerIdentifierTag:IntegrationInlineScannerIdentifierTag":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object","required":["key","value"]},"lacework:index/IntegrationOciCfgCredentials:IntegrationOciCfgCredentials":{"properties":{"fingerprint":{"type":"string","description":"The fingerprint of the public key used for authentication.\n"},"privateKey":{"type":"string","description":"The private key used for authentication in PEM format.\n","secret":true}},"type":"object","required":["fingerprint","privateKey"]},"lacework:index/IntegrationProxyScannerLimitByLabel:IntegrationProxyScannerLimitByLabel":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"lacework:index/ManagedPoliciesPolicy:ManagedPoliciesPolicy":{"properties":{"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled.\n"},"id":{"type":"string","description":"The Lacework-defined policy id.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"}},"type":"object","required":["enabled","id","severity"]},"lacework:index/PolicyAlerting:PolicyAlerting":{"properties":{"enabled":{"type":"boolean","description":"Whether the alerting profile is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"profile":{"type":"string","description":"The alerting profile.\n"}},"type":"object","required":["profile"]},"lacework:index/PolicyExceptionConstraint:PolicyExceptionConstraint":{"properties":{"fieldKey":{"type":"string","description":"The key of the constraint being applied. Example for Aws polices this could be `accountIds`.\n"},"fieldValueMaps":{"type":"array","items":{"$ref":"#/types/lacework:index%2FPolicyExceptionConstraintFieldValueMap:PolicyExceptionConstraintFieldValueMap"},"description":"FieldValueMap. SeeFieldValueMap below for details.\n","deprecationMessage":"Deprecated"},"fieldValues":{"type":"array","items":{"type":"string"},"description":"The values related to the constraint key.\n"},"fieldValuesMaps":{"type":"array","items":{"$ref":"#/types/lacework:index%2FPolicyExceptionConstraintFieldValuesMap:PolicyExceptionConstraintFieldValuesMap"},"description":"FieldValueMap. SeeFieldValuesMap below for details.\n"}},"type":"object","required":["fieldKey"]},"lacework:index/PolicyExceptionConstraintFieldValueMap:PolicyExceptionConstraintFieldValueMap":{"properties":{"key":{"type":"string","description":"The values map key\n"},"value":{"type":"string","description":"The values map value\n"}},"type":"object","required":["key","value"]},"lacework:index/PolicyExceptionConstraintFieldValuesMap:PolicyExceptionConstraintFieldValuesMap":{"properties":{"key":{"type":"string","description":"The values map key\n"},"values":{"type":"array","items":{"type":"string"},"description":"The values map value list\n"}},"type":"object","required":["key","values"]},"lacework:index/ReportRuleAwsComplianceReports:ReportRuleAwsComplianceReports":{"properties":{"cisS3":{"type":"boolean","description":"AWS CIS Benchmark and S3 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"hipaa":{"type":"boolean","description":"AWS HIPAA Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"iso2700":{"type":"boolean","description":"AWS ISO 27001:2013 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"nist800171Rev2":{"type":"boolean","description":"AWS NIST 800-171 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"nist80053Rev4":{"type":"boolean","description":"AWS NIST 800-53 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"pci":{"type":"boolean","description":"AWS PCI DSS Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"soc":{"type":"boolean","description":"AWS SOC 2 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"socRev2":{"type":"boolean","description":"AWS SOC 2 Report Rev2. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object"},"lacework:index/ReportRuleAzureComplianceReports:ReportRuleAzureComplianceReports":{"properties":{"cis":{"type":"boolean","description":"Azure CIS Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"cis131":{"type":"boolean","description":"Azure CIS 1.3.1 Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"pci":{"type":"boolean","description":"Azure PCI Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"soc":{"type":"boolean","description":"Azure SOC 2 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object"},"lacework:index/ReportRuleDailyComplianceReports:ReportRuleDailyComplianceReports":{"properties":{"awsCloudtrail":{"type":"boolean","description":"AWS CloudTrail. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"awsCompliance":{"type":"boolean","description":"AWS Compliance. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"azureActivityLog":{"type":"boolean","description":"Azure Activity Log. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"azureCompliance":{"type":"boolean"},"gcpAuditTrail":{"type":"boolean","description":"GCP Audit Trail. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"gcpCompliance":{"type":"boolean","description":"GCP Compliance. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"hostSecurity":{"type":"boolean","description":"Host Security. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"openshiftCompliance":{"type":"boolean","description":"Openshift Compliance (Optional) Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"openshiftComplianceEvents":{"type":"boolean","description":"Openshift Compliance Events (Optional) Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"platform":{"type":"boolean","description":"Platform Events. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object"},"lacework:index/ReportRuleGcpComplianceReports:ReportRuleGcpComplianceReports":{"properties":{"cis":{"type":"boolean","description":"GCP CIS Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"cis12":{"type":"boolean","description":"GCP CIS 1.2 Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"hipaa":{"type":"boolean","description":"GCP HIPAA Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"hipaaRev2":{"type":"boolean","description":"GCP HIPAA Report Rev2. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"iso27001":{"type":"boolean","description":"GCP ISO 27001 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"k8s":{"type":"boolean","description":"GCP K8S Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"pci":{"type":"boolean","description":"GCP PCI Benchmark. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"pciRev2":{"type":"boolean","description":"GCP PCI Benchmark Rev2. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"soc":{"type":"boolean","description":"GCP SOC 2 Report. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"socRev2":{"type":"boolean","description":"GCP SOC 2 Report Rev2. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object"},"lacework:index/ResourceGroupGroup:ResourceGroupGroup":{"properties":{"filters":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupFilter:ResourceGroupGroupFilter"}},"groups":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupGroup:ResourceGroupGroupGroup"},"description":"The representation of the expression that a resource must match to be \npart of the resource group. Groups can be nested up to 3 levels deep and can be combined by\nindividual filters. See the [api-docs](https://docs.fortinet.com/document/lacework-forticnapp/latest/api-reference/690087/using-the-resource-groups-api#filterable-fields) for the supported fields.\nEach \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e must have at least one of \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`filter`\" pulumi-lang-dotnet=\"`Filter`\" pulumi-lang-go=\"`filter`\" pulumi-lang-python=\"`filter`\" pulumi-lang-yaml=\"`filter`\" pulumi-lang-java=\"`filter`\"\u003e`filter`\u003c/span\u003e defined.\n"},"operator":{"type":"string","description":"The operation to apply (AND/OR)\n"}},"type":"object","required":["operator"]},"lacework:index/ResourceGroupGroupFilter:ResourceGroupGroupFilter":{"properties":{"field":{"type":"string","description":"The field on which to apply the predicate.\n"},"filterName":{"type":"string","description":"A custom name for the filter.\n"},"key":{"type":"string","description":"For fields that support a tag, the key on which to filter.\n"},"operation":{"type":"string","description":"The operation that should be applied across filters/groups\n"},"values":{"type":"array","items":{"type":"string"},"description":"The values that the predicate should match.\n"}},"type":"object","required":["field","filterName","operation","values"]},"lacework:index/ResourceGroupGroupGroup:ResourceGroupGroupGroup":{"properties":{"filters":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupGroupFilter:ResourceGroupGroupGroupFilter"}},"groups":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupGroupGroup:ResourceGroupGroupGroupGroup"},"description":"The representation of the expression that a resource must match to be \npart of the resource group. Groups can be nested up to 3 levels deep and can be combined by\nindividual filters. See the [api-docs](https://docs.fortinet.com/document/lacework-forticnapp/latest/api-reference/690087/using-the-resource-groups-api#filterable-fields) for the supported fields.\nEach \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e must have at least one of \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`filter`\" pulumi-lang-dotnet=\"`Filter`\" pulumi-lang-go=\"`filter`\" pulumi-lang-python=\"`filter`\" pulumi-lang-yaml=\"`filter`\" pulumi-lang-java=\"`filter`\"\u003e`filter`\u003c/span\u003e defined.\n"},"operator":{"type":"string","description":"The operation to apply (AND/OR)\n"}},"type":"object","required":["operator"]},"lacework:index/ResourceGroupGroupGroupFilter:ResourceGroupGroupGroupFilter":{"properties":{"field":{"type":"string","description":"The field on which to apply the predicate.\n"},"filterName":{"type":"string","description":"A custom name for the filter.\n"},"key":{"type":"string","description":"For fields that support a tag, the key on which to filter.\n"},"operation":{"type":"string","description":"The operation that should be applied across filters/groups\n"},"values":{"type":"array","items":{"type":"string"},"description":"The values that the predicate should match.\n"}},"type":"object","required":["field","filterName","operation","values"]},"lacework:index/ResourceGroupGroupGroupGroup:ResourceGroupGroupGroupGroup":{"properties":{"filters":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupGroupGroupFilter:ResourceGroupGroupGroupGroupFilter"}},"groups":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupGroupGroupGroup:ResourceGroupGroupGroupGroupGroup"},"description":"The representation of the expression that a resource must match to be \npart of the resource group. Groups can be nested up to 3 levels deep and can be combined by\nindividual filters. See the [api-docs](https://docs.fortinet.com/document/lacework-forticnapp/latest/api-reference/690087/using-the-resource-groups-api#filterable-fields) for the supported fields.\nEach \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e must have at least one of \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`filter`\" pulumi-lang-dotnet=\"`Filter`\" pulumi-lang-go=\"`filter`\" pulumi-lang-python=\"`filter`\" pulumi-lang-yaml=\"`filter`\" pulumi-lang-java=\"`filter`\"\u003e`filter`\u003c/span\u003e defined.\n"},"operator":{"type":"string","description":"The operation to apply (AND/OR)\n"}},"type":"object","required":["operator"]},"lacework:index/ResourceGroupGroupGroupGroupFilter:ResourceGroupGroupGroupGroupFilter":{"properties":{"field":{"type":"string","description":"The field on which to apply the predicate.\n"},"filterName":{"type":"string","description":"A custom name for the filter.\n"},"key":{"type":"string","description":"For fields that support a tag, the key on which to filter.\n"},"operation":{"type":"string","description":"The operation that should be applied across filters/groups\n"},"values":{"type":"array","items":{"type":"string"},"description":"The values that the predicate should match.\n"}},"type":"object","required":["field","filterName","operation","values"]},"lacework:index/ResourceGroupGroupGroupGroupGroup:ResourceGroupGroupGroupGroupGroup":{"properties":{"filters":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroupGroupGroupGroupFilter:ResourceGroupGroupGroupGroupGroupFilter"}},"operator":{"type":"string","description":"The operation to apply (AND/OR)\n"}},"type":"object","required":["operator"]},"lacework:index/ResourceGroupGroupGroupGroupGroupFilter:ResourceGroupGroupGroupGroupGroupFilter":{"properties":{"field":{"type":"string","description":"The field on which to apply the predicate.\n"},"filterName":{"type":"string","description":"A custom name for the filter.\n"},"key":{"type":"string","description":"For fields that support a tag, the key on which to filter.\n"},"operation":{"type":"string","description":"The operation that should be applied across filters/groups\n"},"values":{"type":"array","items":{"type":"string"},"description":"The values that the predicate should match.\n"}},"type":"object","required":["field","filterName","operation","values"]},"lacework:index/TeamMemberOrganization:TeamMemberOrganization":{"properties":{"adminAccounts":{"type":"array","items":{"type":"string"},"description":"List of accounts the team member is an administrator.\n"},"administrator":{"type":"boolean","description":"Whether the team member is an organization-level administrator. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"user":{"type":"boolean","description":"Whether the team member is an organization-level user. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"userAccounts":{"type":"array","items":{"type":"string"},"description":"List of accounts the team member is a user.\n"}},"type":"object"},"lacework:index/VulnerabilityExceptionContainerResourceScope:VulnerabilityExceptionContainerResourceScope":{"properties":{"imageIds":{"type":"array","items":{"type":"string"},"description":"The list of sha256 hashes that was generated for one or more container images.\n"},"imageTags":{"type":"array","items":{"type":"string"},"description":"The list of container image tags.\n"},"namespaces":{"type":"array","items":{"type":"string"},"description":"The list of namespace for the package distribution (for example, an operating\nsystem or language package).\n"},"registries":{"type":"array","items":{"type":"string"},"description":"The list of container registries.\n"},"repositories":{"type":"array","items":{"type":"string"},"description":"The list of container repositories.\n"}},"type":"object"},"lacework:index/VulnerabilityExceptionContainerVulnerabilityCriteria:VulnerabilityExceptionContainerVulnerabilityCriteria":{"properties":{"cves":{"type":"array","items":{"type":"string"},"description":"The list of vulnerability (CVE) IDs.\n"},"fixableVuln":{"type":"string","description":"Whether to filter on fixable or non-fixable vulnerability. This argument is of type\n\u003cspan pulumi-lang-nodejs=\"`string`\" pulumi-lang-dotnet=\"`String`\" pulumi-lang-go=\"`string`\" pulumi-lang-python=\"`string`\" pulumi-lang-yaml=\"`string`\" pulumi-lang-java=\"`string`\"\u003e`string`\u003c/span\u003e. Valid values are: `\"true\"`, `\"false\"`.\n"},"packages":{"type":"array","items":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerVulnerabilityCriteriaPackage:VulnerabilityExceptionContainerVulnerabilityCriteriaPackage"},"description":"The list of package names (for example, an operating system or language package) to constraint.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of severities to which the exception will be constraint. Valid severities\ninclude: `Critical`, `High`, `Medium`, `Low` and `Info`.\n"}},"type":"object"},"lacework:index/VulnerabilityExceptionContainerVulnerabilityCriteriaPackage:VulnerabilityExceptionContainerVulnerabilityCriteriaPackage":{"properties":{"name":{"type":"string","description":"The vulnerability exception name.\n"},"version":{"type":"string","description":"The version of the package\n"}},"type":"object","required":["name","version"]},"lacework:index/VulnerabilityExceptionHostResourceScope:VulnerabilityExceptionHostResourceScope":{"properties":{"clusterNames":{"type":"array","items":{"type":"string"},"description":"The list of cluster names.\n"},"externalIps":{"type":"array","items":{"type":"string"},"description":"The list of external IP addresses.\n"},"hostnames":{"type":"array","items":{"type":"string"},"description":"The list of hostnames.\n"},"namespaces":{"type":"array","items":{"type":"string"},"description":"The list of namespace for the package distribution (for example, an operating system or\nlanguage package).\n"}},"type":"object"},"lacework:index/VulnerabilityExceptionHostVulnerabilityCriteria:VulnerabilityExceptionHostVulnerabilityCriteria":{"properties":{"cves":{"type":"array","items":{"type":"string"},"description":"The list of vulnerability (CVE) IDs.\n"},"fixableVuln":{"type":"string","description":"Whether to filter on fixable or non-fixable vulnerability. This argument is of type\n\u003cspan pulumi-lang-nodejs=\"`string`\" pulumi-lang-dotnet=\"`String`\" pulumi-lang-go=\"`string`\" pulumi-lang-python=\"`string`\" pulumi-lang-yaml=\"`string`\" pulumi-lang-java=\"`string`\"\u003e`string`\u003c/span\u003e. Valid values are: `\"true\"`, `\"false\"`.\n"},"packages":{"type":"array","items":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostVulnerabilityCriteriaPackage:VulnerabilityExceptionHostVulnerabilityCriteriaPackage"},"description":"The list of package names (for example, an operating system or language package) to constraint.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of severities to which the exception will be constraint. Valid severities\ninclude: `Critical`, `High`, `Medium`, `Low` and `Info`.\n"}},"type":"object"},"lacework:index/VulnerabilityExceptionHostVulnerabilityCriteriaPackage:VulnerabilityExceptionHostVulnerabilityCriteriaPackage":{"properties":{"name":{"type":"string","description":"The vulnerability exception name.\n"},"version":{"type":"string","description":"The version of the package\n"}},"type":"object","required":["name","version"]},"lacework:index/getUserProfileAccount:getUserProfileAccount":{"properties":{"accountName":{"type":"string","description":"A string representing the account name.\n"},"admin":{"type":"boolean","description":"A boolean representing whether the user is an account admin.\n"},"custGuid":{"type":"string","description":"A string representing the Customer GUID for the account.\n"},"userEnabled":{"type":"boolean","description":"A boolean representing whether the user is enabled.\n"},"userGuid":{"type":"string","description":"A string representing the User GUID in the account.\n"}},"type":"object","required":["accountName","admin","custGuid","userEnabled","userGuid"],"language":{"nodejs":{"requiredInputs":[]}}}},"provider":{"description":"The provider type for the lacework package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","properties":{"account":{"type":"string","description":"Lacework account subdomain of URL (i.e. \u003cACCOUNT\u003e.lacework.net)"},"apiKey":{"type":"string","description":"Lacework API access key"},"apiSecret":{"type":"string","description":"Lacework API access secret"},"apiToken":{"type":"string","description":"Lacework API access token"},"profile":{"type":"string","description":"Lacework profile name to use, profiles are configured at $HOME/.lacework.toml via the Lacework CLI"},"subaccount":{"type":"string","description":"The sub-account name inside your organization (org admins only)"}},"type":"object","inputProperties":{"account":{"type":"string","description":"Lacework account subdomain of URL (i.e. \u003cACCOUNT\u003e.lacework.net)"},"apiKey":{"type":"string","description":"Lacework API access key"},"apiSecret":{"type":"string","description":"Lacework API access secret"},"apiToken":{"type":"string","description":"Lacework API access token"},"organization":{"type":"boolean","description":"Set it to true to access organization level data sets (org admins only)"},"profile":{"type":"string","description":"Lacework profile name to use, profiles are configured at $HOME/.lacework.toml via the Lacework CLI"},"subaccount":{"type":"string","description":"The sub-account name inside your organization (org admins only)"}},"methods":{"terraformConfig":"pulumi:providers:lacework/terraformConfig"}},"resources":{"lacework:index/agentAccessToken:AgentAccessToken":{"description":"## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst k8s = new lacework.AgentAccessToken(\"k8s\", {\n    name: \"prod\",\n    description: \"k8s deployment for production env\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nk8s = lacework.AgentAccessToken(\"k8s\",\n    name=\"prod\",\n    description=\"k8s deployment for production env\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var k8s = new Lacework.AgentAccessToken(\"k8s\", new()\n    {\n        Name = \"prod\",\n        Description = \"k8s deployment for production env\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAgentAccessToken(ctx, \"k8s\", \u0026lacework.AgentAccessTokenArgs{\n\t\t\tName:        pulumi.String(\"prod\"),\n\t\t\tDescription: pulumi.String(\"k8s deployment for production env\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AgentAccessToken;\nimport com.pulumi.lacework.AgentAccessTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var k8s = new AgentAccessToken(\"k8s\", AgentAccessTokenArgs.builder()\n            .name(\"prod\")\n            .description(\"k8s deployment for production env\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  k8s:\n    type: lacework:AgentAccessToken\n    properties:\n      name: prod\n      description: k8s deployment for production env\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework agent access token can be imported using the token itself, e.g.\n\n```sh\n$ pulumi import lacework:index/agentAccessToken:AgentAccessToken k8s YourAgentToken\n```\n-\u003e __Note:__ To list all agent access tokens in your Lacework account, use the\n\tLacework CLI command `lacework agent token list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"agentAccessTokenId":{"type":"string"},"createdTime":{"type":"string"},"description":{"type":"string","description":"The agent access token description.\n"},"enabled":{"type":"boolean","description":"The state of the integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"lastUpdatedTime":{"type":"string"},"name":{"type":"string","description":"The agent access token name.\n"},"os":{"type":"string"},"token":{"type":"string","description":"The agent access token.\n","secret":true},"version":{"type":"string"}},"type":"object","required":["agentAccessTokenId","createdTime","lastUpdatedTime","name","token","version"],"inputProperties":{"agentAccessTokenId":{"type":"string"},"description":{"type":"string","description":"The agent access token description.\n"},"enabled":{"type":"boolean","description":"The state of the integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The agent access token name.\n"},"os":{"type":"string"}},"stateInputs":{"description":"Input properties used for looking up and filtering AgentAccessToken resources.\n","properties":{"agentAccessTokenId":{"type":"string"},"createdTime":{"type":"string"},"description":{"type":"string","description":"The agent access token description.\n"},"enabled":{"type":"boolean","description":"The state of the integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"lastUpdatedTime":{"type":"string"},"name":{"type":"string","description":"The agent access token name.\n"},"os":{"type":"string"},"token":{"type":"string","description":"The agent access token.\n","secret":true},"version":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelAwsCloudwatch:AlertChannelAwsCloudwatch":{"description":"Configure Lacework to forward alerts to an Amazon CloudWatch event bus.\n\n\u003e **Note:** For more information about sending and receiving events between AWS accounts, refer to the Amazon [CloudWatch Events User Guide](https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/WhatIsCloudWatchEvents.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst allEvents = new lacework.AlertChannelAwsCloudwatch(\"all_events\", {\n    name: \"All events to default event-bus\",\n    eventBusArn: \"arn:aws:events:us-west-2:1234567890:event-bus/default\",\n    groupIssuesBy: \"Events\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nall_events = lacework.AlertChannelAwsCloudwatch(\"all_events\",\n    name=\"All events to default event-bus\",\n    event_bus_arn=\"arn:aws:events:us-west-2:1234567890:event-bus/default\",\n    group_issues_by=\"Events\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var allEvents = new Lacework.AlertChannelAwsCloudwatch(\"all_events\", new()\n    {\n        Name = \"All events to default event-bus\",\n        EventBusArn = \"arn:aws:events:us-west-2:1234567890:event-bus/default\",\n        GroupIssuesBy = \"Events\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelAwsCloudwatch(ctx, \"all_events\", \u0026lacework.AlertChannelAwsCloudwatchArgs{\n\t\t\tName:          pulumi.String(\"All events to default event-bus\"),\n\t\t\tEventBusArn:   pulumi.String(\"arn:aws:events:us-west-2:1234567890:event-bus/default\"),\n\t\t\tGroupIssuesBy: pulumi.String(\"Events\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelAwsCloudwatch;\nimport com.pulumi.lacework.AlertChannelAwsCloudwatchArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var allEvents = new AlertChannelAwsCloudwatch(\"allEvents\", AlertChannelAwsCloudwatchArgs.builder()\n            .name(\"All events to default event-bus\")\n            .eventBusArn(\"arn:aws:events:us-west-2:1234567890:event-bus/default\")\n            .groupIssuesBy(\"Events\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  allEvents:\n    type: lacework:AlertChannelAwsCloudwatch\n    name: all_events\n    properties:\n      name: All events to default event-bus\n      eventBusArn: arn:aws:events:us-west-2:1234567890:event-bus/default\n      groupIssuesBy: Events\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Amazon CloudWatch Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelAwsCloudwatch:AlertChannelAwsCloudwatch all_events EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelAwsCloudwatchId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventBusArn":{"type":"string","description":"The ARN of your AWS CloudWatch event bus.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle AWS CloudWatch events will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one AWS event is created on the AWS CloudWatch event bus.\n* **Resources**: Multiple AWS CloudWatch events will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three AWS events are created on the AWS CloudWatch event bus.\n"},"intgGuid":{"type":"string","description":"The integration unique identifier"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelAwsCloudwatchId","createdOrUpdatedBy","createdOrUpdatedTime","eventBusArn","intgGuid","name","orgLevel","typeName"],"inputProperties":{"alertChannelAwsCloudwatchId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventBusArn":{"type":"string","description":"The ARN of your AWS CloudWatch event bus.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle AWS CloudWatch events will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one AWS event is created on the AWS CloudWatch event bus.\n* **Resources**: Multiple AWS CloudWatch events will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three AWS events are created on the AWS CloudWatch event bus.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"}},"requiredInputs":["eventBusArn"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelAwsCloudwatch resources.\n","properties":{"alertChannelAwsCloudwatchId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventBusArn":{"type":"string","description":"The ARN of your AWS CloudWatch event bus.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle AWS CloudWatch events will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one AWS event is created on the AWS CloudWatch event bus.\n* **Resources**: Multiple AWS CloudWatch events will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three AWS events are created on the AWS CloudWatch event bus.\n"},"intgGuid":{"type":"string","description":"The integration unique identifier"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelAwsS3:AlertChannelAwsS3":{"description":"S3 data export allows you to export data collected from your Lacework account and send it to an S3 bucket of\nyour choice. You can extend Lacework processed/normalized data to report/visualize alone or combine with other\nbusiness/security data to get insights and make meaningful business decisions.\n\n!\u003e **Warning:** This feature is currently in beta.\n\nEvery hour, Lacework collects data from your Lacework account and sends it to an internal Lacework S3 bucket as\na staging location. The data remains in the internal Lacework S3 bucket until its hourly scheduled export to your\ndesignated S3 bucket.\n\nFor detailed information about the data exported by Lacework, see [Lacework Data Share](https://support.lacework.com/hc/sections/360011719393).\n\n\u003e **Note:** Before proceeding, ensure that the bucket that will receive the data from Lacework already exists in AWS.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst dataExport = new lacework.AlertChannelAwsS3(\"data_export\", {\n    name: \"s3 Alerts\",\n    bucketArn: \"arn:aws:s3:::bucket_name/key_name\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\ndata_export = lacework.AlertChannelAwsS3(\"data_export\",\n    name=\"s3 Alerts\",\n    bucket_arn=\"arn:aws:s3:::bucket_name/key_name\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataExport = new Lacework.AlertChannelAwsS3(\"data_export\", new()\n    {\n        Name = \"s3 Alerts\",\n        BucketArn = \"arn:aws:s3:::bucket_name/key_name\",\n        Credentials = new Lacework.Inputs.AlertChannelAwsS3CredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelAwsS3(ctx, \"data_export\", \u0026lacework.AlertChannelAwsS3Args{\n\t\t\tName:      pulumi.String(\"s3 Alerts\"),\n\t\t\tBucketArn: pulumi.String(\"arn:aws:s3:::bucket_name/key_name\"),\n\t\t\tCredentials: \u0026lacework.AlertChannelAwsS3CredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelAwsS3;\nimport com.pulumi.lacework.AlertChannelAwsS3Args;\nimport com.pulumi.lacework.inputs.AlertChannelAwsS3CredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var dataExport = new AlertChannelAwsS3(\"dataExport\", AlertChannelAwsS3Args.builder()\n            .name(\"s3 Alerts\")\n            .bucketArn(\"arn:aws:s3:::bucket_name/key_name\")\n            .credentials(AlertChannelAwsS3CredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  dataExport:\n    type: lacework:AlertChannelAwsS3\n    name: data_export\n    properties:\n      name: s3 Alerts\n      bucketArn: arn:aws:s3:::bucket_name/key_name\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Amazon S3 Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelAwsS3:AlertChannelAwsS3 data_export EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelAwsS3Id":{"type":"string"},"bucketArn":{"type":"string","description":"The ARN of the S3 bucket.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FAlertChannelAwsS3Credentials:AlertChannelAwsS3Credentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelAwsS3Id","bucketArn","createdOrUpdatedBy","createdOrUpdatedTime","credentials","intgGuid","name","orgLevel","typeName"],"inputProperties":{"alertChannelAwsS3Id":{"type":"string"},"bucketArn":{"type":"string","description":"The ARN of the S3 bucket.\n"},"credentials":{"$ref":"#/types/lacework:index%2FAlertChannelAwsS3Credentials:AlertChannelAwsS3Credentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"}},"requiredInputs":["bucketArn","credentials"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelAwsS3 resources.\n","properties":{"alertChannelAwsS3Id":{"type":"string"},"bucketArn":{"type":"string","description":"The ARN of the S3 bucket.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FAlertChannelAwsS3Credentials:AlertChannelAwsS3Credentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelCiscoWebex:AlertChannelCiscoWebex":{"description":"You can configure a Lacework alert channel to forward alerts to a Cisco Webex Teams space as an incoming webhook.\n\nTo find more information about the Cisco Webex alert channel integration, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360005840154-Cisco-Webex-Teams).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelCiscoWebex(\"example\", {\n    name: \"Example Cisco Webex Alert\",\n    webhookUrl: \"https://webexapis.com/v1/webhooks/incoming/api-token\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelCiscoWebex(\"example\",\n    name=\"Example Cisco Webex Alert\",\n    webhook_url=\"https://webexapis.com/v1/webhooks/incoming/api-token\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelCiscoWebex(\"example\", new()\n    {\n        Name = \"Example Cisco Webex Alert\",\n        WebhookUrl = \"https://webexapis.com/v1/webhooks/incoming/api-token\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelCiscoWebex(ctx, \"example\", \u0026lacework.AlertChannelCiscoWebexArgs{\n\t\t\tName:       pulumi.String(\"Example Cisco Webex Alert\"),\n\t\t\tWebhookUrl: pulumi.String(\"https://webexapis.com/v1/webhooks/incoming/api-token\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelCiscoWebex;\nimport com.pulumi.lacework.AlertChannelCiscoWebexArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelCiscoWebex(\"example\", AlertChannelCiscoWebexArgs.builder()\n            .name(\"Example Cisco Webex Alert\")\n            .webhookUrl(\"https://webexapis.com/v1/webhooks/incoming/api-token\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelCiscoWebex\n    properties:\n      name: Example Cisco Webex Alert\n      webhookUrl: https://webexapis.com/v1/webhooks/incoming/api-token\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Cisco Webex Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelCiscoWebex:AlertChannelCiscoWebex example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelCiscoWebexId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string","description":"The unique identifier of the integration"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The Cisco Webex webhook URL.\n"}},"type":"object","required":["alertChannelCiscoWebexId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","typeName","webhookUrl"],"inputProperties":{"alertChannelCiscoWebexId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"webhookUrl":{"type":"string","description":"The Cisco Webex webhook URL.\n"}},"requiredInputs":["webhookUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelCiscoWebex resources.\n","properties":{"alertChannelCiscoWebexId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string","description":"The unique identifier of the integration"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The Cisco Webex webhook URL.\n"}},"type":"object"}},"lacework:index/alertChannelDatadog:AlertChannelDatadog":{"description":"The Datadog alert channel provides a unified view of your metrics, logs, and performance data combined with your cloud security data.\n\nTo find more information about the Datadog alert channel integration, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360036989953-Datadog).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst opsCritical = new lacework.AlertChannelDatadog(\"ops_critical\", {\n    name: \"Ops Datadog Alerts\",\n    datadogSite: \"eu\",\n    datadogService: \"Events Summary\",\n    apiKey: \"datadog-key\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nops_critical = lacework.AlertChannelDatadog(\"ops_critical\",\n    name=\"Ops Datadog Alerts\",\n    datadog_site=\"eu\",\n    datadog_service=\"Events Summary\",\n    api_key=\"datadog-key\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var opsCritical = new Lacework.AlertChannelDatadog(\"ops_critical\", new()\n    {\n        Name = \"Ops Datadog Alerts\",\n        DatadogSite = \"eu\",\n        DatadogService = \"Events Summary\",\n        ApiKey = \"datadog-key\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelDatadog(ctx, \"ops_critical\", \u0026lacework.AlertChannelDatadogArgs{\n\t\t\tName:           pulumi.String(\"Ops Datadog Alerts\"),\n\t\t\tDatadogSite:    pulumi.String(\"eu\"),\n\t\t\tDatadogService: pulumi.String(\"Events Summary\"),\n\t\t\tApiKey:         pulumi.String(\"datadog-key\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelDatadog;\nimport com.pulumi.lacework.AlertChannelDatadogArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var opsCritical = new AlertChannelDatadog(\"opsCritical\", AlertChannelDatadogArgs.builder()\n            .name(\"Ops Datadog Alerts\")\n            .datadogSite(\"eu\")\n            .datadogService(\"Events Summary\")\n            .apiKey(\"datadog-key\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  opsCritical:\n    type: lacework:AlertChannelDatadog\n    name: ops_critical\n    properties:\n      name: Ops Datadog Alerts\n      datadogSite: eu\n      datadogService: Events Summary\n      apiKey: datadog-key\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Datadog Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelDatadog:AlertChannelDatadog ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelDatadogId":{"type":"string"},"apiKey":{"type":"string","description":"The Datadog api key required to submit metrics and events to Datadog\n","secret":true},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"datadogService":{"type":"string","description":"The level of detail of logs or event stream.  `Logs Detail`, `Logs Summary`, or `Events Summary`. Defaults to `Logs Detail`.\n"},"datadogSite":{"type":"string","description":"Where to store your logs, either the US or Europe. Must be one of \u003cspan pulumi-lang-nodejs=\"`com`\" pulumi-lang-dotnet=\"`Com`\" pulumi-lang-go=\"`com`\" pulumi-lang-python=\"`com`\" pulumi-lang-yaml=\"`com`\" pulumi-lang-java=\"`com`\"\u003e`com`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`eu`\" pulumi-lang-dotnet=\"`Eu`\" pulumi-lang-go=\"`eu`\" pulumi-lang-python=\"`eu`\" pulumi-lang-yaml=\"`eu`\" pulumi-lang-java=\"`eu`\"\u003e`eu`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`com`\" pulumi-lang-dotnet=\"`Com`\" pulumi-lang-go=\"`com`\" pulumi-lang-python=\"`com`\" pulumi-lang-yaml=\"`com`\" pulumi-lang-java=\"`com`\"\u003e`com`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modifications"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelDatadogId","apiKey","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","typeName"],"inputProperties":{"alertChannelDatadogId":{"type":"string"},"apiKey":{"type":"string","description":"The Datadog api key required to submit metrics and events to Datadog\n","secret":true},"datadogService":{"type":"string","description":"The level of detail of logs or event stream.  `Logs Detail`, `Logs Summary`, or `Events Summary`. Defaults to `Logs Detail`.\n"},"datadogSite":{"type":"string","description":"Where to store your logs, either the US or Europe. Must be one of \u003cspan pulumi-lang-nodejs=\"`com`\" pulumi-lang-dotnet=\"`Com`\" pulumi-lang-go=\"`com`\" pulumi-lang-python=\"`com`\" pulumi-lang-yaml=\"`com`\" pulumi-lang-java=\"`com`\"\u003e`com`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`eu`\" pulumi-lang-dotnet=\"`Eu`\" pulumi-lang-go=\"`eu`\" pulumi-lang-python=\"`eu`\" pulumi-lang-yaml=\"`eu`\" pulumi-lang-java=\"`eu`\"\u003e`eu`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`com`\" pulumi-lang-dotnet=\"`Com`\" pulumi-lang-go=\"`com`\" pulumi-lang-python=\"`com`\" pulumi-lang-yaml=\"`com`\" pulumi-lang-java=\"`com`\"\u003e`com`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modifications"}},"requiredInputs":["apiKey"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelDatadog resources.\n","properties":{"alertChannelDatadogId":{"type":"string"},"apiKey":{"type":"string","description":"The Datadog api key required to submit metrics and events to Datadog\n","secret":true},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"datadogService":{"type":"string","description":"The level of detail of logs or event stream.  `Logs Detail`, `Logs Summary`, or `Events Summary`. Defaults to `Logs Detail`.\n"},"datadogSite":{"type":"string","description":"Where to store your logs, either the US or Europe. Must be one of \u003cspan pulumi-lang-nodejs=\"`com`\" pulumi-lang-dotnet=\"`Com`\" pulumi-lang-go=\"`com`\" pulumi-lang-python=\"`com`\" pulumi-lang-yaml=\"`com`\" pulumi-lang-java=\"`com`\"\u003e`com`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`eu`\" pulumi-lang-dotnet=\"`Eu`\" pulumi-lang-go=\"`eu`\" pulumi-lang-python=\"`eu`\" pulumi-lang-yaml=\"`eu`\" pulumi-lang-java=\"`eu`\"\u003e`eu`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`com`\" pulumi-lang-dotnet=\"`Com`\" pulumi-lang-go=\"`com`\" pulumi-lang-python=\"`com`\" pulumi-lang-yaml=\"`com`\" pulumi-lang-java=\"`com`\"\u003e`com`\u003c/span\u003e.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modifications"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelEmail:AlertChannelEmail":{"description":"Lacework can generate and send alert summaries and reports to email addresses using an email alert channel. By default,\nLacework creates a single email alert channel during the initial Lacework onboarding process and new members are added\nautomatically. The default channel cannot be edited. You can add more email alert channels.\n\nTo find more information about the Email alert channel integration, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360023638654-Email).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst auditors = new lacework.AlertChannelEmail(\"auditors\", {\n    name: \"Auditors Alerts\",\n    recipients: [\n        \"my@example.com\",\n        \"alias@example.com\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nauditors = lacework.AlertChannelEmail(\"auditors\",\n    name=\"Auditors Alerts\",\n    recipients=[\n        \"my@example.com\",\n        \"alias@example.com\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var auditors = new Lacework.AlertChannelEmail(\"auditors\", new()\n    {\n        Name = \"Auditors Alerts\",\n        Recipients = new[]\n        {\n            \"my@example.com\",\n            \"alias@example.com\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelEmail(ctx, \"auditors\", \u0026lacework.AlertChannelEmailArgs{\n\t\t\tName: pulumi.String(\"Auditors Alerts\"),\n\t\t\tRecipients: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"my@example.com\"),\n\t\t\t\tpulumi.String(\"alias@example.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelEmail;\nimport com.pulumi.lacework.AlertChannelEmailArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var auditors = new AlertChannelEmail(\"auditors\", AlertChannelEmailArgs.builder()\n            .name(\"Auditors Alerts\")\n            .recipients(            \n                \"my@example.com\",\n                \"alias@example.com\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  auditors:\n    type: lacework:AlertChannelEmail\n    properties:\n      name: Auditors Alerts\n      recipients:\n        - my@example.com\n        - alias@example.com\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Email Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelEmail:AlertChannelEmail auditors EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelEmailId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"recipients":{"type":"array","items":{"type":"string"},"description":"The list of email addresses that you want to receive the alerts.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelEmailId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","recipients","typeName"],"inputProperties":{"alertChannelEmailId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"recipients":{"type":"array","items":{"type":"string"},"description":"The list of email addresses that you want to receive the alerts.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"}},"requiredInputs":["recipients"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelEmail resources.\n","properties":{"alertChannelEmailId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"recipients":{"type":"array","items":{"type":"string"},"description":"The list of email addresses that you want to receive the alerts.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelGcpPubSub:AlertChannelGcpPubSub":{"description":"You can configure Lacework to forward events to Google Cloud Pub/Sub asynchronous messaging service using the Lacework Google Cloud Pub/Sub alert channel.\n\nTo find more information see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360047496514-Google-Cloud-Pub-Sub).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelGcpPubSub(\"example\", {\n    name: \"gcp-pub_sub\",\n    projectId: \"lacework-191923\",\n    topicId: \"lacework-alerts\",\n    credentials: {\n        clientId: \"123456789012345678900\",\n        clientEmail: \"email@abc-project-name.iam.gserviceaccount.com\",\n        privateKeyId: \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n        privateKey: `-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n`,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelGcpPubSub(\"example\",\n    name=\"gcp-pub_sub\",\n    project_id=\"lacework-191923\",\n    topic_id=\"lacework-alerts\",\n    credentials={\n        \"client_id\": \"123456789012345678900\",\n        \"client_email\": \"email@abc-project-name.iam.gserviceaccount.com\",\n        \"private_key_id\": \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n        \"private_key\": \"\"\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\"\"\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelGcpPubSub(\"example\", new()\n    {\n        Name = \"gcp-pub_sub\",\n        ProjectId = \"lacework-191923\",\n        TopicId = \"lacework-alerts\",\n        Credentials = new Lacework.Inputs.AlertChannelGcpPubSubCredentialsArgs\n        {\n            ClientId = \"123456789012345678900\",\n            ClientEmail = \"email@abc-project-name.iam.gserviceaccount.com\",\n            PrivateKeyId = \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n            PrivateKey = @\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelGcpPubSub(ctx, \"example\", \u0026lacework.AlertChannelGcpPubSubArgs{\n\t\t\tName:      pulumi.String(\"gcp-pub_sub\"),\n\t\t\tProjectId: pulumi.String(\"lacework-191923\"),\n\t\t\tTopicId:   pulumi.String(\"lacework-alerts\"),\n\t\t\tCredentials: \u0026lacework.AlertChannelGcpPubSubCredentialsArgs{\n\t\t\t\tClientId:     pulumi.String(\"123456789012345678900\"),\n\t\t\t\tClientEmail:  pulumi.String(\"email@abc-project-name.iam.gserviceaccount.com\"),\n\t\t\t\tPrivateKeyId: pulumi.String(\"1234abcd1234abcd1234abcd1234abcd1234abcd\"),\n\t\t\t\tPrivateKey:   pulumi.String(\"-----BEGIN PRIVATE KEY-----\\n ... -----END PRIVATE KEY-----\\n\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelGcpPubSub;\nimport com.pulumi.lacework.AlertChannelGcpPubSubArgs;\nimport com.pulumi.lacework.inputs.AlertChannelGcpPubSubCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelGcpPubSub(\"example\", AlertChannelGcpPubSubArgs.builder()\n            .name(\"gcp-pub_sub\")\n            .projectId(\"lacework-191923\")\n            .topicId(\"lacework-alerts\")\n            .credentials(AlertChannelGcpPubSubCredentialsArgs.builder()\n                .clientId(\"123456789012345678900\")\n                .clientEmail(\"email@abc-project-name.iam.gserviceaccount.com\")\n                .privateKeyId(\"1234abcd1234abcd1234abcd1234abcd1234abcd\")\n                .privateKey(\"\"\"\n-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n                \"\"\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelGcpPubSub\n    properties:\n      name: gcp-pub_sub\n      projectId: lacework-191923\n      topicId: lacework-alerts\n      credentials:\n        clientId: '123456789012345678900'\n        clientEmail: email@abc-project-name.iam.gserviceaccount.com\n        privateKeyId: 1234abcd1234abcd1234abcd1234abcd1234abcd\n        privateKey: |\n          -----BEGIN PRIVATE KEY-----\n           ... -----END PRIVATE KEY-----\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework GCP Pub Sub Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelGcpPubSub:AlertChannelGcpPubSub data_export EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelGcpPubSubId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FAlertChannelGcpPubSubCredentials:AlertChannelGcpPubSubCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"issueGrouping":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"projectId":{"type":"string","description":"The name of the Google Cloud Project.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"topicId":{"type":"string","description":"The ID of the Google Cloud Pub/Sub topic.\n"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelGcpPubSubId","createdOrUpdatedBy","createdOrUpdatedTime","credentials","intgGuid","name","orgLevel","projectId","topicId","typeName"],"inputProperties":{"alertChannelGcpPubSubId":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FAlertChannelGcpPubSubCredentials:AlertChannelGcpPubSubCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"issueGrouping":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"projectId":{"type":"string","description":"The name of the Google Cloud Project.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"topicId":{"type":"string","description":"The ID of the Google Cloud Pub/Sub topic.\n"}},"requiredInputs":["credentials","projectId","topicId"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelGcpPubSub resources.\n","properties":{"alertChannelGcpPubSubId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FAlertChannelGcpPubSubCredentials:AlertChannelGcpPubSubCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"issueGrouping":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"projectId":{"type":"string","description":"The name of the Google Cloud Project.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"topicId":{"type":"string","description":"The ID of the Google Cloud Pub/Sub topic.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelJiraCloud:AlertChannelJiraCloud":{"description":"Configure Lacework to forward events to Jira. Lacework calls the Jira integration REST API and creates a new Jira open issue for each Lacework event that meets or exceeds the specified alert severity level. If there is a large volume of events that exceed the ability of Jira REST API to create new Jira issues, priority is given to those events with the highest severity.\n\n## Jira + Lacework Integration Prerequisites\n\nBefore creating the Jira alert channel, verify the following prerequisites:\n\n* Provide a Jira user name and an API access token that is used to create new Jira issues. For management and security purposes, Lacework recommends creating a dedicated Lacework Jira user with appropriate permissions. For more information, refer to the [Jira REST API Reference](https://developer.atlassian.com/server/jira/platform/rest-apis/)\n* The Jira user must have sufficient privileges to create new Jira issues in the specified Jira project\n* The Jira issue type must exist in the specified Jira project prior to creating the Lacework Jira alert channel. When Lacework creates new Jira issues, it creates new issues based on the specified Jira issue type\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelJiraCloud(\"example\", {\n    name: \"My Jira Cloud Alert Channel Example\",\n    jiraUrl: \"mycompany.atlassian.net\",\n    issueType: \"Bug\",\n    projectKey: \"EXAMPLE\",\n    username: \"my@username.com\",\n    apiToken: \"abcd1234\",\n    configuration: \"Bidirectional\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelJiraCloud(\"example\",\n    name=\"My Jira Cloud Alert Channel Example\",\n    jira_url=\"mycompany.atlassian.net\",\n    issue_type=\"Bug\",\n    project_key=\"EXAMPLE\",\n    username=\"my@username.com\",\n    api_token=\"abcd1234\",\n    configuration=\"Bidirectional\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelJiraCloud(\"example\", new()\n    {\n        Name = \"My Jira Cloud Alert Channel Example\",\n        JiraUrl = \"mycompany.atlassian.net\",\n        IssueType = \"Bug\",\n        ProjectKey = \"EXAMPLE\",\n        Username = \"my@username.com\",\n        ApiToken = \"abcd1234\",\n        Configuration = \"Bidirectional\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelJiraCloud(ctx, \"example\", \u0026lacework.AlertChannelJiraCloudArgs{\n\t\t\tName:          pulumi.String(\"My Jira Cloud Alert Channel Example\"),\n\t\t\tJiraUrl:       pulumi.String(\"mycompany.atlassian.net\"),\n\t\t\tIssueType:     pulumi.String(\"Bug\"),\n\t\t\tProjectKey:    pulumi.String(\"EXAMPLE\"),\n\t\t\tUsername:      pulumi.String(\"my@username.com\"),\n\t\t\tApiToken:      pulumi.String(\"abcd1234\"),\n\t\t\tConfiguration: pulumi.String(\"Bidirectional\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelJiraCloud;\nimport com.pulumi.lacework.AlertChannelJiraCloudArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelJiraCloud(\"example\", AlertChannelJiraCloudArgs.builder()\n            .name(\"My Jira Cloud Alert Channel Example\")\n            .jiraUrl(\"mycompany.atlassian.net\")\n            .issueType(\"Bug\")\n            .projectKey(\"EXAMPLE\")\n            .username(\"my@username.com\")\n            .apiToken(\"abcd1234\")\n            .configuration(\"Bidirectional\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelJiraCloud\n    properties:\n      name: My Jira Cloud Alert Channel Example\n      jiraUrl: mycompany.atlassian.net\n      issueType: Bug\n      projectKey: EXAMPLE\n      username: my@username.com\n      apiToken: abcd1234\n      configuration: Bidirectional\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Jira Cloud Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelJiraCloud:AlertChannelJiraCloud example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelJiraCloudId":{"type":"string"},"apiToken":{"type":"string","description":"The Jira API Token. For more information, see [how to create a Jira API Token](https://confluence.atlassian.com/cloud/api-tokens-938839638.html).\n","secret":true},"configuration":{"type":"string","description":"Defines whether the integration is Unidirectional or Bidirectional.  For more information, see [more about Bidirectional Jira integrations](https://docs.lacework.com/onboarding/jira#bidirectional-integration).  Defaults to `Unidirectional`.\nThe available options are:\n* **Unidirectional**: A unidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated.\n* **Bidirectional**: A bidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated, and vice-versa.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"customTemplateFile":{"type":"string","description":"A Custom Template JSON file to populate fields in the new Jira issues.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle Jira issue will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one Jira ticket is created.\n* **Resources**: Multiple Jira issues will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three Jira issues are created.\n"},"intgGuid":{"type":"string"},"issueType":{"type":"string","description":"The Jira Issue type (such as a `Bug`) to create when a new Jira issue is created.\n"},"jiraUrl":{"type":"string","description":"The URL of your Jira implementation without https protocol (`https://`). For example, `mycompany.atlassian.net` or `mycompany.jira.com`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"projectKey":{"type":"string","description":"The project key for the Jira project where the new Jira issues should be created.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"username":{"type":"string","description":"The Jira user name. Lacework recommends a dedicated Jira user. See above for more information.\n"}},"type":"object","required":["alertChannelJiraCloudId","apiToken","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","issueType","jiraUrl","name","orgLevel","projectKey","typeName","username"],"inputProperties":{"alertChannelJiraCloudId":{"type":"string"},"apiToken":{"type":"string","description":"The Jira API Token. For more information, see [how to create a Jira API Token](https://confluence.atlassian.com/cloud/api-tokens-938839638.html).\n","secret":true},"configuration":{"type":"string","description":"Defines whether the integration is Unidirectional or Bidirectional.  For more information, see [more about Bidirectional Jira integrations](https://docs.lacework.com/onboarding/jira#bidirectional-integration).  Defaults to `Unidirectional`.\nThe available options are:\n* **Unidirectional**: A unidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated.\n* **Bidirectional**: A bidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated, and vice-versa.\n"},"customTemplateFile":{"type":"string","description":"A Custom Template JSON file to populate fields in the new Jira issues.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle Jira issue will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one Jira ticket is created.\n* **Resources**: Multiple Jira issues will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three Jira issues are created.\n"},"issueType":{"type":"string","description":"The Jira Issue type (such as a `Bug`) to create when a new Jira issue is created.\n"},"jiraUrl":{"type":"string","description":"The URL of your Jira implementation without https protocol (`https://`). For example, `mycompany.atlassian.net` or `mycompany.jira.com`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"projectKey":{"type":"string","description":"The project key for the Jira project where the new Jira issues should be created.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"username":{"type":"string","description":"The Jira user name. Lacework recommends a dedicated Jira user. See above for more information.\n"}},"requiredInputs":["apiToken","issueType","jiraUrl","projectKey","username"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelJiraCloud resources.\n","properties":{"alertChannelJiraCloudId":{"type":"string"},"apiToken":{"type":"string","description":"The Jira API Token. For more information, see [how to create a Jira API Token](https://confluence.atlassian.com/cloud/api-tokens-938839638.html).\n","secret":true},"configuration":{"type":"string","description":"Defines whether the integration is Unidirectional or Bidirectional.  For more information, see [more about Bidirectional Jira integrations](https://docs.lacework.com/onboarding/jira#bidirectional-integration).  Defaults to `Unidirectional`.\nThe available options are:\n* **Unidirectional**: A unidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated.\n* **Bidirectional**: A bidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated, and vice-versa.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"customTemplateFile":{"type":"string","description":"A Custom Template JSON file to populate fields in the new Jira issues.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle Jira issue will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one Jira ticket is created.\n* **Resources**: Multiple Jira issues will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three Jira issues are created.\n"},"intgGuid":{"type":"string"},"issueType":{"type":"string","description":"The Jira Issue type (such as a `Bug`) to create when a new Jira issue is created.\n"},"jiraUrl":{"type":"string","description":"The URL of your Jira implementation without https protocol (`https://`). For example, `mycompany.atlassian.net` or `mycompany.jira.com`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"projectKey":{"type":"string","description":"The project key for the Jira project where the new Jira issues should be created.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"username":{"type":"string","description":"The Jira user name. Lacework recommends a dedicated Jira user. See above for more information.\n"}},"type":"object"}},"lacework:index/alertChannelJiraServer:AlertChannelJiraServer":{"description":"Configure Lacework to forward events to Jira. Lacework calls the Jira integration REST API and creates a new Jira open issue for each Lacework event that meets or exceeds the specified alert severity level. If there is a large volume of events that exceed the ability of Jira REST API to create new Jira issues, priority is given to those events with the highest severity.\n\n## Jira + Lacework Integration Prerequisites\n\nBefore creating the Jira alert channel, verify the following prerequisites:\n\n* Provide a Jira user name and password that is used to create new Jira issues. For management and security purposes, Lacework recommends creating a dedicated Lacework Jira user with appropriate permissions. For more information, refer to the [Jira REST API Reference](https://developer.atlassian.com/server/jira/platform/rest-apis/)\n* The Jira user must have sufficient privileges to create new Jira issues in the specified Jira project\n* The Jira issue type must exist in the specified Jira project prior to creating the Lacework Jira alert channel. When Lacework creates new Jira issues, it creates new issues based on the specified Jira issue type\n* Whitelist the Lacework outbound IPs to allow Lacework to communicate with the Jira server. See [Lacework Outbound IPs](https://support.lacework.com/hc/en-us/articles/360052140433)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelJiraServer(\"example\", {\n    name: \"My Jira Server Alert Channel Example\",\n    jiraUrl: \"mycompany.atlassian.net\",\n    issueType: \"Bug\",\n    projectKey: \"EXAMPLE\",\n    username: \"my@username.com\",\n    password: \"abcd1234\",\n    configuration: \"Bidirectional\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelJiraServer(\"example\",\n    name=\"My Jira Server Alert Channel Example\",\n    jira_url=\"mycompany.atlassian.net\",\n    issue_type=\"Bug\",\n    project_key=\"EXAMPLE\",\n    username=\"my@username.com\",\n    password=\"abcd1234\",\n    configuration=\"Bidirectional\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelJiraServer(\"example\", new()\n    {\n        Name = \"My Jira Server Alert Channel Example\",\n        JiraUrl = \"mycompany.atlassian.net\",\n        IssueType = \"Bug\",\n        ProjectKey = \"EXAMPLE\",\n        Username = \"my@username.com\",\n        Password = \"abcd1234\",\n        Configuration = \"Bidirectional\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelJiraServer(ctx, \"example\", \u0026lacework.AlertChannelJiraServerArgs{\n\t\t\tName:          pulumi.String(\"My Jira Server Alert Channel Example\"),\n\t\t\tJiraUrl:       pulumi.String(\"mycompany.atlassian.net\"),\n\t\t\tIssueType:     pulumi.String(\"Bug\"),\n\t\t\tProjectKey:    pulumi.String(\"EXAMPLE\"),\n\t\t\tUsername:      pulumi.String(\"my@username.com\"),\n\t\t\tPassword:      pulumi.String(\"abcd1234\"),\n\t\t\tConfiguration: pulumi.String(\"Bidirectional\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelJiraServer;\nimport com.pulumi.lacework.AlertChannelJiraServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelJiraServer(\"example\", AlertChannelJiraServerArgs.builder()\n            .name(\"My Jira Server Alert Channel Example\")\n            .jiraUrl(\"mycompany.atlassian.net\")\n            .issueType(\"Bug\")\n            .projectKey(\"EXAMPLE\")\n            .username(\"my@username.com\")\n            .password(\"abcd1234\")\n            .configuration(\"Bidirectional\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelJiraServer\n    properties:\n      name: My Jira Server Alert Channel Example\n      jiraUrl: mycompany.atlassian.net\n      issueType: Bug\n      projectKey: EXAMPLE\n      username: my@username.com\n      password: abcd1234\n      configuration: Bidirectional\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Jira Server Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelJiraServer:AlertChannelJiraServer example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelJiraServerId":{"type":"string"},"configuration":{"type":"string","description":"Defines whether the integration is Unidirectional or Bidirectional.  For more information, see [more about Bidirectional Jira integrations](https://docs.lacework.com/onboarding/jira#bidirectional-integration).  Defaults to `Unidirectional`.\nThe available options are:\n* **Unidirectional**: A unidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated.\n* **Bidirectional**: A bidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated, and vice-versa.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"customTemplateFile":{"type":"string","description":"A Custom Template JSON file to populate fields in the new Jira issues.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle Jira issue will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one Jira ticket is created.\n* **Resources**: Multiple Jira issues will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three Jira issues are created.\n"},"intgGuid":{"type":"string"},"issueType":{"type":"string","description":"The Jira Issue type (such as a `Bug`) to create when a new Jira issue is created.\n"},"jiraUrl":{"type":"string","description":"The URL of your Jira implementation without https protocol (`https://`). For example, `mycompany.atlassian.net` or `mycompany.jira.com`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The password to the Jira user.\n","secret":true},"projectKey":{"type":"string","description":"The project key for the Jira project where the new Jira issues should be created.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"username":{"type":"string","description":"The Jira user name. Lacework recommends a dedicated Jira user. See above for more information.\n"}},"type":"object","required":["alertChannelJiraServerId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","issueType","jiraUrl","name","orgLevel","password","projectKey","typeName","username"],"inputProperties":{"alertChannelJiraServerId":{"type":"string"},"configuration":{"type":"string","description":"Defines whether the integration is Unidirectional or Bidirectional.  For more information, see [more about Bidirectional Jira integrations](https://docs.lacework.com/onboarding/jira#bidirectional-integration).  Defaults to `Unidirectional`.\nThe available options are:\n* **Unidirectional**: A unidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated.\n* **Bidirectional**: A bidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated, and vice-versa.\n"},"customTemplateFile":{"type":"string","description":"A Custom Template JSON file to populate fields in the new Jira issues.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle Jira issue will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one Jira ticket is created.\n* **Resources**: Multiple Jira issues will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three Jira issues are created.\n"},"issueType":{"type":"string","description":"The Jira Issue type (such as a `Bug`) to create when a new Jira issue is created.\n"},"jiraUrl":{"type":"string","description":"The URL of your Jira implementation without https protocol (`https://`). For example, `mycompany.atlassian.net` or `mycompany.jira.com`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"password":{"type":"string","description":"The password to the Jira user.\n","secret":true},"projectKey":{"type":"string","description":"The project key for the Jira project where the new Jira issues should be created.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"username":{"type":"string","description":"The Jira user name. Lacework recommends a dedicated Jira user. See above for more information.\n"}},"requiredInputs":["issueType","jiraUrl","password","projectKey","username"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelJiraServer resources.\n","properties":{"alertChannelJiraServerId":{"type":"string"},"configuration":{"type":"string","description":"Defines whether the integration is Unidirectional or Bidirectional.  For more information, see [more about Bidirectional Jira integrations](https://docs.lacework.com/onboarding/jira#bidirectional-integration).  Defaults to `Unidirectional`.\nThe available options are:\n* **Unidirectional**: A unidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated.\n* **Bidirectional**: A bidirectional integration with Jira allows you to programatically generate a corresponding Jira issue for an alert. When the alert status is updated, the Jira status is updated, and vice-versa.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"customTemplateFile":{"type":"string","description":"A Custom Template JSON file to populate fields in the new Jira issues.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groupIssuesBy":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\nThe available options are:\n* **Events**:\tSingle Jira issue will be created when compliance events of the same type but from different resources are detected by Lacework. For example, if three different S3 resources are generating the same compliance event, only one Jira ticket is created.\n* **Resources**: Multiple Jira issues will be created when multiple resources are generating the same compliance event. For example, if three different S3 resources are generating the same compliance event, three Jira issues are created.\n"},"intgGuid":{"type":"string"},"issueType":{"type":"string","description":"The Jira Issue type (such as a `Bug`) to create when a new Jira issue is created.\n"},"jiraUrl":{"type":"string","description":"The URL of your Jira implementation without https protocol (`https://`). For example, `mycompany.atlassian.net` or `mycompany.jira.com`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The password to the Jira user.\n","secret":true},"projectKey":{"type":"string","description":"The project key for the Jira project where the new Jira issues should be created.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"username":{"type":"string","description":"The Jira user name. Lacework recommends a dedicated Jira user. See above for more information.\n"}},"type":"object"}},"lacework:index/alertChannelMicrosoftTeams:AlertChannelMicrosoftTeams":{"description":"You can configure Lacework to forward alerts to a Microsoft Teams channel through an incoming webhook.\n[Create a incoming webhook](https://docs.microsoft.com/en-us/microsoftteams/platform/webhooks-and-connectors/how-to/add-incoming-webhook)\n\nTo find more information about the alert payload, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360051656053-Microsoft-Teams).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelMicrosoftTeams(\"example\", {\n    name: \"Microsoft Teams Alerts\",\n    webhookUrl: \"https://test-tenant.outlook.office.com/webhook/api-token\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelMicrosoftTeams(\"example\",\n    name=\"Microsoft Teams Alerts\",\n    webhook_url=\"https://test-tenant.outlook.office.com/webhook/api-token\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelMicrosoftTeams(\"example\", new()\n    {\n        Name = \"Microsoft Teams Alerts\",\n        WebhookUrl = \"https://test-tenant.outlook.office.com/webhook/api-token\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelMicrosoftTeams(ctx, \"example\", \u0026lacework.AlertChannelMicrosoftTeamsArgs{\n\t\t\tName:       pulumi.String(\"Microsoft Teams Alerts\"),\n\t\t\tWebhookUrl: pulumi.String(\"https://test-tenant.outlook.office.com/webhook/api-token\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelMicrosoftTeams;\nimport com.pulumi.lacework.AlertChannelMicrosoftTeamsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelMicrosoftTeams(\"example\", AlertChannelMicrosoftTeamsArgs.builder()\n            .name(\"Microsoft Teams Alerts\")\n            .webhookUrl(\"https://test-tenant.outlook.office.com/webhook/api-token\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelMicrosoftTeams\n    properties:\n      name: Microsoft Teams Alerts\n      webhookUrl: https://test-tenant.outlook.office.com/webhook/api-token\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Webhook Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelMicrosoftTeams:AlertChannelMicrosoftTeams example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelMicrosoftTeamsId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string","description":"The unique identifier of the integration"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The URL of your Microsoft Teams incoming webhook.\n"}},"type":"object","required":["alertChannelMicrosoftTeamsId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","typeName","webhookUrl"],"inputProperties":{"alertChannelMicrosoftTeamsId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"webhookUrl":{"type":"string","description":"The URL of your Microsoft Teams incoming webhook.\n"}},"requiredInputs":["webhookUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelMicrosoftTeams resources.\n","properties":{"alertChannelMicrosoftTeamsId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string","description":"The unique identifier of the integration"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The URL of your Microsoft Teams incoming webhook.\n"}},"type":"object"}},"lacework:index/alertChannelNewrelic:AlertChannelNewrelic":{"description":"You can configure a Lacework alert channel to forward alerts to New Relic using the Insights API.\n\nTo find more information about the New Relic Insights alert channel integration, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360005842354-New-Relic).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelNewrelic(\"example\", {\n    name: \"Example New Relic Insights Alert\",\n    accountId: 2338053,\n    insertKey: \"x-xx-xxxxxxxxxxxxxxxxxx\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelNewrelic(\"example\",\n    name=\"Example New Relic Insights Alert\",\n    account_id=2338053,\n    insert_key=\"x-xx-xxxxxxxxxxxxxxxxxx\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelNewrelic(\"example\", new()\n    {\n        Name = \"Example New Relic Insights Alert\",\n        AccountId = 2338053,\n        InsertKey = \"x-xx-xxxxxxxxxxxxxxxxxx\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelNewrelic(ctx, \"example\", \u0026lacework.AlertChannelNewrelicArgs{\n\t\t\tName:      pulumi.String(\"Example New Relic Insights Alert\"),\n\t\t\tAccountId: pulumi.Float64(2338053),\n\t\t\tInsertKey: pulumi.String(\"x-xx-xxxxxxxxxxxxxxxxxx\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelNewrelic;\nimport com.pulumi.lacework.AlertChannelNewrelicArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelNewrelic(\"example\", AlertChannelNewrelicArgs.builder()\n            .name(\"Example New Relic Insights Alert\")\n            .accountId(2338053.0)\n            .insertKey(\"x-xx-xxxxxxxxxxxxxxxxxx\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelNewrelic\n    properties:\n      name: Example New Relic Insights Alert\n      accountId: 2.338053e+06\n      insertKey: x-xx-xxxxxxxxxxxxxxxxxx\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework New Relic Insights Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelNewrelic:AlertChannelNewrelic example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"accountId":{"type":"number","description":"The New Relic account ID.\n"},"alertChannelNewrelicId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"insertKey":{"type":"string","description":"The New Relic Insert API key.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object","required":["accountId","alertChannelNewrelicId","createdOrUpdatedBy","createdOrUpdatedTime","insertKey","intgGuid","name","orgLevel","typeName"],"inputProperties":{"accountId":{"type":"number","description":"The New Relic account ID.\n"},"alertChannelNewrelicId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"insertKey":{"type":"string","description":"The New Relic Insert API key.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"}},"requiredInputs":["accountId","insertKey"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelNewrelic resources.\n","properties":{"accountId":{"type":"number","description":"The New Relic account ID.\n"},"alertChannelNewrelicId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"insertKey":{"type":"string","description":"The New Relic Insert API key.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelPagerduty:AlertChannelPagerduty":{"description":"Configure Lacework to forward alerts to PagerDuty through an API integration key.\n\n## PagerDuty + Lacework Integration Benefits\n\n* Extend Lacework Events to route to the correct people, at the correct time that fits your existing business processes using PagerDuty triage, escalations, and workflows.\n* One-way event notification forwards from Lacework to PagerDuty.\n* Lacework Alert Routing and Alert Rules settings allow you to configure which events and severities to receive and which resource groups and event categories you want events for. They grant complete control of the alert channels forwarded to PagerDuty.\n\n## How it Works\n\nLacework events that arise from anomaly detection, compliance, vulnerabilities, or configured rule definitions\nsend an event to a [service](https://support.pagerduty.com/docs/services-and-integrations#section-configuring-services-and-integrations)\nin PagerDuty. Events from Lacework can either trigger a new incident on the corresponding PagerDuty service or\nbe grouped as alerts into an existing incident.\n\nFor additional information about incidents and alerts, see https://support.pagerduty.com/docs/incidents and https://support.pagerduty.com/docs/alerts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst critical = new lacework.AlertChannelPagerduty(\"critical\", {\n    name: \"Forward Critical Alerts\",\n    integrationKey: \"1234abc8901abc567abc123abc78e012\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\ncritical = lacework.AlertChannelPagerduty(\"critical\",\n    name=\"Forward Critical Alerts\",\n    integration_key=\"1234abc8901abc567abc123abc78e012\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var critical = new Lacework.AlertChannelPagerduty(\"critical\", new()\n    {\n        Name = \"Forward Critical Alerts\",\n        IntegrationKey = \"1234abc8901abc567abc123abc78e012\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelPagerduty(ctx, \"critical\", \u0026lacework.AlertChannelPagerdutyArgs{\n\t\t\tName:           pulumi.String(\"Forward Critical Alerts\"),\n\t\t\tIntegrationKey: pulumi.String(\"1234abc8901abc567abc123abc78e012\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelPagerduty;\nimport com.pulumi.lacework.AlertChannelPagerdutyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var critical = new AlertChannelPagerduty(\"critical\", AlertChannelPagerdutyArgs.builder()\n            .name(\"Forward Critical Alerts\")\n            .integrationKey(\"1234abc8901abc567abc123abc78e012\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  critical:\n    type: lacework:AlertChannelPagerduty\n    properties:\n      name: Forward Critical Alerts\n      integrationKey: 1234abc8901abc567abc123abc78e012\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework PagerDuty Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelPagerduty:AlertChannelPagerduty critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelPagerdutyId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationKey":{"type":"string","description":"The PagerDuty service integration key.\n","secret":true},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation or modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelPagerdutyId","createdOrUpdatedBy","createdOrUpdatedTime","integrationKey","intgGuid","name","orgLevel","typeName"],"inputProperties":{"alertChannelPagerdutyId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationKey":{"type":"string","description":"The PagerDuty service integration key.\n","secret":true},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation or modification"}},"requiredInputs":["integrationKey"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelPagerduty resources.\n","properties":{"alertChannelPagerdutyId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationKey":{"type":"string","description":"The PagerDuty service integration key.\n","secret":true},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation or modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelQradar:AlertChannelQradar":{"description":"You can configure an alert channel to send Lacework alert notifications to IBM QRadar.\n\nTo find more information about the IBM QRadar alert channel integration, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360056898693-IBM-QRadar).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelQradar(\"example\", {\n    name: \"QRadar Channel Alert Example\",\n    hostUrl: \"https://qradar-lacework.com\",\n    hostPort: 4000,\n    communicationType: \"HTTPS\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelQradar(\"example\",\n    name=\"QRadar Channel Alert Example\",\n    host_url=\"https://qradar-lacework.com\",\n    host_port=4000,\n    communication_type=\"HTTPS\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelQradar(\"example\", new()\n    {\n        Name = \"QRadar Channel Alert Example\",\n        HostUrl = \"https://qradar-lacework.com\",\n        HostPort = 4000,\n        CommunicationType = \"HTTPS\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelQradar(ctx, \"example\", \u0026lacework.AlertChannelQradarArgs{\n\t\t\tName:              pulumi.String(\"QRadar Channel Alert Example\"),\n\t\t\tHostUrl:           pulumi.String(\"https://qradar-lacework.com\"),\n\t\t\tHostPort:          pulumi.Float64(4000),\n\t\t\tCommunicationType: pulumi.String(\"HTTPS\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelQradar;\nimport com.pulumi.lacework.AlertChannelQradarArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelQradar(\"example\", AlertChannelQradarArgs.builder()\n            .name(\"QRadar Channel Alert Example\")\n            .hostUrl(\"https://qradar-lacework.com\")\n            .hostPort(4000.0)\n            .communicationType(\"HTTPS\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelQradar\n    properties:\n      name: QRadar Channel Alert Example\n      hostUrl: https://qradar-lacework.com\n      hostPort: 4000\n      communicationType: HTTPS\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework IBM QRadar Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelQradar:AlertChannelQradar example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelQradarId":{"type":"string"},"communicationType":{"type":"string","description":"The communication protocol used. Must be one of `HTTPS` or `HTTPS Self Signed Cert`.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"hostPort":{"type":"number","description":"The listen port defined in QRadar.\n"},"hostUrl":{"type":"string","description":"The domain name or IP address of QRadar.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation or modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelQradarId","createdOrUpdatedBy","createdOrUpdatedTime","hostUrl","intgGuid","name","orgLevel","typeName"],"inputProperties":{"alertChannelQradarId":{"type":"string"},"communicationType":{"type":"string","description":"The communication protocol used. Must be one of `HTTPS` or `HTTPS Self Signed Cert`.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"hostPort":{"type":"number","description":"The listen port defined in QRadar.\n"},"hostUrl":{"type":"string","description":"The domain name or IP address of QRadar.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation or modification"}},"requiredInputs":["hostUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelQradar resources.\n","properties":{"alertChannelQradarId":{"type":"string"},"communicationType":{"type":"string","description":"The communication protocol used. Must be one of `HTTPS` or `HTTPS Self Signed Cert`.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"hostPort":{"type":"number","description":"The listen port defined in QRadar.\n"},"hostUrl":{"type":"string","description":"The domain name or IP address of QRadar.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation or modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelServiceNow:AlertChannelServiceNow":{"description":"You can configure Lacework to forward alerts to Service Now using the ServiceNow REST API.\n\nTo find more information see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360005842314-ServiceNow).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelServiceNow(\"example\", {\n    name: \"Service Now Alerts\",\n    instanceUrl: \"snow-lacework.com\",\n    username: \"snow-user\",\n    password: \"snow-pass\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelServiceNow(\"example\",\n    name=\"Service Now Alerts\",\n    instance_url=\"snow-lacework.com\",\n    username=\"snow-user\",\n    password=\"snow-pass\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelServiceNow(\"example\", new()\n    {\n        Name = \"Service Now Alerts\",\n        InstanceUrl = \"snow-lacework.com\",\n        Username = \"snow-user\",\n        Password = \"snow-pass\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelServiceNow(ctx, \"example\", \u0026lacework.AlertChannelServiceNowArgs{\n\t\t\tName:        pulumi.String(\"Service Now Alerts\"),\n\t\t\tInstanceUrl: pulumi.String(\"snow-lacework.com\"),\n\t\t\tUsername:    pulumi.String(\"snow-user\"),\n\t\t\tPassword:    pulumi.String(\"snow-pass\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelServiceNow;\nimport com.pulumi.lacework.AlertChannelServiceNowArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelServiceNow(\"example\", AlertChannelServiceNowArgs.builder()\n            .name(\"Service Now Alerts\")\n            .instanceUrl(\"snow-lacework.com\")\n            .username(\"snow-user\")\n            .password(\"snow-pass\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelServiceNow\n    properties:\n      name: Service Now Alerts\n      instanceUrl: snow-lacework.com\n      username: snow-user\n      password: snow-pass\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Service Now Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelServiceNow:AlertChannelServiceNow ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelServiceNowId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"customTemplateFile":{"type":"string","description":"Populate fields in the ServiceNow incident with values from a custom template JSON file.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"instanceUrl":{"type":"string","description":"The ServiceNow instance URL.\n"},"intgGuid":{"type":"string"},"issueGrouping":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The ServiceNow password.\n","secret":true},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"username":{"type":"string","description":"The ServiceNow user name.\n"}},"type":"object","required":["alertChannelServiceNowId","createdOrUpdatedBy","createdOrUpdatedTime","instanceUrl","intgGuid","name","orgLevel","password","typeName","username"],"inputProperties":{"alertChannelServiceNowId":{"type":"string"},"customTemplateFile":{"type":"string","description":"Populate fields in the ServiceNow incident with values from a custom template JSON file.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"instanceUrl":{"type":"string","description":"The ServiceNow instance URL.\n"},"issueGrouping":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"password":{"type":"string","description":"The ServiceNow password.\n","secret":true},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"username":{"type":"string","description":"The ServiceNow user name.\n"}},"requiredInputs":["instanceUrl","password","username"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelServiceNow resources.\n","properties":{"alertChannelServiceNowId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"customTemplateFile":{"type":"string","description":"Populate fields in the ServiceNow incident with values from a custom template JSON file.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"instanceUrl":{"type":"string","description":"The ServiceNow instance URL.\n"},"intgGuid":{"type":"string"},"issueGrouping":{"type":"string","description":"Defines how Lacework compliance events get grouped. Must be one of `Events` or `Resources`. Defaults to `Events`.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The ServiceNow password.\n","secret":true},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"username":{"type":"string","description":"The ServiceNow user name.\n"}},"type":"object"}},"lacework:index/alertChannelSlack:AlertChannelSlack":{"description":"Configure Lacework to forward alerts to a Slack channel through an incoming webhook.\n\n\u003e **Note:** Lacework recommends creating a dedicated Slack channel for Lacework events.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst opsCritical = new lacework.AlertChannelSlack(\"ops_critical\", {\n    name: \"OPS Critical Alerts\",\n    slackUrl: \"https://hooks.slack.com/services/ABCD/12345/abcd1234\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nops_critical = lacework.AlertChannelSlack(\"ops_critical\",\n    name=\"OPS Critical Alerts\",\n    slack_url=\"https://hooks.slack.com/services/ABCD/12345/abcd1234\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var opsCritical = new Lacework.AlertChannelSlack(\"ops_critical\", new()\n    {\n        Name = \"OPS Critical Alerts\",\n        SlackUrl = \"https://hooks.slack.com/services/ABCD/12345/abcd1234\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelSlack(ctx, \"ops_critical\", \u0026lacework.AlertChannelSlackArgs{\n\t\t\tName:     pulumi.String(\"OPS Critical Alerts\"),\n\t\t\tSlackUrl: pulumi.String(\"https://hooks.slack.com/services/ABCD/12345/abcd1234\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelSlack;\nimport com.pulumi.lacework.AlertChannelSlackArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var opsCritical = new AlertChannelSlack(\"opsCritical\", AlertChannelSlackArgs.builder()\n            .name(\"OPS Critical Alerts\")\n            .slackUrl(\"https://hooks.slack.com/services/ABCD/12345/abcd1234\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  opsCritical:\n    type: lacework:AlertChannelSlack\n    name: ops_critical\n    properties:\n      name: OPS Critical Alerts\n      slackUrl: https://hooks.slack.com/services/ABCD/12345/abcd1234\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Slack Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelSlack:AlertChannelSlack ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelSlackId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"slackUrl":{"type":"string","description":"The URL of the incoming Slack webhook.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelSlackId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","slackUrl","typeName"],"inputProperties":{"alertChannelSlackId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"slackUrl":{"type":"string","description":"The URL of the incoming Slack webhook.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"}},"requiredInputs":["slackUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelSlack resources.\n","properties":{"alertChannelSlackId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"slackUrl":{"type":"string","description":"The URL of the incoming Slack webhook.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelSplunk:AlertChannelSplunk":{"description":"You can use this resource to enable Lacework to forward alerts to Splunk using an HTTP Event Collector.\n\nTo find more information see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360007889274-Splunk).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst opsCritical = new lacework.AlertChannelSplunk(\"ops_critical\", {\n    name: \"OPS Critical Alerts\",\n    hecToken: \"BA696D5E-CA2F-4347-97CB-3C89F834816F\",\n    host: \"localhost\",\n    port: 80,\n    eventData: {\n        index: \"index\",\n        source: \"source\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nops_critical = lacework.AlertChannelSplunk(\"ops_critical\",\n    name=\"OPS Critical Alerts\",\n    hec_token=\"BA696D5E-CA2F-4347-97CB-3C89F834816F\",\n    host=\"localhost\",\n    port=80,\n    event_data={\n        \"index\": \"index\",\n        \"source\": \"source\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var opsCritical = new Lacework.AlertChannelSplunk(\"ops_critical\", new()\n    {\n        Name = \"OPS Critical Alerts\",\n        HecToken = \"BA696D5E-CA2F-4347-97CB-3C89F834816F\",\n        Host = \"localhost\",\n        Port = 80,\n        EventData = new Lacework.Inputs.AlertChannelSplunkEventDataArgs\n        {\n            Index = \"index\",\n            Source = \"source\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelSplunk(ctx, \"ops_critical\", \u0026lacework.AlertChannelSplunkArgs{\n\t\t\tName:     pulumi.String(\"OPS Critical Alerts\"),\n\t\t\tHecToken: pulumi.String(\"BA696D5E-CA2F-4347-97CB-3C89F834816F\"),\n\t\t\tHost:     pulumi.String(\"localhost\"),\n\t\t\tPort:     pulumi.Float64(80),\n\t\t\tEventData: \u0026lacework.AlertChannelSplunkEventDataArgs{\n\t\t\t\tIndex:  pulumi.String(\"index\"),\n\t\t\t\tSource: pulumi.String(\"source\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelSplunk;\nimport com.pulumi.lacework.AlertChannelSplunkArgs;\nimport com.pulumi.lacework.inputs.AlertChannelSplunkEventDataArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var opsCritical = new AlertChannelSplunk(\"opsCritical\", AlertChannelSplunkArgs.builder()\n            .name(\"OPS Critical Alerts\")\n            .hecToken(\"BA696D5E-CA2F-4347-97CB-3C89F834816F\")\n            .host(\"localhost\")\n            .port(80.0)\n            .eventData(AlertChannelSplunkEventDataArgs.builder()\n                .index(\"index\")\n                .source(\"source\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  opsCritical:\n    type: lacework:AlertChannelSplunk\n    name: ops_critical\n    properties:\n      name: OPS Critical Alerts\n      hecToken: BA696D5E-CA2F-4347-97CB-3C89F834816F\n      host: localhost\n      port: '80'\n      eventData:\n        index: index\n        source: source\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Splunk Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelSplunk:AlertChannelSplunk ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelSplunkId":{"type":"string"},"channel":{"type":"string","description":"The Splunk channel name.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventData":{"$ref":"#/types/lacework:index%2FAlertChannelSplunkEventData:AlertChannelSplunkEventData"},"hecToken":{"type":"string","description":"The token you generate when you create a new HEC input.\n"},"host":{"type":"string","description":"The hostname of the client from which you're sending data.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"port":{"type":"number","description":"The destination port for forwarding events.\n"},"ssl":{"type":"boolean","description":"Enable or Disable SSL.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object","required":["alertChannelSplunkId","createdOrUpdatedBy","createdOrUpdatedTime","eventData","hecToken","host","intgGuid","name","orgLevel","port","typeName"],"inputProperties":{"alertChannelSplunkId":{"type":"string"},"channel":{"type":"string","description":"The Splunk channel name.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventData":{"$ref":"#/types/lacework:index%2FAlertChannelSplunkEventData:AlertChannelSplunkEventData"},"hecToken":{"type":"string","description":"The token you generate when you create a new HEC input.\n"},"host":{"type":"string","description":"The hostname of the client from which you're sending data.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"port":{"type":"number","description":"The destination port for forwarding events.\n"},"ssl":{"type":"boolean","description":"Enable or Disable SSL.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"}},"requiredInputs":["eventData","hecToken","host","port"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelSplunk resources.\n","properties":{"alertChannelSplunkId":{"type":"string"},"channel":{"type":"string","description":"The Splunk channel name.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventData":{"$ref":"#/types/lacework:index%2FAlertChannelSplunkEventData:AlertChannelSplunkEventData"},"hecToken":{"type":"string","description":"The token you generate when you create a new HEC input.\n"},"host":{"type":"string","description":"The hostname of the client from which you're sending data.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"port":{"type":"number","description":"The destination port for forwarding events.\n"},"ssl":{"type":"boolean","description":"Enable or Disable SSL.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/alertChannelVictorops:AlertChannelVictorops":{"description":"You can configure Lacework to forward alerts to specific VictorOps groups using a VictorOps REST endpoint.\n\nTo find more information about the alert payload, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360005916533-VictorOps).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertChannelVictorops(\"example\", {\n    name: \"VictorOps Example\",\n    webhookUrl: \"https://alert.victorops.com/integrations/generic/20131114/alert/31e945ee-5cad-44e7-afb0-97c20ea80dd8/database\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertChannelVictorops(\"example\",\n    name=\"VictorOps Example\",\n    webhook_url=\"https://alert.victorops.com/integrations/generic/20131114/alert/31e945ee-5cad-44e7-afb0-97c20ea80dd8/database\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertChannelVictorops(\"example\", new()\n    {\n        Name = \"VictorOps Example\",\n        WebhookUrl = \"https://alert.victorops.com/integrations/generic/20131114/alert/31e945ee-5cad-44e7-afb0-97c20ea80dd8/database\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelVictorops(ctx, \"example\", \u0026lacework.AlertChannelVictoropsArgs{\n\t\t\tName:       pulumi.String(\"VictorOps Example\"),\n\t\t\tWebhookUrl: pulumi.String(\"https://alert.victorops.com/integrations/generic/20131114/alert/31e945ee-5cad-44e7-afb0-97c20ea80dd8/database\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelVictorops;\nimport com.pulumi.lacework.AlertChannelVictoropsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertChannelVictorops(\"example\", AlertChannelVictoropsArgs.builder()\n            .name(\"VictorOps Example\")\n            .webhookUrl(\"https://alert.victorops.com/integrations/generic/20131114/alert/31e945ee-5cad-44e7-afb0-97c20ea80dd8/database\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertChannelVictorops\n    properties:\n      name: VictorOps Example\n      webhookUrl: https://alert.victorops.com/integrations/generic/20131114/alert/31e945ee-5cad-44e7-afb0-97c20ea80dd8/database\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework VictorOps Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelVictorops:AlertChannelVictorops example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelVictoropsId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The URL of your VictorOps webhook that will receive the HTTP POST.\n"}},"type":"object","required":["alertChannelVictoropsId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","typeName","webhookUrl"],"inputProperties":{"alertChannelVictoropsId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"webhookUrl":{"type":"string","description":"The URL of your VictorOps webhook that will receive the HTTP POST.\n"}},"requiredInputs":["webhookUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelVictorops resources.\n","properties":{"alertChannelVictoropsId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The URL of your VictorOps webhook that will receive the HTTP POST.\n"}},"type":"object"}},"lacework:index/alertChannelWebhook:AlertChannelWebhook":{"description":"You can use this resource to create a custom webhook that receives Lacework alert notifications from a Lacework alert channel and forwards those alerts to a third-party application.\n\n\u003e **Note:**  If the third-party application receiving the HTTP POST request requires an API token, enter the API token as part of the URL eg. https://webhook.com?api-token=123\n\nTo find more information about the alert payload, see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360034367393-Webhook).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst opsCritical = new lacework.AlertChannelWebhook(\"ops_critical\", {\n    name: \"OPS Critical Alerts\",\n    webhookUrl: \"https://webhook.com?api-token=123\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nops_critical = lacework.AlertChannelWebhook(\"ops_critical\",\n    name=\"OPS Critical Alerts\",\n    webhook_url=\"https://webhook.com?api-token=123\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var opsCritical = new Lacework.AlertChannelWebhook(\"ops_critical\", new()\n    {\n        Name = \"OPS Critical Alerts\",\n        WebhookUrl = \"https://webhook.com?api-token=123\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelWebhook(ctx, \"ops_critical\", \u0026lacework.AlertChannelWebhookArgs{\n\t\t\tName:       pulumi.String(\"OPS Critical Alerts\"),\n\t\t\tWebhookUrl: pulumi.String(\"https://webhook.com?api-token=123\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelWebhook;\nimport com.pulumi.lacework.AlertChannelWebhookArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var opsCritical = new AlertChannelWebhook(\"opsCritical\", AlertChannelWebhookArgs.builder()\n            .name(\"OPS Critical Alerts\")\n            .webhookUrl(\"https://webhook.com?api-token=123\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  opsCritical:\n    type: lacework:AlertChannelWebhook\n    name: ops_critical\n    properties:\n      name: OPS Critical Alerts\n      webhookUrl: https://webhook.com?api-token=123\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Webhook Alert Channel integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertChannelWebhook:AlertChannelWebhook ops_critical EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework alert-channel list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alertChannelWebhookId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The URL of your webhook that will receive the HTTP POST.\n"}},"type":"object","required":["alertChannelWebhookId","createdOrUpdatedBy","createdOrUpdatedTime","intgGuid","name","orgLevel","typeName","webhookUrl"],"inputProperties":{"alertChannelWebhookId":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"webhookUrl":{"type":"string","description":"The URL of your webhook that will receive the HTTP POST.\n"}},"requiredInputs":["webhookUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertChannelWebhook resources.\n","properties":{"alertChannelWebhookId":{"type":"string"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Alert Channel integration name.\n"},"orgLevel":{"type":"boolean"},"testIntegration":{"type":"boolean","description":"Whether to test the integration of an alert channel upon creation and modification"},"typeName":{"type":"string"},"webhookUrl":{"type":"string","description":"The URL of your webhook that will receive the HTTP POST.\n"}},"type":"object"}},"lacework:index/alertProfile:AlertProfile":{"description":"Use this resource to create a Lacework Alert Profile in order to map query results to events and form event descriptions.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.AlertProfile(\"example\", {\n    name: \"CUSTOM_PROFILE_TERRAFORM_TEST\",\n    \"extends\": \"LW_CFG_GCP_DEFAULT_PROFILE\",\n    alerts: [{\n        name: \"Violation\",\n        eventName: \"LW Configuration GCP Violation Alert\",\n        subject: \"{{_OCCURRENCE}} violation detected in project {{PROJECT_ID}}\",\n        description: alertDescription,\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.AlertProfile(\"example\",\n    name=\"CUSTOM_PROFILE_TERRAFORM_TEST\",\n    extends=\"LW_CFG_GCP_DEFAULT_PROFILE\",\n    alerts=[{\n        \"name\": \"Violation\",\n        \"event_name\": \"LW Configuration GCP Violation Alert\",\n        \"subject\": \"{{_OCCURRENCE}} violation detected in project {{PROJECT_ID}}\",\n        \"description\": alert_description,\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.AlertProfile(\"example\", new()\n    {\n        Name = \"CUSTOM_PROFILE_TERRAFORM_TEST\",\n        Extends = \"LW_CFG_GCP_DEFAULT_PROFILE\",\n        Alerts = new[]\n        {\n            new Lacework.Inputs.AlertProfileAlertArgs\n            {\n                Name = \"Violation\",\n                EventName = \"LW Configuration GCP Violation Alert\",\n                Subject = \"{{_OCCURRENCE}} violation detected in project {{PROJECT_ID}}\",\n                Description = alertDescription,\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertProfile(ctx, \"example\", \u0026lacework.AlertProfileArgs{\n\t\t\tName:    pulumi.String(\"CUSTOM_PROFILE_TERRAFORM_TEST\"),\n\t\t\tExtends: pulumi.String(\"LW_CFG_GCP_DEFAULT_PROFILE\"),\n\t\t\tAlerts: lacework.AlertProfileAlertArray{\n\t\t\t\t\u0026lacework.AlertProfileAlertArgs{\n\t\t\t\t\tName:        pulumi.String(\"Violation\"),\n\t\t\t\t\tEventName:   pulumi.String(\"LW Configuration GCP Violation Alert\"),\n\t\t\t\t\tSubject:     pulumi.String(\"{{_OCCURRENCE}} violation detected in project {{PROJECT_ID}}\"),\n\t\t\t\t\tDescription: pulumi.Any(alertDescription),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertProfile;\nimport com.pulumi.lacework.AlertProfileArgs;\nimport com.pulumi.lacework.inputs.AlertProfileAlertArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new AlertProfile(\"example\", AlertProfileArgs.builder()\n            .name(\"CUSTOM_PROFILE_TERRAFORM_TEST\")\n            .extends_(\"LW_CFG_GCP_DEFAULT_PROFILE\")\n            .alerts(AlertProfileAlertArgs.builder()\n                .name(\"Violation\")\n                .eventName(\"LW Configuration GCP Violation Alert\")\n                .subject(\"{{_OCCURRENCE}} violation detected in project {{PROJECT_ID}}\")\n                .description(alertDescription)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:AlertProfile\n    properties:\n      name: CUSTOM_PROFILE_TERRAFORM_TEST\n      extends: LW_CFG_GCP_DEFAULT_PROFILE\n      alerts:\n        - name: Violation\n          eventName: LW Configuration GCP Violation Alert\n          subject: '{{_OCCURRENCE}} violation detected in project {{PROJECT_ID}}'\n          description: ${alertDescription}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Alert Profile can be imported using it's `name`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertProfile:AlertProfile example CUSTOM_PROFILE_TERRAFORM_TEST\n```\n","properties":{"alertProfileId":{"type":"string"},"alerts":{"type":"array","items":{"$ref":"#/types/lacework:index%2FAlertProfileAlert:AlertProfileAlert"},"description":"The list of alert templates. See Alert below for details.\n"},"extends":{"type":"string","description":"The name of existing alert profile from which this profile extends.\n"},"fields":{"type":"array","items":{"type":"string"},"description":"A field is a declaration of a field to be mapped in from an LQL query"},"name":{"type":"string","description":"The alert profile name, uniquely identifies the profile. Cannot start 'LW_' which is reserved for Lacework profiles.\n"}},"type":"object","required":["alertProfileId","alerts","extends","fields","name"],"inputProperties":{"alertProfileId":{"type":"string"},"alerts":{"type":"array","items":{"$ref":"#/types/lacework:index%2FAlertProfileAlert:AlertProfileAlert"},"description":"The list of alert templates. See Alert below for details.\n"},"extends":{"type":"string","description":"The name of existing alert profile from which this profile extends.\n"},"name":{"type":"string","description":"The alert profile name, uniquely identifies the profile. Cannot start 'LW_' which is reserved for Lacework profiles.\n"}},"requiredInputs":["alerts","extends"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertProfile resources.\n","properties":{"alertProfileId":{"type":"string"},"alerts":{"type":"array","items":{"$ref":"#/types/lacework:index%2FAlertProfileAlert:AlertProfileAlert"},"description":"The list of alert templates. See Alert below for details.\n"},"extends":{"type":"string","description":"The name of existing alert profile from which this profile extends.\n"},"fields":{"type":"array","items":{"type":"string"},"description":"A field is a declaration of a field to be mapped in from an LQL query"},"name":{"type":"string","description":"The alert profile name, uniquely identifies the profile. Cannot start 'LW_' which is reserved for Lacework profiles.\n"}},"type":"object"}},"lacework:index/alertRule:AlertRule":{"description":"Use this resource to create a Lacework Alert Rule in order to route events to the appropriate people or tools.\nFor more information, see the [Alert Rules documentation](https://support.lacework.com/hc/en-us/articles/360042236733-Alert-Rules).\n\n## Example Usage\n\n### Alert Rule with Slack Alert Channel\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst opsCritical = new lacework.AlertChannelSlack(\"ops_critical\", {\n    name: \"OPS Critical Alerts\",\n    slackUrl: \"https://hooks.slack.com/services/ABCD/12345/abcd1234\",\n});\nconst example = new lacework.AlertRule(\"example\", {\n    name: \"My Alert Rule\",\n    description: \"This is an example alert rule\",\n    alertChannels: [opsCritical.alertChannelSlackId],\n    severities: [\"Critical\"],\n    alertSubcategories: [\"Compliance\"],\n    alertCategories: [\"Policy\"],\n    alertSources: [\"AWS\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nops_critical = lacework.AlertChannelSlack(\"ops_critical\",\n    name=\"OPS Critical Alerts\",\n    slack_url=\"https://hooks.slack.com/services/ABCD/12345/abcd1234\")\nexample = lacework.AlertRule(\"example\",\n    name=\"My Alert Rule\",\n    description=\"This is an example alert rule\",\n    alert_channels=[ops_critical.alert_channel_slack_id],\n    severities=[\"Critical\"],\n    alert_subcategories=[\"Compliance\"],\n    alert_categories=[\"Policy\"],\n    alert_sources=[\"AWS\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var opsCritical = new Lacework.AlertChannelSlack(\"ops_critical\", new()\n    {\n        Name = \"OPS Critical Alerts\",\n        SlackUrl = \"https://hooks.slack.com/services/ABCD/12345/abcd1234\",\n    });\n\n    var example = new Lacework.AlertRule(\"example\", new()\n    {\n        Name = \"My Alert Rule\",\n        Description = \"This is an example alert rule\",\n        AlertChannels = new[]\n        {\n            opsCritical.AlertChannelSlackId,\n        },\n        Severities = new[]\n        {\n            \"Critical\",\n        },\n        AlertSubcategories = new[]\n        {\n            \"Compliance\",\n        },\n        AlertCategories = new[]\n        {\n            \"Policy\",\n        },\n        AlertSources = new[]\n        {\n            \"AWS\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\topsCritical, err := lacework.NewAlertChannelSlack(ctx, \"ops_critical\", \u0026lacework.AlertChannelSlackArgs{\n\t\t\tName:     pulumi.String(\"OPS Critical Alerts\"),\n\t\t\tSlackUrl: pulumi.String(\"https://hooks.slack.com/services/ABCD/12345/abcd1234\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewAlertRule(ctx, \"example\", \u0026lacework.AlertRuleArgs{\n\t\t\tName:        pulumi.String(\"My Alert Rule\"),\n\t\t\tDescription: pulumi.String(\"This is an example alert rule\"),\n\t\t\tAlertChannels: pulumi.StringArray{\n\t\t\t\topsCritical.AlertChannelSlackId,\n\t\t\t},\n\t\t\tSeverities: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Critical\"),\n\t\t\t},\n\t\t\tAlertSubcategories: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Compliance\"),\n\t\t\t},\n\t\t\tAlertCategories: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy\"),\n\t\t\t},\n\t\t\tAlertSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"AWS\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelSlack;\nimport com.pulumi.lacework.AlertChannelSlackArgs;\nimport com.pulumi.lacework.AlertRule;\nimport com.pulumi.lacework.AlertRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var opsCritical = new AlertChannelSlack(\"opsCritical\", AlertChannelSlackArgs.builder()\n            .name(\"OPS Critical Alerts\")\n            .slackUrl(\"https://hooks.slack.com/services/ABCD/12345/abcd1234\")\n            .build());\n\n        var example = new AlertRule(\"example\", AlertRuleArgs.builder()\n            .name(\"My Alert Rule\")\n            .description(\"This is an example alert rule\")\n            .alertChannels(opsCritical.alertChannelSlackId())\n            .severities(\"Critical\")\n            .alertSubcategories(\"Compliance\")\n            .alertCategories(\"Policy\")\n            .alertSources(\"AWS\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  opsCritical:\n    type: lacework:AlertChannelSlack\n    name: ops_critical\n    properties:\n      name: OPS Critical Alerts\n      slackUrl: https://hooks.slack.com/services/ABCD/12345/abcd1234\n  example:\n    type: lacework:AlertRule\n    properties:\n      name: My Alert Rule\n      description: This is an example alert rule\n      alertChannels:\n        - ${opsCritical.alertChannelSlackId}\n      severities:\n        - Critical\n      alertSubcategories:\n        - Compliance\n      alertCategories:\n        - Policy\n      alertSources:\n        - AWS\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Alert Rule with Slack Alert Channel and Gcp Resource Group\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst opsCritical = new lacework.AlertChannelSlack(\"ops_critical\", {\n    name: \"OPS Critical Alerts\",\n    slackUrl: \"https://hooks.slack.com/services/ABCD/12345/abcd1234\",\n});\nconst allGcpProjects = new lacework.index.ResourceGroupGcp(\"all_gcp_projects\", {\n    name: \"GCP Resource Group\",\n    description: \"All Gcp Projects\",\n    organization: \"MyGcpOrg\",\n    projects: [\"*\"],\n});\nconst example = new lacework.AlertRule(\"example\", {\n    name: \"My Alert Rule\",\n    description: \"This is an example alert rule\",\n    alertChannels: [opsCritical.alertChannelSlackId],\n    severities: [\"Critical\"],\n    alertSubcategories: [\"Compliance\"],\n    resourceGroups: [allGcpProjects.id],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nops_critical = lacework.AlertChannelSlack(\"ops_critical\",\n    name=\"OPS Critical Alerts\",\n    slack_url=\"https://hooks.slack.com/services/ABCD/12345/abcd1234\")\nall_gcp_projects = lacework.index.ResourceGroupGcp(\"all_gcp_projects\",\n    name=GCP Resource Group,\n    description=All Gcp Projects,\n    organization=MyGcpOrg,\n    projects=[*])\nexample = lacework.AlertRule(\"example\",\n    name=\"My Alert Rule\",\n    description=\"This is an example alert rule\",\n    alert_channels=[ops_critical.alert_channel_slack_id],\n    severities=[\"Critical\"],\n    alert_subcategories=[\"Compliance\"],\n    resource_groups=[all_gcp_projects[\"id\"]])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var opsCritical = new Lacework.AlertChannelSlack(\"ops_critical\", new()\n    {\n        Name = \"OPS Critical Alerts\",\n        SlackUrl = \"https://hooks.slack.com/services/ABCD/12345/abcd1234\",\n    });\n\n    var allGcpProjects = new Lacework.Index.ResourceGroupGcp(\"all_gcp_projects\", new()\n    {\n        Name = \"GCP Resource Group\",\n        Description = \"All Gcp Projects\",\n        Organization = \"MyGcpOrg\",\n        Projects = new[]\n        {\n            \"*\",\n        },\n    });\n\n    var example = new Lacework.AlertRule(\"example\", new()\n    {\n        Name = \"My Alert Rule\",\n        Description = \"This is an example alert rule\",\n        AlertChannels = new[]\n        {\n            opsCritical.AlertChannelSlackId,\n        },\n        Severities = new[]\n        {\n            \"Critical\",\n        },\n        AlertSubcategories = new[]\n        {\n            \"Compliance\",\n        },\n        ResourceGroups = new[]\n        {\n            allGcpProjects.Id,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\topsCritical, err := lacework.NewAlertChannelSlack(ctx, \"ops_critical\", \u0026lacework.AlertChannelSlackArgs{\n\t\t\tName:     pulumi.String(\"OPS Critical Alerts\"),\n\t\t\tSlackUrl: pulumi.String(\"https://hooks.slack.com/services/ABCD/12345/abcd1234\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tallGcpProjects, err := lacework.NewResourceGroupGcp(ctx, \"all_gcp_projects\", \u0026lacework.ResourceGroupGcpArgs{\n\t\t\tName:         \"GCP Resource Group\",\n\t\t\tDescription:  \"All Gcp Projects\",\n\t\t\tOrganization: \"MyGcpOrg\",\n\t\t\tProjects: []string{\n\t\t\t\t\"*\",\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewAlertRule(ctx, \"example\", \u0026lacework.AlertRuleArgs{\n\t\t\tName:        pulumi.String(\"My Alert Rule\"),\n\t\t\tDescription: pulumi.String(\"This is an example alert rule\"),\n\t\t\tAlertChannels: pulumi.StringArray{\n\t\t\t\topsCritical.AlertChannelSlackId,\n\t\t\t},\n\t\t\tSeverities: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Critical\"),\n\t\t\t},\n\t\t\tAlertSubcategories: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Compliance\"),\n\t\t\t},\n\t\t\tResourceGroups: pulumi.StringArray{\n\t\t\t\tallGcpProjects.Id,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelSlack;\nimport com.pulumi.lacework.AlertChannelSlackArgs;\nimport com.pulumi.lacework.ResourceGroupGcp;\nimport com.pulumi.lacework.ResourceGroupGcpArgs;\nimport com.pulumi.lacework.AlertRule;\nimport com.pulumi.lacework.AlertRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var opsCritical = new AlertChannelSlack(\"opsCritical\", AlertChannelSlackArgs.builder()\n            .name(\"OPS Critical Alerts\")\n            .slackUrl(\"https://hooks.slack.com/services/ABCD/12345/abcd1234\")\n            .build());\n\n        var allGcpProjects = new ResourceGroupGcp(\"allGcpProjects\", ResourceGroupGcpArgs.builder()\n            .name(\"GCP Resource Group\")\n            .description(\"All Gcp Projects\")\n            .organization(\"MyGcpOrg\")\n            .projects(List.of(\"*\"))\n            .build());\n\n        var example = new AlertRule(\"example\", AlertRuleArgs.builder()\n            .name(\"My Alert Rule\")\n            .description(\"This is an example alert rule\")\n            .alertChannels(opsCritical.alertChannelSlackId())\n            .severities(\"Critical\")\n            .alertSubcategories(\"Compliance\")\n            .resourceGroups(allGcpProjects.id())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  opsCritical:\n    type: lacework:AlertChannelSlack\n    name: ops_critical\n    properties:\n      name: OPS Critical Alerts\n      slackUrl: https://hooks.slack.com/services/ABCD/12345/abcd1234\n  allGcpProjects:\n    type: lacework:ResourceGroupGcp\n    name: all_gcp_projects\n    properties:\n      name: GCP Resource Group\n      description: All Gcp Projects\n      organization: MyGcpOrg\n      projects:\n        - '*'\n  example:\n    type: lacework:AlertRule\n    properties:\n      name: My Alert Rule\n      description: This is an example alert rule\n      alertChannels:\n        - ${opsCritical.alertChannelSlackId}\n      severities:\n        - Critical\n      alertSubcategories:\n        - Compliance\n      resourceGroups:\n        - ${allGcpProjects.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Alert Rule can be imported using a `GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/alertRule:AlertRule example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n","properties":{"alertCategories":{"type":"array","items":{"type":"string"},"description":"The alert categories that will use this rule for alert routing. Valid categories include:\n`Anomaly`, `Policy`, `Composite`.\n"},"alertChannels":{"type":"array","items":{"type":"string"},"description":"The list of alert channels for the rule to use.\n"},"alertRuleId":{"type":"string"},"alertSources":{"type":"array","items":{"type":"string"},"description":"The alert sources that will use this rule for alert routing. Valid sources include:\n`Agent`, `AWS`, `Azure`, `GCP`, `K8s`.\n"},"alertSubcategories":{"type":"array","items":{"type":"string"},"description":"The list of alert subcategories the rule will apply to. Valid categories include:\n`Compliance`, `Application`, `Cloud Activity`, `File`, `Machine`, `User`, `Platform`, `Kubernetes Activity`, `Registry`, `SystemCall`,`Host Vulnerability`, `Container Vulnerability`, `Threat Intel`.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"description":{"type":"string","description":"The description of the alert rule.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventCategories":{"type":"array","items":{"type":"string"},"description":"The list of event categories the rule will apply to. Valid categories include:\n`Compliance`, `App`, `Cloud`, `File`, `Machine`, `User`, `Platform`, `K8sActivity`, `Registry`, `SystemCall`.\nThis attribute is deprecated use \u003cspan pulumi-lang-nodejs=\"`alertSubcategories`\" pulumi-lang-dotnet=\"`AlertSubcategories`\" pulumi-lang-go=\"`alertSubcategories`\" pulumi-lang-python=\"`alert_subcategories`\" pulumi-lang-yaml=\"`alertSubcategories`\" pulumi-lang-java=\"`alertSubcategories`\"\u003e`alert_subcategories`\u003c/span\u003e instead.\n","deprecationMessage":"Deprecated"},"guid":{"type":"string"},"name":{"type":"string","description":"The alert rule name.\n"},"resourceGroups":{"type":"array","items":{"type":"string"},"description":"The list of resource groups the rule will apply to.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of the severities that the rule will apply. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"type":{"type":"string"}},"type":"object","required":["alertRuleId","createdOrUpdatedBy","createdOrUpdatedTime","guid","name","severities","type"],"inputProperties":{"alertCategories":{"type":"array","items":{"type":"string"},"description":"The alert categories that will use this rule for alert routing. Valid categories include:\n`Anomaly`, `Policy`, `Composite`.\n"},"alertChannels":{"type":"array","items":{"type":"string"},"description":"The list of alert channels for the rule to use.\n"},"alertRuleId":{"type":"string"},"alertSources":{"type":"array","items":{"type":"string"},"description":"The alert sources that will use this rule for alert routing. Valid sources include:\n`Agent`, `AWS`, `Azure`, `GCP`, `K8s`.\n"},"alertSubcategories":{"type":"array","items":{"type":"string"},"description":"The list of alert subcategories the rule will apply to. Valid categories include:\n`Compliance`, `Application`, `Cloud Activity`, `File`, `Machine`, `User`, `Platform`, `Kubernetes Activity`, `Registry`, `SystemCall`,`Host Vulnerability`, `Container Vulnerability`, `Threat Intel`.\n"},"description":{"type":"string","description":"The description of the alert rule.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventCategories":{"type":"array","items":{"type":"string"},"description":"The list of event categories the rule will apply to. Valid categories include:\n`Compliance`, `App`, `Cloud`, `File`, `Machine`, `User`, `Platform`, `K8sActivity`, `Registry`, `SystemCall`.\nThis attribute is deprecated use \u003cspan pulumi-lang-nodejs=\"`alertSubcategories`\" pulumi-lang-dotnet=\"`AlertSubcategories`\" pulumi-lang-go=\"`alertSubcategories`\" pulumi-lang-python=\"`alert_subcategories`\" pulumi-lang-yaml=\"`alertSubcategories`\" pulumi-lang-java=\"`alertSubcategories`\"\u003e`alert_subcategories`\u003c/span\u003e instead.\n","deprecationMessage":"Deprecated"},"name":{"type":"string","description":"The alert rule name.\n"},"resourceGroups":{"type":"array","items":{"type":"string"},"description":"The list of resource groups the rule will apply to.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of the severities that the rule will apply. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"}},"requiredInputs":["severities"],"stateInputs":{"description":"Input properties used for looking up and filtering AlertRule resources.\n","properties":{"alertCategories":{"type":"array","items":{"type":"string"},"description":"The alert categories that will use this rule for alert routing. Valid categories include:\n`Anomaly`, `Policy`, `Composite`.\n"},"alertChannels":{"type":"array","items":{"type":"string"},"description":"The list of alert channels for the rule to use.\n"},"alertRuleId":{"type":"string"},"alertSources":{"type":"array","items":{"type":"string"},"description":"The alert sources that will use this rule for alert routing. Valid sources include:\n`Agent`, `AWS`, `Azure`, `GCP`, `K8s`.\n"},"alertSubcategories":{"type":"array","items":{"type":"string"},"description":"The list of alert subcategories the rule will apply to. Valid categories include:\n`Compliance`, `Application`, `Cloud Activity`, `File`, `Machine`, `User`, `Platform`, `Kubernetes Activity`, `Registry`, `SystemCall`,`Host Vulnerability`, `Container Vulnerability`, `Threat Intel`.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"description":{"type":"string","description":"The description of the alert rule.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventCategories":{"type":"array","items":{"type":"string"},"description":"The list of event categories the rule will apply to. Valid categories include:\n`Compliance`, `App`, `Cloud`, `File`, `Machine`, `User`, `Platform`, `K8sActivity`, `Registry`, `SystemCall`.\nThis attribute is deprecated use \u003cspan pulumi-lang-nodejs=\"`alertSubcategories`\" pulumi-lang-dotnet=\"`AlertSubcategories`\" pulumi-lang-go=\"`alertSubcategories`\" pulumi-lang-python=\"`alert_subcategories`\" pulumi-lang-yaml=\"`alertSubcategories`\" pulumi-lang-java=\"`alertSubcategories`\"\u003e`alert_subcategories`\u003c/span\u003e instead.\n","deprecationMessage":"Deprecated"},"guid":{"type":"string"},"name":{"type":"string","description":"The alert rule name.\n"},"resourceGroups":{"type":"array","items":{"type":"string"},"description":"The list of resource groups the rule will apply to.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of the severities that the rule will apply. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"type":{"type":"string"}},"type":"object"}},"lacework:index/dataExportRule:DataExportRule":{"description":"Use this resource to export data collected from your Lacework account and send it to an S3 bucket of your choice.\n\nFor more information, see [Data Export Rules](https://docs.lacework.com/console/category/data-shares--export) and\n[S3 Data Export](https://docs.lacework.com/console/s3-data-export) documentation.\n\n## Example Usage\n\n### Data Export Rule\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.DataExportRule(\"example\", {\n    name: \"Data Export Rule From Terraform Updated\",\n    integrationIds: [\"INT_ABC123AB385C123D4567AB8EB45BA0E7ABCD12ABF65673A\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.DataExportRule(\"example\",\n    name=\"Data Export Rule From Terraform Updated\",\n    integration_ids=[\"INT_ABC123AB385C123D4567AB8EB45BA0E7ABCD12ABF65673A\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.DataExportRule(\"example\", new()\n    {\n        Name = \"Data Export Rule From Terraform Updated\",\n        IntegrationIds = new[]\n        {\n            \"INT_ABC123AB385C123D4567AB8EB45BA0E7ABCD12ABF65673A\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewDataExportRule(ctx, \"example\", \u0026lacework.DataExportRuleArgs{\n\t\t\tName: pulumi.String(\"Data Export Rule From Terraform Updated\"),\n\t\t\tIntegrationIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"INT_ABC123AB385C123D4567AB8EB45BA0E7ABCD12ABF65673A\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.DataExportRule;\nimport com.pulumi.lacework.DataExportRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new DataExportRule(\"example\", DataExportRuleArgs.builder()\n            .name(\"Data Export Rule From Terraform Updated\")\n            .integrationIds(\"INT_ABC123AB385C123D4567AB8EB45BA0E7ABCD12ABF65673A\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:DataExportRule\n    properties:\n      name: Data Export Rule From Terraform Updated\n      integrationIds:\n        - INT_ABC123AB385C123D4567AB8EB45BA0E7ABCD12ABF65673A\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Data Export Rule with S3 Data Export Channel\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst dataExport = new lacework.AlertChannelAwsS3(\"data_export\", {\n    name: \"s3 data export to account 1234567890\",\n    bucketArn: \"arn:aws:s3:::bucket_name/key_name\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n});\nconst example = new lacework.DataExportRule(\"example\", {\n    name: \"business unit export rule\",\n    integrationIds: [dataExport.alertChannelAwsS3Id],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\ndata_export = lacework.AlertChannelAwsS3(\"data_export\",\n    name=\"s3 data export to account 1234567890\",\n    bucket_arn=\"arn:aws:s3:::bucket_name/key_name\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    })\nexample = lacework.DataExportRule(\"example\",\n    name=\"business unit export rule\",\n    integration_ids=[data_export.alert_channel_aws_s3_id])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataExport = new Lacework.AlertChannelAwsS3(\"data_export\", new()\n    {\n        Name = \"s3 data export to account 1234567890\",\n        BucketArn = \"arn:aws:s3:::bucket_name/key_name\",\n        Credentials = new Lacework.Inputs.AlertChannelAwsS3CredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n    });\n\n    var example = new Lacework.DataExportRule(\"example\", new()\n    {\n        Name = \"business unit export rule\",\n        IntegrationIds = new[]\n        {\n            dataExport.AlertChannelAwsS3Id,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tdataExport, err := lacework.NewAlertChannelAwsS3(ctx, \"data_export\", \u0026lacework.AlertChannelAwsS3Args{\n\t\t\tName:      pulumi.String(\"s3 data export to account 1234567890\"),\n\t\t\tBucketArn: pulumi.String(\"arn:aws:s3:::bucket_name/key_name\"),\n\t\t\tCredentials: \u0026lacework.AlertChannelAwsS3CredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewDataExportRule(ctx, \"example\", \u0026lacework.DataExportRuleArgs{\n\t\t\tName: pulumi.String(\"business unit export rule\"),\n\t\t\tIntegrationIds: pulumi.StringArray{\n\t\t\t\tdataExport.AlertChannelAwsS3Id,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelAwsS3;\nimport com.pulumi.lacework.AlertChannelAwsS3Args;\nimport com.pulumi.lacework.inputs.AlertChannelAwsS3CredentialsArgs;\nimport com.pulumi.lacework.DataExportRule;\nimport com.pulumi.lacework.DataExportRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var dataExport = new AlertChannelAwsS3(\"dataExport\", AlertChannelAwsS3Args.builder()\n            .name(\"s3 data export to account 1234567890\")\n            .bucketArn(\"arn:aws:s3:::bucket_name/key_name\")\n            .credentials(AlertChannelAwsS3CredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .build());\n\n        var example = new DataExportRule(\"example\", DataExportRuleArgs.builder()\n            .name(\"business unit export rule\")\n            .integrationIds(dataExport.alertChannelAwsS3Id())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  dataExport:\n    type: lacework:AlertChannelAwsS3\n    name: data_export\n    properties:\n      name: s3 data export to account 1234567890\n      bucketArn: arn:aws:s3:::bucket_name/key_name\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n  example:\n    type: lacework:DataExportRule\n    properties:\n      name: business unit export rule\n      integrationIds:\n        - ${dataExport.alertChannelAwsS3Id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Data Export Rule can be imported using a `GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/dataExportRule:DataExportRule example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"dataExportRuleId":{"type":"string"},"description":{"type":"string","description":"The summary of the data export rule.\n"},"enabled":{"type":"boolean","description":"Whether the rule is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"guid":{"type":"string"},"integrationIds":{"type":"array","items":{"type":"string"},"description":"The list s3 data export alert channel ids for the rule to use.\n"},"name":{"type":"string","description":"The data export rule name.\n"},"type":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","dataExportRuleId","guid","integrationIds","name","type"],"inputProperties":{"dataExportRuleId":{"type":"string"},"description":{"type":"string","description":"The summary of the data export rule.\n"},"enabled":{"type":"boolean","description":"Whether the rule is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationIds":{"type":"array","items":{"type":"string"},"description":"The list s3 data export alert channel ids for the rule to use.\n"},"name":{"type":"string","description":"The data export rule name.\n"}},"requiredInputs":["integrationIds"],"stateInputs":{"description":"Input properties used for looking up and filtering DataExportRule resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"dataExportRuleId":{"type":"string"},"description":{"type":"string","description":"The summary of the data export rule.\n"},"enabled":{"type":"boolean","description":"Whether the rule is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"guid":{"type":"string"},"integrationIds":{"type":"array","items":{"type":"string"},"description":"The list s3 data export alert channel ids for the rule to use.\n"},"name":{"type":"string","description":"The data export rule name.\n"},"type":{"type":"string"}},"type":"object"}},"lacework:index/externalId:ExternalId":{"description":"This resource generates an External ID (EID) using Lacework format. These IDs are used to create integrations.\n\nThe v2 format is:\n```\nlweid:\u003ccsp\u003e:\u003cversion\u003e:\u003clw_tenant_name\u003e:\u003caws_acct_id\u003e:\u003crandom_string_size_10\u003e\n```\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst aws123456789012 = new lacework.ExternalId(\"aws_123456789012\", {\n    csp: \"aws\",\n    accountId: \"123456789012\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naws123456789012 = lacework.ExternalId(\"aws_123456789012\",\n    csp=\"aws\",\n    account_id=\"123456789012\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var aws123456789012 = new Lacework.ExternalId(\"aws_123456789012\", new()\n    {\n        Csp = \"aws\",\n        AccountId = \"123456789012\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewExternalId(ctx, \"aws_123456789012\", \u0026lacework.ExternalIdArgs{\n\t\t\tCsp:       pulumi.String(\"aws\"),\n\t\t\tAccountId: pulumi.String(\"123456789012\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.ExternalId;\nimport com.pulumi.lacework.ExternalIdArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var aws123456789012 = new ExternalId(\"aws123456789012\", ExternalIdArgs.builder()\n            .csp(\"aws\")\n            .accountId(\"123456789012\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  aws123456789012:\n    type: lacework:ExternalId\n    name: aws_123456789012\n    properties:\n      csp: aws\n      accountId: '123456789012'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"accountId":{"type":"string","description":"The account id from the CSP to be integrated.\n"},"csp":{"type":"string","description":"The Cloud Service Provider. Valid CSP's include: \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`google`\" pulumi-lang-dotnet=\"`Google`\" pulumi-lang-go=\"`google`\" pulumi-lang-python=\"`google`\" pulumi-lang-yaml=\"`google`\" pulumi-lang-java=\"`google`\"\u003e`google`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e, and \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e.\n"},"externalIdId":{"type":"string"},"v2":{"type":"string","description":"The generated External ID version 2.\n"}},"type":"object","required":["accountId","csp","externalIdId","v2"],"inputProperties":{"accountId":{"type":"string","description":"The account id from the CSP to be integrated.\n"},"csp":{"type":"string","description":"The Cloud Service Provider. Valid CSP's include: \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`google`\" pulumi-lang-dotnet=\"`Google`\" pulumi-lang-go=\"`google`\" pulumi-lang-python=\"`google`\" pulumi-lang-yaml=\"`google`\" pulumi-lang-java=\"`google`\"\u003e`google`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e, and \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e.\n"},"externalIdId":{"type":"string"}},"requiredInputs":["accountId","csp"],"stateInputs":{"description":"Input properties used for looking up and filtering ExternalId resources.\n","properties":{"accountId":{"type":"string","description":"The account id from the CSP to be integrated.\n"},"csp":{"type":"string","description":"The Cloud Service Provider. Valid CSP's include: \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`google`\" pulumi-lang-dotnet=\"`Google`\" pulumi-lang-go=\"`google`\" pulumi-lang-python=\"`google`\" pulumi-lang-yaml=\"`google`\" pulumi-lang-java=\"`google`\"\u003e`google`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`oci`\" pulumi-lang-dotnet=\"`Oci`\" pulumi-lang-go=\"`oci`\" pulumi-lang-python=\"`oci`\" pulumi-lang-yaml=\"`oci`\" pulumi-lang-java=\"`oci`\"\u003e`oci`\u003c/span\u003e, and \u003cspan pulumi-lang-nodejs=\"`azure`\" pulumi-lang-dotnet=\"`Azure`\" pulumi-lang-go=\"`azure`\" pulumi-lang-python=\"`azure`\" pulumi-lang-yaml=\"`azure`\" pulumi-lang-java=\"`azure`\"\u003e`azure`\u003c/span\u003e.\n"},"externalIdId":{"type":"string"},"v2":{"type":"string","description":"The generated External ID version 2.\n"}},"type":"object"}},"lacework:index/integrationAwsAgentlessScanning:IntegrationAwsAgentlessScanning":{"description":"Use this resource to configure an AWS Agentless Scanning integration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAwsAgentlessScanning(\"account_abc\", {\n    name: \"account ABC\",\n    scanFrequency: 24,\n    queryText: queryText,\n    scanContainers: true,\n    scanHostVulnerabilities: true,\n    accountId: \"0123456789\",\n    bucketArn: \"arn:aws:s3:::bucket-arn\",\n    credentials: {\n        roleArn: \"arn:aws:iam::0123456789:role/iam-123\",\n        externalId: \"0123456789\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAwsAgentlessScanning(\"account_abc\",\n    name=\"account ABC\",\n    scan_frequency=24,\n    query_text=query_text,\n    scan_containers=True,\n    scan_host_vulnerabilities=True,\n    account_id=\"0123456789\",\n    bucket_arn=\"arn:aws:s3:::bucket-arn\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::0123456789:role/iam-123\",\n        \"external_id\": \"0123456789\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAwsAgentlessScanning(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        ScanFrequency = 24,\n        QueryText = queryText,\n        ScanContainers = true,\n        ScanHostVulnerabilities = true,\n        AccountId = \"0123456789\",\n        BucketArn = \"arn:aws:s3:::bucket-arn\",\n        Credentials = new Lacework.Inputs.IntegrationAwsAgentlessScanningCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::0123456789:role/iam-123\",\n            ExternalId = \"0123456789\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsAgentlessScanning(ctx, \"account_abc\", \u0026lacework.IntegrationAwsAgentlessScanningArgs{\n\t\t\tName:                    pulumi.String(\"account ABC\"),\n\t\t\tScanFrequency:           pulumi.Float64(24),\n\t\t\tQueryText:               pulumi.Any(queryText),\n\t\t\tScanContainers:          pulumi.Bool(true),\n\t\t\tScanHostVulnerabilities: pulumi.Bool(true),\n\t\t\tAccountId:               pulumi.String(\"0123456789\"),\n\t\t\tBucketArn:               pulumi.String(\"arn:aws:s3:::bucket-arn\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsAgentlessScanningCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::0123456789:role/iam-123\"),\n\t\t\t\tExternalId: pulumi.String(\"0123456789\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsAgentlessScanning;\nimport com.pulumi.lacework.IntegrationAwsAgentlessScanningArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsAgentlessScanningCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAwsAgentlessScanning(\"accountAbc\", IntegrationAwsAgentlessScanningArgs.builder()\n            .name(\"account ABC\")\n            .scanFrequency(24.0)\n            .queryText(queryText)\n            .scanContainers(true)\n            .scanHostVulnerabilities(true)\n            .accountId(\"0123456789\")\n            .bucketArn(\"arn:aws:s3:::bucket-arn\")\n            .credentials(IntegrationAwsAgentlessScanningCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::0123456789:role/iam-123\")\n                .externalId(\"0123456789\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsAgentlessScanning\n    name: account_abc\n    properties:\n      name: account ABC\n      scanFrequency: 24\n      queryText: ${queryText}\n      scanContainers: true\n      scanHostVulnerabilities: true\n      accountId: '0123456789'\n      bucketArn: arn:aws:s3:::bucket-arn\n      credentials:\n        roleArn: arn:aws:iam::0123456789:role/iam-123\n        externalId: '0123456789'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework AWS Agentless Scanning integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsAgentlessScanning:IntegrationAwsAgentlessScanning account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-accounts list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"accountId":{"type":"string","description":"The aws account id.\n"},"bucketArn":{"type":"string","description":"The bucket arn.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsAgentlessScanningCredentials:IntegrationAwsAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsAgentlessScanningId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS Agentless Scanning integration name.\n"},"orgLevel":{"type":"boolean"},"queryText":{"type":"string","description":"The lql query.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers.\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities.\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"serverToken":{"type":"string"},"typeName":{"type":"string"},"uri":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationAwsAgentlessScanningId","intgGuid","name","orgLevel","scanFrequency","serverToken","typeName","uri"],"inputProperties":{"accountId":{"type":"string","description":"The aws account id.\n"},"bucketArn":{"type":"string","description":"The bucket arn.\n"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsAgentlessScanningCredentials:IntegrationAwsAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsAgentlessScanningId":{"type":"string"},"name":{"type":"string","description":"The AWS Agentless Scanning integration name.\n"},"queryText":{"type":"string","description":"The lql query.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers.\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities.\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"}},"requiredInputs":["scanFrequency"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsAgentlessScanning resources.\n","properties":{"accountId":{"type":"string","description":"The aws account id.\n"},"bucketArn":{"type":"string","description":"The bucket arn.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsAgentlessScanningCredentials:IntegrationAwsAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsAgentlessScanningId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS Agentless Scanning integration name.\n"},"orgLevel":{"type":"boolean"},"queryText":{"type":"string","description":"The lql query.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers.\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities.\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"serverToken":{"type":"string"},"typeName":{"type":"string"},"uri":{"type":"string"}},"type":"object"}},"lacework:index/integrationAwsCfg:IntegrationAwsCfg":{"description":"Use this resource to configure an AWS Config integration to analyze AWS configuration compliance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAwsCfg(\"account_abc\", {\n    name: \"account ABC\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAwsCfg(\"account_abc\",\n    name=\"account ABC\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAwsCfg(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        Credentials = new Lacework.Inputs.IntegrationAwsCfgCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsCfg(ctx, \"account_abc\", \u0026lacework.IntegrationAwsCfgArgs{\n\t\t\tName: pulumi.String(\"account ABC\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsCfgCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsCfg;\nimport com.pulumi.lacework.IntegrationAwsCfgArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsCfgCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAwsCfg(\"accountAbc\", IntegrationAwsCfgArgs.builder()\n            .name(\"account ABC\")\n            .credentials(IntegrationAwsCfgCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsCfg\n    name: account_abc\n    properties:\n      name: account ABC\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework AWS Config integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsCfg:IntegrationAwsCfg account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsCfgCredentials:IntegrationAwsCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS Config integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAwsCfgId","intgGuid","name","orgLevel","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsCfgCredentials:IntegrationAwsCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsCfgId":{"type":"string"},"name":{"type":"string","description":"The AWS Config integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"}},"requiredInputs":["credentials"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsCfg resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsCfgCredentials:IntegrationAwsCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS Config integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAwsCt:IntegrationAwsCt":{"description":"Use this resource to configure an AWS CloudTrail integration to analyze CloudTrail\nactivity for monitoring cloud account security.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAwsCt(\"account_abc\", {\n    name: \"account ABC\",\n    queueUrl: \"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAwsCt(\"account_abc\",\n    name=\"account ABC\",\n    queue_url=\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAwsCt(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        QueueUrl = \"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n        Credentials = new Lacework.Inputs.IntegrationAwsCtCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsCt(ctx, \"account_abc\", \u0026lacework.IntegrationAwsCtArgs{\n\t\t\tName:     pulumi.String(\"account ABC\"),\n\t\t\tQueueUrl: pulumi.String(\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsCtCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsCt;\nimport com.pulumi.lacework.IntegrationAwsCtArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsCtCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAwsCt(\"accountAbc\", IntegrationAwsCtArgs.builder()\n            .name(\"account ABC\")\n            .queueUrl(\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\")\n            .credentials(IntegrationAwsCtCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsCt\n    name: account_abc\n    properties:\n      name: account ABC\n      queueUrl: https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Organization Level Integration\n\nIf your Lacework account is enrolled in a Lacework organization, you can configure a\nconsolidated AWS CloudTrail integration that maps CloudTrail activity from your AWS\naccounts to selected Lacework accounts within your organization.\n\nTo access the organization level data set to manage organization level integrations\nyou need to define a Lacework provider with the \u003cspan pulumi-lang-nodejs=\"`organization`\" pulumi-lang-dotnet=\"`Organization`\" pulumi-lang-go=\"`organization`\" pulumi-lang-python=\"`organization`\" pulumi-lang-yaml=\"`organization`\" pulumi-lang-java=\"`organization`\"\u003e`organization`\u003c/span\u003e argument set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n\nThe following snippet adds an AWS CloudTrail integration at the organization level of\nyour Lacework account with the following distribution from AWS accounts to Lacework\nsub accounts:\n\n* AWS accounts \u003cspan pulumi-lang-nodejs=\"`234556677`\" pulumi-lang-dotnet=\"`234556677`\" pulumi-lang-go=\"`234556677`\" pulumi-lang-python=\"`234556677`\" pulumi-lang-yaml=\"`234556677`\" pulumi-lang-java=\"`234556677`\"\u003e`234556677`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`774564564`\" pulumi-lang-dotnet=\"`774564564`\" pulumi-lang-go=\"`774564564`\" pulumi-lang-python=\"`774564564`\" pulumi-lang-yaml=\"`774564564`\" pulumi-lang-java=\"`774564564`\"\u003e`774564564`\u003c/span\u003e will appear in the Lacework account \u003cspan pulumi-lang-nodejs=\"`lwAccount2`\" pulumi-lang-dotnet=\"`LwAccount2`\" pulumi-lang-go=\"`lwAccount2`\" pulumi-lang-python=\"`lw_account_2`\" pulumi-lang-yaml=\"`lwAccount2`\" pulumi-lang-java=\"`lwAccount2`\"\u003e`lw_account_2`\u003c/span\u003e \n* AWS accounts \u003cspan pulumi-lang-nodejs=\"`553453453`\" pulumi-lang-dotnet=\"`553453453`\" pulumi-lang-go=\"`553453453`\" pulumi-lang-python=\"`553453453`\" pulumi-lang-yaml=\"`553453453`\" pulumi-lang-java=\"`553453453`\"\u003e`553453453`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`934534535`\" pulumi-lang-dotnet=\"`934534535`\" pulumi-lang-go=\"`934534535`\" pulumi-lang-python=\"`934534535`\" pulumi-lang-yaml=\"`934534535`\" pulumi-lang-java=\"`934534535`\"\u003e`934534535`\u003c/span\u003e will appear in the Lacework account \u003cspan pulumi-lang-nodejs=\"`lwAccount3`\" pulumi-lang-dotnet=\"`LwAccount3`\" pulumi-lang-go=\"`lwAccount3`\" pulumi-lang-python=\"`lw_account_3`\" pulumi-lang-yaml=\"`lwAccount3`\" pulumi-lang-java=\"`lwAccount3`\"\u003e`lw_account_3`\u003c/span\u003e \n* All other AWS accounts that are not mapped will appear in the Lacework account \u003cspan pulumi-lang-nodejs=\"`lwAccount1`\" pulumi-lang-dotnet=\"`LwAccount1`\" pulumi-lang-go=\"`lwAccount1`\" pulumi-lang-python=\"`lw_account_1`\" pulumi-lang-yaml=\"`lwAccount1`\" pulumi-lang-java=\"`lwAccount1`\"\u003e`lw_account_1`\u003c/span\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst consolidated = new lacework.IntegrationAwsCt(\"consolidated\", {\n    name: \"Consolidated CloudTrail\",\n    queueUrl: \"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n    orgAccountMappings: {\n        defaultLaceworkAccount: \"lw_account_1\",\n        mappings: [\n            {\n                laceworkAccount: \"lw_account_2\",\n                awsAccounts: [\n                    \"234556677\",\n                    \"774564564\",\n                ],\n            },\n            {\n                laceworkAccount: \"lw_account_3\",\n                awsAccounts: [\n                    \"553453453\",\n                    \"934534535\",\n                ],\n            },\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nconsolidated = lacework.IntegrationAwsCt(\"consolidated\",\n    name=\"Consolidated CloudTrail\",\n    queue_url=\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    },\n    org_account_mappings={\n        \"default_lacework_account\": \"lw_account_1\",\n        \"mappings\": [\n            {\n                \"lacework_account\": \"lw_account_2\",\n                \"aws_accounts\": [\n                    \"234556677\",\n                    \"774564564\",\n                ],\n            },\n            {\n                \"lacework_account\": \"lw_account_3\",\n                \"aws_accounts\": [\n                    \"553453453\",\n                    \"934534535\",\n                ],\n            },\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var consolidated = new Lacework.IntegrationAwsCt(\"consolidated\", new()\n    {\n        Name = \"Consolidated CloudTrail\",\n        QueueUrl = \"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n        Credentials = new Lacework.Inputs.IntegrationAwsCtCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n        OrgAccountMappings = new Lacework.Inputs.IntegrationAwsCtOrgAccountMappingsArgs\n        {\n            DefaultLaceworkAccount = \"lw_account_1\",\n            Mappings = new[]\n            {\n                new Lacework.Inputs.IntegrationAwsCtOrgAccountMappingsMappingArgs\n                {\n                    LaceworkAccount = \"lw_account_2\",\n                    AwsAccounts = new[]\n                    {\n                        \"234556677\",\n                        \"774564564\",\n                    },\n                },\n                new Lacework.Inputs.IntegrationAwsCtOrgAccountMappingsMappingArgs\n                {\n                    LaceworkAccount = \"lw_account_3\",\n                    AwsAccounts = new[]\n                    {\n                        \"553453453\",\n                        \"934534535\",\n                    },\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsCt(ctx, \"consolidated\", \u0026lacework.IntegrationAwsCtArgs{\n\t\t\tName:     pulumi.String(\"Consolidated CloudTrail\"),\n\t\t\tQueueUrl: pulumi.String(\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsCtCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t\tOrgAccountMappings: \u0026lacework.IntegrationAwsCtOrgAccountMappingsArgs{\n\t\t\t\tDefaultLaceworkAccount: pulumi.String(\"lw_account_1\"),\n\t\t\t\tMappings: lacework.IntegrationAwsCtOrgAccountMappingsMappingArray{\n\t\t\t\t\t\u0026lacework.IntegrationAwsCtOrgAccountMappingsMappingArgs{\n\t\t\t\t\t\tLaceworkAccount: pulumi.String(\"lw_account_2\"),\n\t\t\t\t\t\tAwsAccounts: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"234556677\"),\n\t\t\t\t\t\t\tpulumi.String(\"774564564\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t\u0026lacework.IntegrationAwsCtOrgAccountMappingsMappingArgs{\n\t\t\t\t\t\tLaceworkAccount: pulumi.String(\"lw_account_3\"),\n\t\t\t\t\t\tAwsAccounts: pulumi.StringArray{\n\t\t\t\t\t\t\tpulumi.String(\"553453453\"),\n\t\t\t\t\t\t\tpulumi.String(\"934534535\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsCt;\nimport com.pulumi.lacework.IntegrationAwsCtArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsCtCredentialsArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsCtOrgAccountMappingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var consolidated = new IntegrationAwsCt(\"consolidated\", IntegrationAwsCtArgs.builder()\n            .name(\"Consolidated CloudTrail\")\n            .queueUrl(\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\")\n            .credentials(IntegrationAwsCtCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .orgAccountMappings(IntegrationAwsCtOrgAccountMappingsArgs.builder()\n                .defaultLaceworkAccount(\"lw_account_1\")\n                .mappings(                \n                    IntegrationAwsCtOrgAccountMappingsMappingArgs.builder()\n                        .laceworkAccount(\"lw_account_2\")\n                        .awsAccounts(                        \n                            \"234556677\",\n                            \"774564564\")\n                        .build(),\n                    IntegrationAwsCtOrgAccountMappingsMappingArgs.builder()\n                        .laceworkAccount(\"lw_account_3\")\n                        .awsAccounts(                        \n                            \"553453453\",\n                            \"934534535\")\n                        .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  consolidated:\n    type: lacework:IntegrationAwsCt\n    properties:\n      name: Consolidated CloudTrail\n      queueUrl: https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n      orgAccountMappings:\n        defaultLaceworkAccount: lw_account_1\n        mappings:\n          - laceworkAccount: lw_account_2\n            awsAccounts:\n              - '234556677'\n              - '774564564'\n          - laceworkAccount: lw_account_3\n            awsAccounts:\n              - '553453453'\n              - '934534535'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n!\u003e **Warning:** When accessing organization level data sets, the \u003cspan pulumi-lang-nodejs=\"`subaccount`\" pulumi-lang-dotnet=\"`Subaccount`\" pulumi-lang-go=\"`subaccount`\" pulumi-lang-python=\"`subaccount`\" pulumi-lang-yaml=\"`subaccount`\" pulumi-lang-java=\"`subaccount`\"\u003e`subaccount`\u003c/span\u003e argument is ignored.\n\n\u003e **Note:** The mapping that you configure for an organization integration is in addition\n\tto what is already configured for the CloudTrail account integration. It doesn't\n\toverride the existing account integration.\n\nFor more information see [Setup of Organization AWS CloudTrail Integration](https://support.lacework.com/hc/en-us/articles/360055993554-Setup-of-Organization-AWS-CloudTrail-Integration)\n\n### Migrating an existing AWS CloudTrail integration to the Organization level\n\nWhen attempting to migrate an existing AWS CloudTrail integration from one of your Lacework accounts\nto the organization level so that you can use the \u003cspan pulumi-lang-nodejs=\"`orgAccountMappings`\" pulumi-lang-dotnet=\"`OrgAccountMappings`\" pulumi-lang-go=\"`orgAccountMappings`\" pulumi-lang-python=\"`org_account_mappings`\" pulumi-lang-yaml=\"`orgAccountMappings`\" pulumi-lang-java=\"`orgAccountMappings`\"\u003e`org_account_mappings`\u003c/span\u003e argument, you need to delete\nthe integration, update the Lacework provider to access the organization level data set, and run\n`pulumi up` to create a new integration at the organization level.\n\nFor example, having this pulumi preview:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsCt\n    name: account_abc\n    properties:\n      alias: ${primary}\n      name: Organization Trail\n      queueUrl: https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nYou could use the [Lacework CLI](https://docs.lacework.com/cli) command `lacework integration delete \u003cINT_GUID\u003e` or,\nlog in to the Lacework Console and navigate to Settings \u003e Integrations \u003e Cloud Accounts, to delete the existing\nAWS CloudTrail integration. Then update your pulumi preview to access the organization level data set:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAwsCt(\"account_abc\", {\n    name: \"Organization Trail\",\n    queueUrl: \"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n    orgAccountMappings: {},\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAwsCt(\"account_abc\",\n    name=\"Organization Trail\",\n    queue_url=\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    },\n    org_account_mappings={})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAwsCt(\"account_abc\", new()\n    {\n        Name = \"Organization Trail\",\n        QueueUrl = \"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\",\n        Credentials = new Lacework.Inputs.IntegrationAwsCtCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n        OrgAccountMappings = null,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsCt(ctx, \"account_abc\", \u0026lacework.IntegrationAwsCtArgs{\n\t\t\tName:     pulumi.String(\"Organization Trail\"),\n\t\t\tQueueUrl: pulumi.String(\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsCtCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t\tOrgAccountMappings: \u0026lacework.IntegrationAwsCtOrgAccountMappingsArgs{},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsCt;\nimport com.pulumi.lacework.IntegrationAwsCtArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsCtCredentialsArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsCtOrgAccountMappingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAwsCt(\"accountAbc\", IntegrationAwsCtArgs.builder()\n            .name(\"Organization Trail\")\n            .queueUrl(\"https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\")\n            .credentials(IntegrationAwsCtCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .orgAccountMappings(IntegrationAwsCtOrgAccountMappingsArgs.builder()\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsCt\n    name: account_abc\n    properties:\n      name: Organization Trail\n      queueUrl: https://sqs.us-west-2.amazonaws.com/123456789012/my_queue\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n      orgAccountMappings: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nAnd finally, run `pulumi up` to create a new integration at the organization level.\n\n## Import\n\nA Lacework AWS CloudTrail integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsCt:IntegrationAwsCt account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtCredentials:IntegrationAwsCtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsCtId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS CloudTrail integration name.\n"},"orgAccountMappings":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtOrgAccountMappings:IntegrationAwsCtOrgAccountMappings","description":"Mapping of AWS accounts to Lacework accounts within a Lacework organization. See Account Mappings below for details.\n"},"orgLevel":{"type":"boolean"},"queueUrl":{"type":"string","description":"The SQS Queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAwsCtId","intgGuid","name","orgLevel","queueUrl","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtCredentials:IntegrationAwsCtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsCtId":{"type":"string"},"name":{"type":"string","description":"The AWS CloudTrail integration name.\n"},"orgAccountMappings":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtOrgAccountMappings:IntegrationAwsCtOrgAccountMappings","description":"Mapping of AWS accounts to Lacework accounts within a Lacework organization. See Account Mappings below for details.\n"},"queueUrl":{"type":"string","description":"The SQS Queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"}},"requiredInputs":["credentials","queueUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsCt resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtCredentials:IntegrationAwsCtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsCtId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS CloudTrail integration name.\n"},"orgAccountMappings":{"$ref":"#/types/lacework:index%2FIntegrationAwsCtOrgAccountMappings:IntegrationAwsCtOrgAccountMappings","description":"Mapping of AWS accounts to Lacework accounts within a Lacework organization. See Account Mappings below for details.\n"},"orgLevel":{"type":"boolean"},"queueUrl":{"type":"string","description":"The SQS Queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAwsDspm:IntegrationAwsDspm":{"properties":{"accountId":{"type":"string","description":"The ID of the AWS account where the DSPM scanner is deployed."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsDspmCredentials:IntegrationAwsDspmCredentials","description":"The credentials needed by the integration."},"integrationAwsDspmId":{"type":"string"},"integrationGuid":{"type":"string"},"name":{"type":"string","description":"The name of the FortiCNAPP DSPM integration."},"regions":{"type":"array","items":{"type":"string"},"description":"The regions where the DSPM scanner is deployed."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"serverToken":{"type":"string"},"storageBucketArn":{"type":"string","description":"The ARN of the s3 bucket where the DSPM scanner writes results and state."}},"type":"object","required":["credentials","integrationAwsDspmId","integrationGuid","name","regions","serverToken","storageBucketArn"],"inputProperties":{"accountId":{"type":"string","description":"The ID of the AWS account where the DSPM scanner is deployed."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsDspmCredentials:IntegrationAwsDspmCredentials","description":"The credentials needed by the integration."},"integrationAwsDspmId":{"type":"string"},"name":{"type":"string","description":"The name of the FortiCNAPP DSPM integration."},"regions":{"type":"array","items":{"type":"string"},"description":"The regions where the DSPM scanner is deployed."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"storageBucketArn":{"type":"string","description":"The ARN of the s3 bucket where the DSPM scanner writes results and state."}},"requiredInputs":["credentials","regions","storageBucketArn"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsDspm resources.\n","properties":{"accountId":{"type":"string","description":"The ID of the AWS account where the DSPM scanner is deployed."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsDspmCredentials:IntegrationAwsDspmCredentials","description":"The credentials needed by the integration."},"integrationAwsDspmId":{"type":"string"},"integrationGuid":{"type":"string"},"name":{"type":"string","description":"The name of the FortiCNAPP DSPM integration."},"regions":{"type":"array","items":{"type":"string"},"description":"The regions where the DSPM scanner is deployed."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"serverToken":{"type":"string"},"storageBucketArn":{"type":"string","description":"The ARN of the s3 bucket where the DSPM scanner writes results and state."}},"type":"object"}},"lacework:index/integrationAwsEksAuditLog:IntegrationAwsEksAuditLog":{"description":"Use this resource to configure an [AWS EKS Audit Log integration](https://docs.lacework.com/category/eks-audit-log-integrations) to analyze EKS audit logs.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAwsEksAuditLog(\"account_abc\", {\n    name: \"account ABC\",\n    snsArn: \"arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d\",\n    s3BucketArn: \"arn:aws:s3:::example-bucket-name\",\n    credentials: {\n        roleArn: \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        externalId: \"12345\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAwsEksAuditLog(\"account_abc\",\n    name=\"account ABC\",\n    sns_arn=\"arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d\",\n    s3_bucket_arn=\"arn:aws:s3:::example-bucket-name\",\n    credentials={\n        \"role_arn\": \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n        \"external_id\": \"12345\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAwsEksAuditLog(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        SnsArn = \"arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d\",\n        S3BucketArn = \"arn:aws:s3:::example-bucket-name\",\n        Credentials = new Lacework.Inputs.IntegrationAwsEksAuditLogCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::1234567890:role/lacework_iam_example_role\",\n            ExternalId = \"12345\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsEksAuditLog(ctx, \"account_abc\", \u0026lacework.IntegrationAwsEksAuditLogArgs{\n\t\t\tName:        pulumi.String(\"account ABC\"),\n\t\t\tSnsArn:      pulumi.String(\"arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d\"),\n\t\t\tS3BucketArn: pulumi.String(\"arn:aws:s3:::example-bucket-name\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsEksAuditLogCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\"),\n\t\t\t\tExternalId: pulumi.String(\"12345\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsEksAuditLog;\nimport com.pulumi.lacework.IntegrationAwsEksAuditLogArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsEksAuditLogCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAwsEksAuditLog(\"accountAbc\", IntegrationAwsEksAuditLogArgs.builder()\n            .name(\"account ABC\")\n            .snsArn(\"arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d\")\n            .s3BucketArn(\"arn:aws:s3:::example-bucket-name\")\n            .credentials(IntegrationAwsEksAuditLogCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::1234567890:role/lacework_iam_example_role\")\n                .externalId(\"12345\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsEksAuditLog\n    name: account_abc\n    properties:\n      name: account ABC\n      snsArn: arn:aws:sns:us-west-2:123456789:foo-lacework-eks:00777777-ab77-1234-a123-a12ab1d12c1d\n      s3BucketArn: arn:aws:s3:::example-bucket-name\n      credentials:\n        roleArn: arn:aws:iam::1234567890:role/lacework_iam_example_role\n        externalId: '12345'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework AWS EKS Audit Log integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsEksAuditLog:IntegrationAwsEksAuditLog account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsEksAuditLogCredentials:IntegrationAwsEksAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsEksAuditLogId":{"type":"string"},"intgGuid":{"type":"string"},"isOrg":{"type":"boolean"},"name":{"type":"string","description":"The AWS CloudTrail integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the cloud account integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"s3BucketArn":{"type":"string","description":"The S3 Bucket ARN to share with Lacework.\n"},"snsArn":{"type":"string","description":"The SNS topic ARN to share with Lacework.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAwsEksAuditLogId","intgGuid","isOrg","name","snsArn","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsEksAuditLogCredentials:IntegrationAwsEksAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsEksAuditLogId":{"type":"string"},"name":{"type":"string","description":"The AWS CloudTrail integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the cloud account integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"s3BucketArn":{"type":"string","description":"The S3 Bucket ARN to share with Lacework.\n"},"snsArn":{"type":"string","description":"The SNS topic ARN to share with Lacework.\n"}},"requiredInputs":["credentials","snsArn"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsEksAuditLog resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsEksAuditLogCredentials:IntegrationAwsEksAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsEksAuditLogId":{"type":"string"},"intgGuid":{"type":"string"},"isOrg":{"type":"boolean"},"name":{"type":"string","description":"The AWS CloudTrail integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the cloud account integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"s3BucketArn":{"type":"string","description":"The S3 Bucket ARN to share with Lacework.\n"},"snsArn":{"type":"string","description":"The SNS topic ARN to share with Lacework.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAwsGovcloudCfg:IntegrationAwsGovcloudCfg":{"description":"Use this resource to configure an AWS Config integration for AWS GovCloud to analyze AWS configuration compliance.\n\nTo find more information see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360021140214-Initial-Setup-of-AWS-GovCloud-Integration).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.IntegrationAwsGovcloudCfg(\"example\", {\n    name: \"AWS gov cloud config integration example\",\n    accountId: \"553453453\",\n    credentials: {\n        accessKeyId: \"AWS123abcAccessKeyID\",\n        secretAccessKey: \"AWS123abc123abcSecretAccessKey0000000000\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.IntegrationAwsGovcloudCfg(\"example\",\n    name=\"AWS gov cloud config integration example\",\n    account_id=\"553453453\",\n    credentials={\n        \"access_key_id\": \"AWS123abcAccessKeyID\",\n        \"secret_access_key\": \"AWS123abc123abcSecretAccessKey0000000000\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.IntegrationAwsGovcloudCfg(\"example\", new()\n    {\n        Name = \"AWS gov cloud config integration example\",\n        AccountId = \"553453453\",\n        Credentials = new Lacework.Inputs.IntegrationAwsGovcloudCfgCredentialsArgs\n        {\n            AccessKeyId = \"AWS123abcAccessKeyID\",\n            SecretAccessKey = \"AWS123abc123abcSecretAccessKey0000000000\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsGovcloudCfg(ctx, \"example\", \u0026lacework.IntegrationAwsGovcloudCfgArgs{\n\t\t\tName:      pulumi.String(\"AWS gov cloud config integration example\"),\n\t\t\tAccountId: pulumi.String(\"553453453\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsGovcloudCfgCredentialsArgs{\n\t\t\t\tAccessKeyId:     pulumi.String(\"AWS123abcAccessKeyID\"),\n\t\t\t\tSecretAccessKey: pulumi.String(\"AWS123abc123abcSecretAccessKey0000000000\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsGovcloudCfg;\nimport com.pulumi.lacework.IntegrationAwsGovcloudCfgArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsGovcloudCfgCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IntegrationAwsGovcloudCfg(\"example\", IntegrationAwsGovcloudCfgArgs.builder()\n            .name(\"AWS gov cloud config integration example\")\n            .accountId(\"553453453\")\n            .credentials(IntegrationAwsGovcloudCfgCredentialsArgs.builder()\n                .accessKeyId(\"AWS123abcAccessKeyID\")\n                .secretAccessKey(\"AWS123abc123abcSecretAccessKey0000000000\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:IntegrationAwsGovcloudCfg\n    properties:\n      name: AWS gov cloud config integration example\n      accountId: '553453453'\n      credentials:\n        accessKeyId: AWS123abcAccessKeyID\n        secretAccessKey: AWS123abc123abcSecretAccessKey0000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework AWS Config integration for AWS GovCloud can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsGovcloudCfg:IntegrationAwsGovcloudCfg example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsGovcloudCfgCredentials:IntegrationAwsGovcloudCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsGovcloudCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS GovCloud Config integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object","required":["accountId","createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAwsGovcloudCfgId","intgGuid","name","orgLevel","typeName"],"inputProperties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsGovcloudCfgCredentials:IntegrationAwsGovcloudCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsGovcloudCfgId":{"type":"string"},"name":{"type":"string","description":"The AWS GovCloud Config integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"}},"requiredInputs":["accountId","credentials"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsGovcloudCfg resources.\n","properties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsGovcloudCfgCredentials:IntegrationAwsGovcloudCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsGovcloudCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS GovCloud Config integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAwsGovcloudCt:IntegrationAwsGovcloudCt":{"description":"Use this resource to configure an AWS CloudTrail integration for AWS GovCloud to analyze CloudTrail activity for monitoring cloud account security.\n\nTo find more information see the [Lacework support documentation](https://support.lacework.com/hc/en-us/articles/360021140214-Initial-Setup-of-AWS-GovCloud-Integration).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.IntegrationAwsGovcloudCt(\"example\", {\n    name: \"AWS gov cloud cloudtrail integration example\",\n    accountId: \"553453453\",\n    queueUrl: \"https://sqs.us-gov-west-1.amazonaws.com/123456789012/my_queue\",\n    credentials: {\n        accessKeyId: \"AWS123abcAccessKeyID\",\n        secretAccessKey: \"AWS123abc123abcSecretAccessKey0000000000\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.IntegrationAwsGovcloudCt(\"example\",\n    name=\"AWS gov cloud cloudtrail integration example\",\n    account_id=\"553453453\",\n    queue_url=\"https://sqs.us-gov-west-1.amazonaws.com/123456789012/my_queue\",\n    credentials={\n        \"access_key_id\": \"AWS123abcAccessKeyID\",\n        \"secret_access_key\": \"AWS123abc123abcSecretAccessKey0000000000\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.IntegrationAwsGovcloudCt(\"example\", new()\n    {\n        Name = \"AWS gov cloud cloudtrail integration example\",\n        AccountId = \"553453453\",\n        QueueUrl = \"https://sqs.us-gov-west-1.amazonaws.com/123456789012/my_queue\",\n        Credentials = new Lacework.Inputs.IntegrationAwsGovcloudCtCredentialsArgs\n        {\n            AccessKeyId = \"AWS123abcAccessKeyID\",\n            SecretAccessKey = \"AWS123abc123abcSecretAccessKey0000000000\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsGovcloudCt(ctx, \"example\", \u0026lacework.IntegrationAwsGovcloudCtArgs{\n\t\t\tName:      pulumi.String(\"AWS gov cloud cloudtrail integration example\"),\n\t\t\tAccountId: pulumi.String(\"553453453\"),\n\t\t\tQueueUrl:  pulumi.String(\"https://sqs.us-gov-west-1.amazonaws.com/123456789012/my_queue\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAwsGovcloudCtCredentialsArgs{\n\t\t\t\tAccessKeyId:     pulumi.String(\"AWS123abcAccessKeyID\"),\n\t\t\t\tSecretAccessKey: pulumi.String(\"AWS123abc123abcSecretAccessKey0000000000\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsGovcloudCt;\nimport com.pulumi.lacework.IntegrationAwsGovcloudCtArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsGovcloudCtCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IntegrationAwsGovcloudCt(\"example\", IntegrationAwsGovcloudCtArgs.builder()\n            .name(\"AWS gov cloud cloudtrail integration example\")\n            .accountId(\"553453453\")\n            .queueUrl(\"https://sqs.us-gov-west-1.amazonaws.com/123456789012/my_queue\")\n            .credentials(IntegrationAwsGovcloudCtCredentialsArgs.builder()\n                .accessKeyId(\"AWS123abcAccessKeyID\")\n                .secretAccessKey(\"AWS123abc123abcSecretAccessKey0000000000\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:IntegrationAwsGovcloudCt\n    properties:\n      name: AWS gov cloud cloudtrail integration example\n      accountId: '553453453'\n      queueUrl: https://sqs.us-gov-west-1.amazonaws.com/123456789012/my_queue\n      credentials:\n        accessKeyId: AWS123abcAccessKeyID\n        secretAccessKey: AWS123abc123abcSecretAccessKey0000000000\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework AWS CloudTrail integration for AWS GovCloud can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsGovcloudCt:IntegrationAwsGovcloudCt example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsGovcloudCtCredentials:IntegrationAwsGovcloudCtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsGovcloudCtId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS GovCloud Config integration name.\n"},"orgLevel":{"type":"boolean"},"queueUrl":{"type":"string","description":"The SQS Queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object","required":["accountId","createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAwsGovcloudCtId","intgGuid","name","orgLevel","queueUrl","typeName"],"inputProperties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsGovcloudCtCredentials:IntegrationAwsGovcloudCtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsGovcloudCtId":{"type":"string"},"name":{"type":"string","description":"The AWS GovCloud Config integration name.\n"},"queueUrl":{"type":"string","description":"The SQS Queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"}},"requiredInputs":["accountId","credentials","queueUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsGovcloudCt resources.\n","properties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsGovcloudCtCredentials:IntegrationAwsGovcloudCtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsGovcloudCtId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The AWS GovCloud Config integration name.\n"},"orgLevel":{"type":"boolean"},"queueUrl":{"type":"string","description":"The SQS Queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAwsOrgAgentlessScanning:IntegrationAwsOrgAgentlessScanning":{"description":"Use this resource to configure an AWS Organizations Agentless Scanning integration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAwsOrgAgentlessScanning(\"account_abc\", {\n    name: \"account ABC\",\n    scanFrequency: 24,\n    queryText: queryText,\n    scanContainers: true,\n    scanHostVulnerabilities: true,\n    accountId: \"0123456789\",\n    bucketArn: \"arn:aws:s3:::bucket-arn\",\n    scanningAccount: \"0123456789\",\n    managementAccount: \"0123456789\",\n    monitoredAccounts: [\"r-1234\"],\n    credentials: {\n        roleArn: \"arn:aws:iam::0123456789:role/iam-123\",\n        externalId: \"0123456789\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAwsOrgAgentlessScanning(\"account_abc\",\n    name=\"account ABC\",\n    scan_frequency=24,\n    query_text=query_text,\n    scan_containers=True,\n    scan_host_vulnerabilities=True,\n    account_id=\"0123456789\",\n    bucket_arn=\"arn:aws:s3:::bucket-arn\",\n    scanning_account=\"0123456789\",\n    management_account=\"0123456789\",\n    monitored_accounts=[\"r-1234\"],\n    credentials={\n        \"role_arn\": \"arn:aws:iam::0123456789:role/iam-123\",\n        \"external_id\": \"0123456789\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAwsOrgAgentlessScanning(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        ScanFrequency = 24,\n        QueryText = queryText,\n        ScanContainers = true,\n        ScanHostVulnerabilities = true,\n        AccountId = \"0123456789\",\n        BucketArn = \"arn:aws:s3:::bucket-arn\",\n        ScanningAccount = \"0123456789\",\n        ManagementAccount = \"0123456789\",\n        MonitoredAccounts = new[]\n        {\n            \"r-1234\",\n        },\n        Credentials = new Lacework.Inputs.IntegrationAwsOrgAgentlessScanningCredentialsArgs\n        {\n            RoleArn = \"arn:aws:iam::0123456789:role/iam-123\",\n            ExternalId = \"0123456789\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAwsOrgAgentlessScanning(ctx, \"account_abc\", \u0026lacework.IntegrationAwsOrgAgentlessScanningArgs{\n\t\t\tName:                    pulumi.String(\"account ABC\"),\n\t\t\tScanFrequency:           pulumi.Float64(24),\n\t\t\tQueryText:               pulumi.Any(queryText),\n\t\t\tScanContainers:          pulumi.Bool(true),\n\t\t\tScanHostVulnerabilities: pulumi.Bool(true),\n\t\t\tAccountId:               pulumi.String(\"0123456789\"),\n\t\t\tBucketArn:               pulumi.String(\"arn:aws:s3:::bucket-arn\"),\n\t\t\tScanningAccount:         pulumi.String(\"0123456789\"),\n\t\t\tManagementAccount:       pulumi.String(\"0123456789\"),\n\t\t\tMonitoredAccounts: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"r-1234\"),\n\t\t\t},\n\t\t\tCredentials: \u0026lacework.IntegrationAwsOrgAgentlessScanningCredentialsArgs{\n\t\t\t\tRoleArn:    pulumi.String(\"arn:aws:iam::0123456789:role/iam-123\"),\n\t\t\t\tExternalId: pulumi.String(\"0123456789\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAwsOrgAgentlessScanning;\nimport com.pulumi.lacework.IntegrationAwsOrgAgentlessScanningArgs;\nimport com.pulumi.lacework.inputs.IntegrationAwsOrgAgentlessScanningCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAwsOrgAgentlessScanning(\"accountAbc\", IntegrationAwsOrgAgentlessScanningArgs.builder()\n            .name(\"account ABC\")\n            .scanFrequency(24.0)\n            .queryText(queryText)\n            .scanContainers(true)\n            .scanHostVulnerabilities(true)\n            .accountId(\"0123456789\")\n            .bucketArn(\"arn:aws:s3:::bucket-arn\")\n            .scanningAccount(\"0123456789\")\n            .managementAccount(\"0123456789\")\n            .monitoredAccounts(\"r-1234\")\n            .credentials(IntegrationAwsOrgAgentlessScanningCredentialsArgs.builder()\n                .roleArn(\"arn:aws:iam::0123456789:role/iam-123\")\n                .externalId(\"0123456789\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAwsOrgAgentlessScanning\n    name: account_abc\n    properties:\n      name: account ABC\n      scanFrequency: 24\n      queryText: ${queryText}\n      scanContainers: true\n      scanHostVulnerabilities: true\n      accountId: '0123456789'\n      bucketArn: arn:aws:s3:::bucket-arn\n      scanningAccount: '0123456789'\n      managementAccount: '0123456789'\n      monitoredAccounts:\n        - r-1234\n      credentials:\n        roleArn: arn:aws:iam::0123456789:role/iam-123\n        externalId: '0123456789'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework AWS Organizations Agentless Scanning integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAwsOrgAgentlessScanning:IntegrationAwsOrgAgentlessScanning account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-accounts list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"bucketArn":{"type":"string","description":"The bucket ARN.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningCredentials:IntegrationAwsOrgAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsOrgAgentlessScanningId":{"type":"string"},"intgGuid":{"type":"string"},"managementAccount":{"type":"string","description":"The management AWS account ID.\n"},"monitoredAccounts":{"type":"array","items":{"type":"string"},"description":"The list of monitroed AWS account IDs or OUs.\n"},"name":{"type":"string","description":"The AWS Organizations Agentless Scanning integration name.\n"},"orgAccountMappings":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningOrgAccountMapping:IntegrationAwsOrgAgentlessScanningOrgAccountMapping"},"description":"Mapping of AWS accounts to Lacework accounts within a Lacework organization."},"orgLevel":{"type":"boolean"},"queryText":{"type":"string","description":"The LQL query.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers.\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities.\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanningAccount":{"type":"string","description":"The scanning AWS account ID.\n"},"serverToken":{"type":"string"},"typeName":{"type":"string"},"uri":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationAwsOrgAgentlessScanningId","intgGuid","monitoredAccounts","name","orgLevel","scanFrequency","scanningAccount","serverToken","typeName","uri"],"inputProperties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"bucketArn":{"type":"string","description":"The bucket ARN.\n"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningCredentials:IntegrationAwsOrgAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsOrgAgentlessScanningId":{"type":"string"},"managementAccount":{"type":"string","description":"The management AWS account ID.\n"},"monitoredAccounts":{"type":"array","items":{"type":"string"},"description":"The list of monitroed AWS account IDs or OUs.\n"},"name":{"type":"string","description":"The AWS Organizations Agentless Scanning integration name.\n"},"orgAccountMappings":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningOrgAccountMapping:IntegrationAwsOrgAgentlessScanningOrgAccountMapping"},"description":"Mapping of AWS accounts to Lacework accounts within a Lacework organization."},"queryText":{"type":"string","description":"The LQL query.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers.\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities.\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanningAccount":{"type":"string","description":"The scanning AWS account ID.\n"}},"requiredInputs":["monitoredAccounts","scanFrequency","scanningAccount"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAwsOrgAgentlessScanning resources.\n","properties":{"accountId":{"type":"string","description":"The AWS account ID.\n"},"bucketArn":{"type":"string","description":"The bucket ARN.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningCredentials:IntegrationAwsOrgAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAwsOrgAgentlessScanningId":{"type":"string"},"intgGuid":{"type":"string"},"managementAccount":{"type":"string","description":"The management AWS account ID.\n"},"monitoredAccounts":{"type":"array","items":{"type":"string"},"description":"The list of monitroed AWS account IDs or OUs.\n"},"name":{"type":"string","description":"The AWS Organizations Agentless Scanning integration name.\n"},"orgAccountMappings":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationAwsOrgAgentlessScanningOrgAccountMapping:IntegrationAwsOrgAgentlessScanningOrgAccountMapping"},"description":"Mapping of AWS accounts to Lacework accounts within a Lacework organization."},"orgLevel":{"type":"boolean"},"queryText":{"type":"string","description":"The LQL query.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers.\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities.\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanningAccount":{"type":"string","description":"The scanning AWS account ID.\n"},"serverToken":{"type":"string"},"typeName":{"type":"string"},"uri":{"type":"string"}},"type":"object"}},"lacework:index/integrationAzureAdAl:IntegrationAzureAdAl":{"description":"!\u003e **Warning:** This integration is not yet generally available. Please contact your Lacework account team to request access to the Azure AD feature preview.\n\nUse this resource to configure an Azure Active Directory Activity Log integration to analyze audit logs\nfor monitoring cloud account security.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAzureAdAl(\"account_abc\", {\n    name: \"account ABC\",\n    tenantId: \"abbc1234-abc1-123a-1234-abcd1234abcd\",\n    eventHubNamespace: \"your-eventhub-ns.servicebus.windows.net\",\n    eventHubName: \"your-event-hub-name\",\n    credentials: {\n        clientId: \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n        clientSecret: \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAzureAdAl(\"account_abc\",\n    name=\"account ABC\",\n    tenant_id=\"abbc1234-abc1-123a-1234-abcd1234abcd\",\n    event_hub_namespace=\"your-eventhub-ns.servicebus.windows.net\",\n    event_hub_name=\"your-event-hub-name\",\n    credentials={\n        \"client_id\": \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n        \"client_secret\": \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAzureAdAl(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        TenantId = \"abbc1234-abc1-123a-1234-abcd1234abcd\",\n        EventHubNamespace = \"your-eventhub-ns.servicebus.windows.net\",\n        EventHubName = \"your-event-hub-name\",\n        Credentials = new Lacework.Inputs.IntegrationAzureAdAlCredentialsArgs\n        {\n            ClientId = \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n            ClientSecret = \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAzureAdAl(ctx, \"account_abc\", \u0026lacework.IntegrationAzureAdAlArgs{\n\t\t\tName:              pulumi.String(\"account ABC\"),\n\t\t\tTenantId:          pulumi.String(\"abbc1234-abc1-123a-1234-abcd1234abcd\"),\n\t\t\tEventHubNamespace: pulumi.String(\"your-eventhub-ns.servicebus.windows.net\"),\n\t\t\tEventHubName:      pulumi.String(\"your-event-hub-name\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAzureAdAlCredentialsArgs{\n\t\t\t\tClientId:     pulumi.String(\"1234abcd-abcd-1234-ab12-abcd1234abcd\"),\n\t\t\t\tClientSecret: pulumi.String(\"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAzureAdAl;\nimport com.pulumi.lacework.IntegrationAzureAdAlArgs;\nimport com.pulumi.lacework.inputs.IntegrationAzureAdAlCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAzureAdAl(\"accountAbc\", IntegrationAzureAdAlArgs.builder()\n            .name(\"account ABC\")\n            .tenantId(\"abbc1234-abc1-123a-1234-abcd1234abcd\")\n            .eventHubNamespace(\"your-eventhub-ns.servicebus.windows.net\")\n            .eventHubName(\"your-event-hub-name\")\n            .credentials(IntegrationAzureAdAlCredentialsArgs.builder()\n                .clientId(\"1234abcd-abcd-1234-ab12-abcd1234abcd\")\n                .clientSecret(\"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAzureAdAl\n    name: account_abc\n    properties:\n      name: account ABC\n      tenantId: abbc1234-abc1-123a-1234-abcd1234abcd\n      eventHubNamespace: your-eventhub-ns.servicebus.windows.net\n      eventHubName: your-event-hub-name\n      credentials:\n        clientId: 1234abcd-abcd-1234-ab12-abcd1234abcd\n        clientSecret: ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Azure Active Directory Activity Log integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAzureAdAl:IntegrationAzureAdAl account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAdAlCredentials:IntegrationAzureAdAlCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventHubName":{"type":"string","description":"The EventHub Name.\n"},"eventHubNamespace":{"type":"string","description":"The EventHub Namespace.\n"},"integrationAzureAdAlId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Azure Active Directory Activity Log integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","eventHubName","eventHubNamespace","integrationAzureAdAlId","intgGuid","name","orgLevel","tenantId","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAdAlCredentials:IntegrationAzureAdAlCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventHubName":{"type":"string","description":"The EventHub Name.\n"},"eventHubNamespace":{"type":"string","description":"The EventHub Namespace.\n"},"integrationAzureAdAlId":{"type":"string"},"name":{"type":"string","description":"The Azure Active Directory Activity Log integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"}},"requiredInputs":["credentials","eventHubName","eventHubNamespace","tenantId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAzureAdAl resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAdAlCredentials:IntegrationAzureAdAlCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"eventHubName":{"type":"string","description":"The EventHub Name.\n"},"eventHubNamespace":{"type":"string","description":"The EventHub Namespace.\n"},"integrationAzureAdAlId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Azure Active Directory Activity Log integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAzureAgentlessScanning:IntegrationAzureAgentlessScanning":{"properties":{"blobContainerName":{"type":"string","description":"blob container containing analysis results shared with Lacework platform."},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAgentlessScanningCredentials:IntegrationAzureAgentlessScanningCredentials"},"enabled":{"type":"boolean","description":"The state of the external integration."},"integrationAzureAgentlessScanningId":{"type":"string"},"integrationLevel":{"type":"string","description":"Integration level - TENANT / SUBSCRIPTION."},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The integration name."},"queryText":{"type":"string","description":"The LQL query text."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers."},"scanFrequency":{"type":"number","description":"How often in hours the scan will run in hours."},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities."},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (true) or only root volumes (false)"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (true)"},"scanningResourceGroupName":{"type":"string","description":"name of the resource group where the scanner runs."},"scanningSubscriptionId":{"type":"string","description":"Id of the subscription where LW scanner is deployed."},"serverToken":{"type":"string"},"storageAccountUrl":{"type":"string","description":"name of the storage account, in the format of 'https://\u003caccount\u003e.blob.core.windows.net'"},"subscriptionsLists":{"type":"array","items":{"type":"string"},"description":"List of subscriptions to specifically include/exclude."},"tenantId":{"type":"string","description":"Id of the tenant where LW scanner is deployed."},"uri":{"type":"string"}},"type":"object","required":["blobContainerName","createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAzureAgentlessScanningId","intgGuid","name","scanningResourceGroupName","scanningSubscriptionId","serverToken","storageAccountUrl","tenantId","uri"],"inputProperties":{"blobContainerName":{"type":"string","description":"blob container containing analysis results shared with Lacework platform."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAgentlessScanningCredentials:IntegrationAzureAgentlessScanningCredentials"},"enabled":{"type":"boolean","description":"The state of the external integration."},"integrationAzureAgentlessScanningId":{"type":"string"},"integrationLevel":{"type":"string","description":"Integration level - TENANT / SUBSCRIPTION."},"name":{"type":"string","description":"The integration name."},"queryText":{"type":"string","description":"The LQL query text."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers."},"scanFrequency":{"type":"number","description":"How often in hours the scan will run in hours."},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities."},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (true) or only root volumes (false)"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (true)"},"scanningResourceGroupName":{"type":"string","description":"name of the resource group where the scanner runs."},"scanningSubscriptionId":{"type":"string","description":"Id of the subscription where LW scanner is deployed."},"storageAccountUrl":{"type":"string","description":"name of the storage account, in the format of 'https://\u003caccount\u003e.blob.core.windows.net'"},"subscriptionsLists":{"type":"array","items":{"type":"string"},"description":"List of subscriptions to specifically include/exclude."},"tenantId":{"type":"string","description":"Id of the tenant where LW scanner is deployed."}},"requiredInputs":["blobContainerName","credentials","scanningResourceGroupName","scanningSubscriptionId","storageAccountUrl","tenantId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAzureAgentlessScanning resources.\n","properties":{"blobContainerName":{"type":"string","description":"blob container containing analysis results shared with Lacework platform."},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAgentlessScanningCredentials:IntegrationAzureAgentlessScanningCredentials"},"enabled":{"type":"boolean","description":"The state of the external integration."},"integrationAzureAgentlessScanningId":{"type":"string"},"integrationLevel":{"type":"string","description":"Integration level - TENANT / SUBSCRIPTION."},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The integration name."},"queryText":{"type":"string","description":"The LQL query text."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers."},"scanFrequency":{"type":"number","description":"How often in hours the scan will run in hours."},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to includes scanning for host vulnerabilities."},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (true) or only root volumes (false)"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (true)"},"scanningResourceGroupName":{"type":"string","description":"name of the resource group where the scanner runs."},"scanningSubscriptionId":{"type":"string","description":"Id of the subscription where LW scanner is deployed."},"serverToken":{"type":"string"},"storageAccountUrl":{"type":"string","description":"name of the storage account, in the format of 'https://\u003caccount\u003e.blob.core.windows.net'"},"subscriptionsLists":{"type":"array","items":{"type":"string"},"description":"List of subscriptions to specifically include/exclude."},"tenantId":{"type":"string","description":"Id of the tenant where LW scanner is deployed."},"uri":{"type":"string"}},"type":"object"}},"lacework:index/integrationAzureAl:IntegrationAzureAl":{"description":"Use this resource to configure an Azure Activity Log integration to analyze Activity Log\nfor monitoring cloud account security.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAzureAl(\"account_abc\", {\n    name: \"account ABC\",\n    tenantId: \"abbc1234-abc1-123a-1234-abcd1234abcd\",\n    queueUrl: \"https://account-abc.queue.core.windows.net/account-abc\",\n    credentials: {\n        clientId: \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n        clientSecret: \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAzureAl(\"account_abc\",\n    name=\"account ABC\",\n    tenant_id=\"abbc1234-abc1-123a-1234-abcd1234abcd\",\n    queue_url=\"https://account-abc.queue.core.windows.net/account-abc\",\n    credentials={\n        \"client_id\": \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n        \"client_secret\": \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAzureAl(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        TenantId = \"abbc1234-abc1-123a-1234-abcd1234abcd\",\n        QueueUrl = \"https://account-abc.queue.core.windows.net/account-abc\",\n        Credentials = new Lacework.Inputs.IntegrationAzureAlCredentialsArgs\n        {\n            ClientId = \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n            ClientSecret = \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAzureAl(ctx, \"account_abc\", \u0026lacework.IntegrationAzureAlArgs{\n\t\t\tName:     pulumi.String(\"account ABC\"),\n\t\t\tTenantId: pulumi.String(\"abbc1234-abc1-123a-1234-abcd1234abcd\"),\n\t\t\tQueueUrl: pulumi.String(\"https://account-abc.queue.core.windows.net/account-abc\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAzureAlCredentialsArgs{\n\t\t\t\tClientId:     pulumi.String(\"1234abcd-abcd-1234-ab12-abcd1234abcd\"),\n\t\t\t\tClientSecret: pulumi.String(\"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAzureAl;\nimport com.pulumi.lacework.IntegrationAzureAlArgs;\nimport com.pulumi.lacework.inputs.IntegrationAzureAlCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAzureAl(\"accountAbc\", IntegrationAzureAlArgs.builder()\n            .name(\"account ABC\")\n            .tenantId(\"abbc1234-abc1-123a-1234-abcd1234abcd\")\n            .queueUrl(\"https://account-abc.queue.core.windows.net/account-abc\")\n            .credentials(IntegrationAzureAlCredentialsArgs.builder()\n                .clientId(\"1234abcd-abcd-1234-ab12-abcd1234abcd\")\n                .clientSecret(\"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAzureAl\n    name: account_abc\n    properties:\n      name: account ABC\n      tenantId: abbc1234-abc1-123a-1234-abcd1234abcd\n      queueUrl: https://account-abc.queue.core.windows.net/account-abc\n      credentials:\n        clientId: 1234abcd-abcd-1234-ab12-abcd1234abcd\n        clientSecret: ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Azure Activity Log integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAzureAl:IntegrationAzureAl account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAlCredentials:IntegrationAzureAlCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAzureAlId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Azure Activity Log integration name.\n"},"orgLevel":{"type":"boolean"},"queueUrl":{"type":"string","description":"The storage queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAzureAlId","intgGuid","name","orgLevel","queueUrl","tenantId","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAlCredentials:IntegrationAzureAlCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAzureAlId":{"type":"string"},"name":{"type":"string","description":"The Azure Activity Log integration name.\n"},"queueUrl":{"type":"string","description":"The storage queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"}},"requiredInputs":["credentials","queueUrl","tenantId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAzureAl resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureAlCredentials:IntegrationAzureAlCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAzureAlId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Azure Activity Log integration name.\n"},"orgLevel":{"type":"boolean"},"queueUrl":{"type":"string","description":"The storage queue URL.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAzureCfg:IntegrationAzureCfg":{"description":"Use this resource to configure an Azure Config integration to analyze configuration compliance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationAzureCfg(\"account_abc\", {\n    name: \"account ABC\",\n    tenantId: \"abbc1234-abc1-123a-1234-abcd1234abcd\",\n    credentials: {\n        clientId: \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n        clientSecret: \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationAzureCfg(\"account_abc\",\n    name=\"account ABC\",\n    tenant_id=\"abbc1234-abc1-123a-1234-abcd1234abcd\",\n    credentials={\n        \"client_id\": \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n        \"client_secret\": \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationAzureCfg(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        TenantId = \"abbc1234-abc1-123a-1234-abcd1234abcd\",\n        Credentials = new Lacework.Inputs.IntegrationAzureCfgCredentialsArgs\n        {\n            ClientId = \"1234abcd-abcd-1234-ab12-abcd1234abcd\",\n            ClientSecret = \"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationAzureCfg(ctx, \"account_abc\", \u0026lacework.IntegrationAzureCfgArgs{\n\t\t\tName:     pulumi.String(\"account ABC\"),\n\t\t\tTenantId: pulumi.String(\"abbc1234-abc1-123a-1234-abcd1234abcd\"),\n\t\t\tCredentials: \u0026lacework.IntegrationAzureCfgCredentialsArgs{\n\t\t\t\tClientId:     pulumi.String(\"1234abcd-abcd-1234-ab12-abcd1234abcd\"),\n\t\t\t\tClientSecret: pulumi.String(\"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationAzureCfg;\nimport com.pulumi.lacework.IntegrationAzureCfgArgs;\nimport com.pulumi.lacework.inputs.IntegrationAzureCfgCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationAzureCfg(\"accountAbc\", IntegrationAzureCfgArgs.builder()\n            .name(\"account ABC\")\n            .tenantId(\"abbc1234-abc1-123a-1234-abcd1234abcd\")\n            .credentials(IntegrationAzureCfgCredentialsArgs.builder()\n                .clientId(\"1234abcd-abcd-1234-ab12-abcd1234abcd\")\n                .clientSecret(\"ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationAzureCfg\n    name: account_abc\n    properties:\n      name: account ABC\n      tenantId: abbc1234-abc1-123a-1234-abcd1234abcd\n      credentials:\n        clientId: 1234abcd-abcd-1234-ab12-abcd1234abcd\n        clientSecret: ABCD1234abcd1234abdc1234ABCD1234abcdefxxx=\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Azure Config integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationAzureCfg:IntegrationAzureCfg account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureCfgCredentials:IntegrationAzureCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAzureCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Azure Config integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationAzureCfgId","intgGuid","name","orgLevel","tenantId","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureCfgCredentials:IntegrationAzureCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAzureCfgId":{"type":"string"},"name":{"type":"string","description":"The Azure Config integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"}},"requiredInputs":["credentials","tenantId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAzureCfg resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureCfgCredentials:IntegrationAzureCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationAzureCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The Azure Config integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"tenantId":{"type":"string","description":"The directory tenant ID.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationAzureDspm:IntegrationAzureDspm":{"properties":{"blobContainerName":{"type":"string","description":"The name of the blob container where the DSPM scanner writes results and state."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureDspmCredentials:IntegrationAzureDspmCredentials","description":"The credentials used by Lacework platform to access the Azure SP."},"integrationAzureDspmId":{"type":"string"},"integrationGuid":{"type":"string"},"name":{"type":"string","description":"The name of the FortiCNAPP DSPM integration."},"regions":{"type":"array","items":{"type":"string"},"description":"The regions where the DSPM scanner is deployed."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"serverToken":{"type":"string"},"storageAccountUrl":{"type":"string","description":"The URL of the storage account where the DSPM scanner writes results and state."},"tenantId":{"type":"string","description":"The ID of the Azure tenant where the DSPM scanner is deployed."}},"type":"object","required":["blobContainerName","credentials","integrationAzureDspmId","integrationGuid","name","regions","serverToken","storageAccountUrl"],"inputProperties":{"blobContainerName":{"type":"string","description":"The name of the blob container where the DSPM scanner writes results and state."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureDspmCredentials:IntegrationAzureDspmCredentials","description":"The credentials used by Lacework platform to access the Azure SP."},"integrationAzureDspmId":{"type":"string"},"name":{"type":"string","description":"The name of the FortiCNAPP DSPM integration."},"regions":{"type":"array","items":{"type":"string"},"description":"The regions where the DSPM scanner is deployed."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"storageAccountUrl":{"type":"string","description":"The URL of the storage account where the DSPM scanner writes results and state."},"tenantId":{"type":"string","description":"The ID of the Azure tenant where the DSPM scanner is deployed."}},"requiredInputs":["blobContainerName","credentials","regions","storageAccountUrl"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationAzureDspm resources.\n","properties":{"blobContainerName":{"type":"string","description":"The name of the blob container where the DSPM scanner writes results and state."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationAzureDspmCredentials:IntegrationAzureDspmCredentials","description":"The credentials used by Lacework platform to access the Azure SP."},"integrationAzureDspmId":{"type":"string"},"integrationGuid":{"type":"string"},"name":{"type":"string","description":"The name of the FortiCNAPP DSPM integration."},"regions":{"type":"array","items":{"type":"string"},"description":"The regions where the DSPM scanner is deployed."},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"serverToken":{"type":"string"},"storageAccountUrl":{"type":"string","description":"The URL of the storage account where the DSPM scanner writes results and state."},"tenantId":{"type":"string","description":"The ID of the Azure tenant where the DSPM scanner is deployed."}},"type":"object"}},"lacework:index/integrationDockerHub:IntegrationDockerHub":{"description":"Use this resource to integrate a Docker Hub container registry with Lacework to assess, identify,\nand report vulnerabilities found in the operating system software packages in a Docker container\nimage.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.IntegrationDockerHub(\"example\", {\n    name: \"My Docker Hub Registry Example\",\n    username: \"my-user\",\n    password: \"a-secret-password\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.IntegrationDockerHub(\"example\",\n    name=\"My Docker Hub Registry Example\",\n    username=\"my-user\",\n    password=\"a-secret-password\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.IntegrationDockerHub(\"example\", new()\n    {\n        Name = \"My Docker Hub Registry Example\",\n        Username = \"my-user\",\n        Password = \"a-secret-password\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationDockerHub(ctx, \"example\", \u0026lacework.IntegrationDockerHubArgs{\n\t\t\tName:     pulumi.String(\"My Docker Hub Registry Example\"),\n\t\t\tUsername: pulumi.String(\"my-user\"),\n\t\t\tPassword: pulumi.String(\"a-secret-password\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationDockerHub;\nimport com.pulumi.lacework.IntegrationDockerHubArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IntegrationDockerHub(\"example\", IntegrationDockerHubArgs.builder()\n            .name(\"My Docker Hub Registry Example\")\n            .username(\"my-user\")\n            .password(\"a-secret-password\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:IntegrationDockerHub\n    properties:\n      name: My Docker Hub Registry Example\n      username: my-user\n      password: a-secret-password\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Docker Hub container registry integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationDockerHub:IntegrationDockerHub example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationDockerHubId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationDockerHubLimitByLabel:IntegrationDockerHubLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Container Registry integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The password for the specified Docker Hub user.\n","secret":true},"typeName":{"type":"string"},"username":{"type":"string","description":"The Docker user that has at least read-only permissions to the Docker Hub container repositories.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationDockerHubId","intgGuid","name","orgLevel","password","typeName","username"],"inputProperties":{"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationDockerHubId":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationDockerHubLimitByLabel:IntegrationDockerHubLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Container Registry integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"password":{"type":"string","description":"The password for the specified Docker Hub user.\n","secret":true},"username":{"type":"string","description":"The Docker user that has at least read-only permissions to the Docker Hub container repositories.\n"}},"requiredInputs":["password","username"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationDockerHub resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationDockerHubId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationDockerHubLimitByLabel:IntegrationDockerHubLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Container Registry integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The password for the specified Docker Hub user.\n","secret":true},"typeName":{"type":"string"},"username":{"type":"string","description":"The Docker user that has at least read-only permissions to the Docker Hub container repositories.\n"}},"type":"object"}},"lacework:index/integrationDockerV2:IntegrationDockerV2":{"description":"Use the Docker V2 Registry integration for private Docker V2 registries only.\n\n\u003e **Note:** For Docker Hub, ECR, and GCR, use their corresponding container registry types.\n\nThe Docker V2 Registry integration functions differently than Lacework's other container registry\nintegrations. This integration performs on-demand image assessment via the Lacework API, while the other\nintegrations automatically assess images at regular intervals.\n\nSupported Docker V2 registries:\n\n* Azure Container Registry\n* GitLab (On prem 12.8 and cloud)\n* JFrog Artifactory (On prem 7.2.1 and cloud)\n* JFrog Platform (On prem 7.2.1 and cloud)\n\n\u003e **Note:** You must whitelist the Lacework outbound IPs to allow the vulnerability scanner to communicate with your private registries. See [Lacework Outbound IPs](https://docs.lacework.com/lacework-outbound-ips)\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst jfrog = new lacework.IntegrationDockerV2(\"jfrog\", {\n    name: \"My Docker V2 Registry\",\n    registryDomain: \"my-dockerv2.jfrog.io\",\n    username: \"my-user\",\n    password: \"a-secret-password\",\n    ssl: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\njfrog = lacework.IntegrationDockerV2(\"jfrog\",\n    name=\"My Docker V2 Registry\",\n    registry_domain=\"my-dockerv2.jfrog.io\",\n    username=\"my-user\",\n    password=\"a-secret-password\",\n    ssl=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var jfrog = new Lacework.IntegrationDockerV2(\"jfrog\", new()\n    {\n        Name = \"My Docker V2 Registry\",\n        RegistryDomain = \"my-dockerv2.jfrog.io\",\n        Username = \"my-user\",\n        Password = \"a-secret-password\",\n        Ssl = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationDockerV2(ctx, \"jfrog\", \u0026lacework.IntegrationDockerV2Args{\n\t\t\tName:           pulumi.String(\"My Docker V2 Registry\"),\n\t\t\tRegistryDomain: pulumi.String(\"my-dockerv2.jfrog.io\"),\n\t\t\tUsername:       pulumi.String(\"my-user\"),\n\t\t\tPassword:       pulumi.String(\"a-secret-password\"),\n\t\t\tSsl:            pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationDockerV2;\nimport com.pulumi.lacework.IntegrationDockerV2Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var jfrog = new IntegrationDockerV2(\"jfrog\", IntegrationDockerV2Args.builder()\n            .name(\"My Docker V2 Registry\")\n            .registryDomain(\"my-dockerv2.jfrog.io\")\n            .username(\"my-user\")\n            .password(\"a-secret-password\")\n            .ssl(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  jfrog:\n    type: lacework:IntegrationDockerV2\n    properties:\n      name: My Docker V2 Registry\n      registryDomain: my-dockerv2.jfrog.io\n      username: my-user\n      password: a-secret-password\n      ssl: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003e **Note:** The Docker V2 Registry status displays `Integration Successful` only after its first assessment completes.\n\n## Import\n\nA Lacework Docker V2 container registry integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationDockerV2:IntegrationDockerV2 jfrog EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationDockerV2Id":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationDockerV2LimitByLabel:IntegrationDockerV2LimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"name":{"type":"string","description":"The Docker V2 Registry integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifications":{"type":"boolean","description":"Subscribe to registry notifications. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The password for the specified user.\n","secret":true},"registryDomain":{"type":"string","description":"The registry domain. Allowed formats are `YourIP:YourPort` or `YourDomain:YourPort`.\n"},"ssl":{"type":"boolean","description":"Enable or disable SSL communication. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"typeName":{"type":"string"},"username":{"type":"string","description":"The user that has at permissions to pull from the container registry the images to be assessed.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationDockerV2Id","intgGuid","name","orgLevel","password","registryDomain","typeName","username"],"inputProperties":{"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationDockerV2Id":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationDockerV2LimitByLabel:IntegrationDockerV2LimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"name":{"type":"string","description":"The Docker V2 Registry integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifications":{"type":"boolean","description":"Subscribe to registry notifications. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"password":{"type":"string","description":"The password for the specified user.\n","secret":true},"registryDomain":{"type":"string","description":"The registry domain. Allowed formats are `YourIP:YourPort` or `YourDomain:YourPort`.\n"},"ssl":{"type":"boolean","description":"Enable or disable SSL communication. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"username":{"type":"string","description":"The user that has at permissions to pull from the container registry the images to be assessed.\n"}},"requiredInputs":["password","registryDomain","username"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationDockerV2 resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationDockerV2Id":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationDockerV2LimitByLabel:IntegrationDockerV2LimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"name":{"type":"string","description":"The Docker V2 Registry integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"notifications":{"type":"boolean","description":"Subscribe to registry notifications. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The password for the specified user.\n","secret":true},"registryDomain":{"type":"string","description":"The registry domain. Allowed formats are `YourIP:YourPort` or `YourDomain:YourPort`.\n"},"ssl":{"type":"boolean","description":"Enable or disable SSL communication. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"typeName":{"type":"string"},"username":{"type":"string","description":"The user that has at permissions to pull from the container registry the images to be assessed.\n"}},"type":"object"}},"lacework:index/integrationEcr:IntegrationEcr":{"description":"\n\n## Import\n\nA Lacework ECR integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationEcr:IntegrationEcr example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"awsAuthType":{"type":"string","description":"Authentication method of the ECR integration"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationEcrCredentials:IntegrationEcrCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationEcrId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationEcrLimitByLabel:IntegrationEcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The ECR integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean","description":"Whether or not this integration is configured at the Organization level"},"registryDomain":{"type":"string","description":"The Amazon Container Registry (ECR) domain in the format `YourAWSAccount.dkr.ecr.YourRegion.amazonaws.com`, where `YourAWSAcount` is the AWS account number for the AWS IAM user that has a role with permissions to access the ECR and `YourRegion` is your AWS region such as `us-west-2`.\n"},"typeName":{"type":"string"}},"type":"object","required":["awsAuthType","createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationEcrId","intgGuid","name","orgLevel","registryDomain","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationEcrCredentials:IntegrationEcrCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationEcrId":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationEcrLimitByLabel:IntegrationEcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The ECR integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"registryDomain":{"type":"string","description":"The Amazon Container Registry (ECR) domain in the format `YourAWSAccount.dkr.ecr.YourRegion.amazonaws.com`, where `YourAWSAcount` is the AWS account number for the AWS IAM user that has a role with permissions to access the ECR and `YourRegion` is your AWS region such as `us-west-2`.\n"}},"requiredInputs":["credentials","registryDomain"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationEcr resources.\n","properties":{"awsAuthType":{"type":"string","description":"Authentication method of the ECR integration"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationEcrCredentials:IntegrationEcrCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationEcrId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationEcrLimitByLabel:IntegrationEcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The ECR integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean","description":"Whether or not this integration is configured at the Organization level"},"registryDomain":{"type":"string","description":"The Amazon Container Registry (ECR) domain in the format `YourAWSAccount.dkr.ecr.YourRegion.amazonaws.com`, where `YourAWSAcount` is the AWS account number for the AWS IAM user that has a role with permissions to access the ECR and `YourRegion` is your AWS region such as `us-west-2`.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationGar:IntegrationGar":{"description":"\n\n## Import\n\nA Lacework GAR integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGar:IntegrationGar example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGarCredentials:IntegrationGarCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGarId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGarLimitByLabel:IntegrationGarLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"registryDomain":{"type":"string","description":"The GAR domain, which specifies the location where you store the images. For a list of supported domains, see Supported Registry Domains below.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGarId","intgGuid","name","orgLevel","registryDomain","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGarCredentials:IntegrationGarCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGarId":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGarLimitByLabel:IntegrationGarLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"registryDomain":{"type":"string","description":"The GAR domain, which specifies the location where you store the images. For a list of supported domains, see Supported Registry Domains below.\n"}},"requiredInputs":["credentials","registryDomain"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGar resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGarCredentials:IntegrationGarCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGarId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGarLimitByLabel:IntegrationGarLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"registryDomain":{"type":"string","description":"The GAR domain, which specifies the location where you store the images. For a list of supported domains, see Supported Registry Domains below.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationGcpAgentlessScanning:IntegrationGcpAgentlessScanning":{"description":"Use this resource to configure a GCP Agentless Scanning integration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationGcpAgentlessScanning\n    name: account_abc\n    properties:\n      name: Integration name\n      resourceLevel: PROJECT\n      resourceId: to-scan-gcp-project-id\n      storageBucket: gcp storage bucket hosting shared results\n      scanningProjectId: lacework scanner project id\n      credentials:\n        clientId: '123456789012345678900'\n        clientEmail: email@abc-project-name.iam.gserviceaccount.com\n        privateKeyId: 1234abcd1234abcd1234abcd1234abcd1234abcd\n        privateKey: |\n          -----BEGIN PRIVATE KEY-----\n           ... -----END PRIVATE KEY-----\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework GCP Agentless Scanning integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGcpAgentlessScanning:IntegrationGcpAgentlessScanning account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework integration list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"bucketName":{"type":"string","description":"Bucket containing analysis results shared with Lacework platform."},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpAgentlessScanningCredentials:IntegrationGcpAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filterLists":{"type":"array","items":{"type":"string"},"description":"Comma separated list to include or exclude projects.\n"},"integrationGcpAgentlessScanningId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The GCP Agentless Scanning integration name.\n"},"orgLevel":{"type":"boolean"},"queryText":{"type":"string","description":"The lql query.\n"},"resourceId":{"type":"string","description":"The organization or Project Id.\n"},"resourceLevel":{"type":"string","description":"= (Required) \"PROJECT\" or \"ORGANIZATION\".\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run - Defaults to 24 hours.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to include scanning for host vulnerabilities. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanningProjectId":{"type":"string","description":"Project ID where scanner is deployed."},"serverToken":{"type":"string"},"typeName":{"type":"string"},"uri":{"type":"string"}},"type":"object","required":["bucketName","createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGcpAgentlessScanningId","intgGuid","name","orgLevel","resourceId","scanningProjectId","serverToken","typeName","uri"],"inputProperties":{"bucketName":{"type":"string","description":"Bucket containing analysis results shared with Lacework platform."},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpAgentlessScanningCredentials:IntegrationGcpAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filterLists":{"type":"array","items":{"type":"string"},"description":"Comma separated list to include or exclude projects.\n"},"integrationGcpAgentlessScanningId":{"type":"string"},"name":{"type":"string","description":"The GCP Agentless Scanning integration name.\n"},"queryText":{"type":"string","description":"The lql query.\n"},"resourceId":{"type":"string","description":"The organization or Project Id.\n"},"resourceLevel":{"type":"string","description":"= (Required) \"PROJECT\" or \"ORGANIZATION\".\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run - Defaults to 24 hours.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to include scanning for host vulnerabilities. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanningProjectId":{"type":"string","description":"Project ID where scanner is deployed."}},"requiredInputs":["bucketName","credentials","resourceId","scanningProjectId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGcpAgentlessScanning resources.\n","properties":{"bucketName":{"type":"string","description":"Bucket containing analysis results shared with Lacework platform."},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpAgentlessScanningCredentials:IntegrationGcpAgentlessScanningCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"filterLists":{"type":"array","items":{"type":"string"},"description":"Comma separated list to include or exclude projects.\n"},"integrationGcpAgentlessScanningId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The GCP Agentless Scanning integration name.\n"},"orgLevel":{"type":"boolean"},"queryText":{"type":"string","description":"The lql query.\n"},"resourceId":{"type":"string","description":"The organization or Project Id.\n"},"resourceLevel":{"type":"string","description":"= (Required) \"PROJECT\" or \"ORGANIZATION\".\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"scanContainers":{"type":"boolean","description":"Whether to includes scanning for containers. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanFrequency":{"type":"number","description":"How often, in hours, the scan will run - Defaults to 24 hours.\n"},"scanHostVulnerabilities":{"type":"boolean","description":"Whether to include scanning for host vulnerabilities. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanMultiVolume":{"type":"boolean","description":"Whether to scan secondary volumes (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e) or only root volumes (\u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e\n"},"scanStoppedInstances":{"type":"boolean","description":"Whether to scan stopped instances (\u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e\n"},"scanningProjectId":{"type":"string","description":"Project ID where scanner is deployed."},"serverToken":{"type":"string"},"typeName":{"type":"string"},"uri":{"type":"string"}},"type":"object"}},"lacework:index/integrationGcpAt:IntegrationGcpAt":{"description":"\n\n## Import\n\nA Lacework GCP Audit Trail integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGcpAt:IntegrationGcpAt account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpAtCredentials:IntegrationGcpAtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpAtId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"orgLevel":{"type":"boolean"},"resourceId":{"type":"string","description":"The organization or project ID.\n"},"resourceLevel":{"type":"string","description":"The integration level. Must be one of `PROJECT` or `ORGANIZATION`. Defaults to `PROJECT`.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscription":{"type":"string","description":"The subscription queue name.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGcpAtId","intgGuid","name","orgLevel","resourceId","subscription","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpAtCredentials:IntegrationGcpAtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpAtId":{"type":"string"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"resourceId":{"type":"string","description":"The organization or project ID.\n"},"resourceLevel":{"type":"string","description":"The integration level. Must be one of `PROJECT` or `ORGANIZATION`. Defaults to `PROJECT`.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscription":{"type":"string","description":"The subscription queue name.\n"}},"requiredInputs":["credentials","resourceId","subscription"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGcpAt resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpAtCredentials:IntegrationGcpAtCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpAtId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"orgLevel":{"type":"boolean"},"resourceId":{"type":"string","description":"The organization or project ID.\n"},"resourceLevel":{"type":"string","description":"The integration level. Must be one of `PROJECT` or `ORGANIZATION`. Defaults to `PROJECT`.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscription":{"type":"string","description":"The subscription queue name.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationGcpCfg:IntegrationGcpCfg":{"description":"\n\n## Import\n\nA Lacework GCP Config integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGcpCfg:IntegrationGcpCfg account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpCfgCredentials:IntegrationGcpCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The GCP Config integration name.\n"},"orgLevel":{"type":"boolean"},"resourceId":{"type":"string","description":"The organization or project ID.\n"},"resourceLevel":{"type":"string","description":"The integration level. Must be one of `PROJECT` or `ORGANIZATION`. Defaults to `PROJECT`.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGcpCfgId","intgGuid","name","orgLevel","resourceId","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpCfgCredentials:IntegrationGcpCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpCfgId":{"type":"string"},"name":{"type":"string","description":"The GCP Config integration name.\n"},"resourceId":{"type":"string","description":"The organization or project ID.\n"},"resourceLevel":{"type":"string","description":"The integration level. Must be one of `PROJECT` or `ORGANIZATION`. Defaults to `PROJECT`.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"}},"requiredInputs":["credentials","resourceId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGcpCfg resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpCfgCredentials:IntegrationGcpCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The GCP Config integration name.\n"},"orgLevel":{"type":"boolean"},"resourceId":{"type":"string","description":"The organization or project ID.\n"},"resourceLevel":{"type":"string","description":"The integration level. Must be one of `PROJECT` or `ORGANIZATION`. Defaults to `PROJECT`.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationGcpGkeAuditLog:IntegrationGcpGkeAuditLog":{"description":"Use this resource to configure an [GCP GKE Audit Log integration](https://docs.lacework.com/category/gke-audit-log-integrations) to analyze GKE audit logs.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationGcpGkeAuditLog(\"account_abc\", {\n    name: \"account ABC\",\n    projectId: \"ABC-project-id\",\n    subscription: \"projects/ABC-project-id/subscriptions/example-subscription\",\n    integrationType: \"PROJECT\",\n    credentials: {\n        clientId: \"123456789012345678900\",\n        clientEmail: \"email@abc-project-name.iam.gserviceaccount.com\",\n        privateKeyId: \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n        privateKey: `-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n`,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationGcpGkeAuditLog(\"account_abc\",\n    name=\"account ABC\",\n    project_id=\"ABC-project-id\",\n    subscription=\"projects/ABC-project-id/subscriptions/example-subscription\",\n    integration_type=\"PROJECT\",\n    credentials={\n        \"client_id\": \"123456789012345678900\",\n        \"client_email\": \"email@abc-project-name.iam.gserviceaccount.com\",\n        \"private_key_id\": \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n        \"private_key\": \"\"\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\"\"\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationGcpGkeAuditLog(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        ProjectId = \"ABC-project-id\",\n        Subscription = \"projects/ABC-project-id/subscriptions/example-subscription\",\n        IntegrationType = \"PROJECT\",\n        Credentials = new Lacework.Inputs.IntegrationGcpGkeAuditLogCredentialsArgs\n        {\n            ClientId = \"123456789012345678900\",\n            ClientEmail = \"email@abc-project-name.iam.gserviceaccount.com\",\n            PrivateKeyId = \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n            PrivateKey = @\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationGcpGkeAuditLog(ctx, \"account_abc\", \u0026lacework.IntegrationGcpGkeAuditLogArgs{\n\t\t\tName:            pulumi.String(\"account ABC\"),\n\t\t\tProjectId:       pulumi.String(\"ABC-project-id\"),\n\t\t\tSubscription:    pulumi.String(\"projects/ABC-project-id/subscriptions/example-subscription\"),\n\t\t\tIntegrationType: pulumi.String(\"PROJECT\"),\n\t\t\tCredentials: \u0026lacework.IntegrationGcpGkeAuditLogCredentialsArgs{\n\t\t\t\tClientId:     pulumi.String(\"123456789012345678900\"),\n\t\t\t\tClientEmail:  pulumi.String(\"email@abc-project-name.iam.gserviceaccount.com\"),\n\t\t\t\tPrivateKeyId: pulumi.String(\"1234abcd1234abcd1234abcd1234abcd1234abcd\"),\n\t\t\t\tPrivateKey:   pulumi.String(\"-----BEGIN PRIVATE KEY-----\\n ... -----END PRIVATE KEY-----\\n\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationGcpGkeAuditLog;\nimport com.pulumi.lacework.IntegrationGcpGkeAuditLogArgs;\nimport com.pulumi.lacework.inputs.IntegrationGcpGkeAuditLogCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationGcpGkeAuditLog(\"accountAbc\", IntegrationGcpGkeAuditLogArgs.builder()\n            .name(\"account ABC\")\n            .projectId(\"ABC-project-id\")\n            .subscription(\"projects/ABC-project-id/subscriptions/example-subscription\")\n            .integrationType(\"PROJECT\")\n            .credentials(IntegrationGcpGkeAuditLogCredentialsArgs.builder()\n                .clientId(\"123456789012345678900\")\n                .clientEmail(\"email@abc-project-name.iam.gserviceaccount.com\")\n                .privateKeyId(\"1234abcd1234abcd1234abcd1234abcd1234abcd\")\n                .privateKey(\"\"\"\n-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n                \"\"\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationGcpGkeAuditLog\n    name: account_abc\n    properties:\n      name: account ABC\n      projectId: ABC-project-id\n      subscription: projects/ABC-project-id/subscriptions/example-subscription\n      integrationType: PROJECT\n      credentials:\n        clientId: '123456789012345678900'\n        clientEmail: email@abc-project-name.iam.gserviceaccount.com\n        privateKeyId: 1234abcd1234abcd1234abcd1234abcd1234abcd\n        privateKey: |\n          -----BEGIN PRIVATE KEY-----\n           ... -----END PRIVATE KEY-----\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework GCP GKE Audit Log integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGcpGkeAuditLog:IntegrationGcpGkeAuditLog account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpGkeAuditLogCredentials:IntegrationGcpGkeAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpGkeAuditLogId":{"type":"string"},"integrationType":{"type":"string","description":"The integration type. Must be one of `PROJECT` or `ORGANIZATION`.\n"},"intgGuid":{"type":"string"},"isOrg":{"type":"boolean"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"organizationId":{"type":"string","description":"The organization ID. Required if \u003cspan pulumi-lang-nodejs=\"`integrationType`\" pulumi-lang-dotnet=\"`IntegrationType`\" pulumi-lang-go=\"`integrationType`\" pulumi-lang-python=\"`integration_type`\" pulumi-lang-yaml=\"`integrationType`\" pulumi-lang-java=\"`integrationType`\"\u003e`integration_type`\u003c/span\u003e is set to `ORGANIZATION`.\n"},"projectId":{"type":"string","description":"The project ID.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscription":{"type":"string","description":"The PubSub Subscription.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGcpGkeAuditLogId","integrationType","intgGuid","isOrg","name","projectId","subscription"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpGkeAuditLogCredentials:IntegrationGcpGkeAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpGkeAuditLogId":{"type":"string"},"integrationType":{"type":"string","description":"The integration type. Must be one of `PROJECT` or `ORGANIZATION`.\n"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"organizationId":{"type":"string","description":"The organization ID. Required if \u003cspan pulumi-lang-nodejs=\"`integrationType`\" pulumi-lang-dotnet=\"`IntegrationType`\" pulumi-lang-go=\"`integrationType`\" pulumi-lang-python=\"`integration_type`\" pulumi-lang-yaml=\"`integrationType`\" pulumi-lang-java=\"`integrationType`\"\u003e`integration_type`\u003c/span\u003e is set to `ORGANIZATION`.\n"},"projectId":{"type":"string","description":"The project ID.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscription":{"type":"string","description":"The PubSub Subscription.\n"}},"requiredInputs":["credentials","integrationType","projectId","subscription"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGcpGkeAuditLog resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpGkeAuditLogCredentials:IntegrationGcpGkeAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpGkeAuditLogId":{"type":"string"},"integrationType":{"type":"string","description":"The integration type. Must be one of `PROJECT` or `ORGANIZATION`.\n"},"intgGuid":{"type":"string"},"isOrg":{"type":"boolean"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"organizationId":{"type":"string","description":"The organization ID. Required if \u003cspan pulumi-lang-nodejs=\"`integrationType`\" pulumi-lang-dotnet=\"`IntegrationType`\" pulumi-lang-go=\"`integrationType`\" pulumi-lang-python=\"`integration_type`\" pulumi-lang-yaml=\"`integrationType`\" pulumi-lang-java=\"`integrationType`\"\u003e`integration_type`\u003c/span\u003e is set to `ORGANIZATION`.\n"},"projectId":{"type":"string","description":"The project ID.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscription":{"type":"string","description":"The PubSub Subscription.\n"}},"type":"object"}},"lacework:index/integrationGcpPubSubAuditLog:IntegrationGcpPubSubAuditLog":{"description":"Use this resource to configure an [GCP Pub Sub Audit Log integration](https://docs.lacework.com/category/gcp-pub-sub-audit-log-integrations) to analyze GCP Pub Sub audit logs.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationGcpPubSubAuditLog(\"account_abc\", {\n    name: \"account ABC\",\n    projectId: \"ABC-project-id\",\n    subscriptionId: \"projects/ABC-project-id/subscriptions/example-subscription\",\n    topicId: \"projects/ABC-project-id/topics/example-topic\",\n    integrationType: \"PROJECT\",\n    credentials: {\n        clientId: \"123456789012345678900\",\n        clientEmail: \"gcp-al-pub-sub-test@techally-test.iam.gserviceaccount.com\",\n        privateKeyId: \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n        privateKey: `-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n`,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationGcpPubSubAuditLog(\"account_abc\",\n    name=\"account ABC\",\n    project_id=\"ABC-project-id\",\n    subscription_id=\"projects/ABC-project-id/subscriptions/example-subscription\",\n    topic_id=\"projects/ABC-project-id/topics/example-topic\",\n    integration_type=\"PROJECT\",\n    credentials={\n        \"client_id\": \"123456789012345678900\",\n        \"client_email\": \"gcp-al-pub-sub-test@techally-test.iam.gserviceaccount.com\",\n        \"private_key_id\": \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n        \"private_key\": \"\"\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\"\"\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationGcpPubSubAuditLog(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        ProjectId = \"ABC-project-id\",\n        SubscriptionId = \"projects/ABC-project-id/subscriptions/example-subscription\",\n        TopicId = \"projects/ABC-project-id/topics/example-topic\",\n        IntegrationType = \"PROJECT\",\n        Credentials = new Lacework.Inputs.IntegrationGcpPubSubAuditLogCredentialsArgs\n        {\n            ClientId = \"123456789012345678900\",\n            ClientEmail = \"gcp-al-pub-sub-test@techally-test.iam.gserviceaccount.com\",\n            PrivateKeyId = \"1234abcd1234abcd1234abcd1234abcd1234abcd\",\n            PrivateKey = @\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationGcpPubSubAuditLog(ctx, \"account_abc\", \u0026lacework.IntegrationGcpPubSubAuditLogArgs{\n\t\t\tName:            pulumi.String(\"account ABC\"),\n\t\t\tProjectId:       pulumi.String(\"ABC-project-id\"),\n\t\t\tSubscriptionId:  pulumi.String(\"projects/ABC-project-id/subscriptions/example-subscription\"),\n\t\t\tTopicId:         pulumi.String(\"projects/ABC-project-id/topics/example-topic\"),\n\t\t\tIntegrationType: pulumi.String(\"PROJECT\"),\n\t\t\tCredentials: \u0026lacework.IntegrationGcpPubSubAuditLogCredentialsArgs{\n\t\t\t\tClientId:     pulumi.String(\"123456789012345678900\"),\n\t\t\t\tClientEmail:  pulumi.String(\"gcp-al-pub-sub-test@techally-test.iam.gserviceaccount.com\"),\n\t\t\t\tPrivateKeyId: pulumi.String(\"1234abcd1234abcd1234abcd1234abcd1234abcd\"),\n\t\t\t\tPrivateKey:   pulumi.String(\"-----BEGIN PRIVATE KEY-----\\n ... -----END PRIVATE KEY-----\\n\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationGcpPubSubAuditLog;\nimport com.pulumi.lacework.IntegrationGcpPubSubAuditLogArgs;\nimport com.pulumi.lacework.inputs.IntegrationGcpPubSubAuditLogCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationGcpPubSubAuditLog(\"accountAbc\", IntegrationGcpPubSubAuditLogArgs.builder()\n            .name(\"account ABC\")\n            .projectId(\"ABC-project-id\")\n            .subscriptionId(\"projects/ABC-project-id/subscriptions/example-subscription\")\n            .topicId(\"projects/ABC-project-id/topics/example-topic\")\n            .integrationType(\"PROJECT\")\n            .credentials(IntegrationGcpPubSubAuditLogCredentialsArgs.builder()\n                .clientId(\"123456789012345678900\")\n                .clientEmail(\"gcp-al-pub-sub-test@techally-test.iam.gserviceaccount.com\")\n                .privateKeyId(\"1234abcd1234abcd1234abcd1234abcd1234abcd\")\n                .privateKey(\"\"\"\n-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n                \"\"\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationGcpPubSubAuditLog\n    name: account_abc\n    properties:\n      name: account ABC\n      projectId: ABC-project-id\n      subscriptionId: projects/ABC-project-id/subscriptions/example-subscription\n      topicId: projects/ABC-project-id/topics/example-topic\n      integrationType: PROJECT\n      credentials:\n        clientId: '123456789012345678900'\n        clientEmail: gcp-al-pub-sub-test@techally-test.iam.gserviceaccount.com\n        privateKeyId: 1234abcd1234abcd1234abcd1234abcd1234abcd\n        privateKey: |\n          -----BEGIN PRIVATE KEY-----\n           ... -----END PRIVATE KEY-----\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework GCP Pub Sub Audit Log integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGcpPubSubAuditLog:IntegrationGcpPubSubAuditLog account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpPubSubAuditLogCredentials:IntegrationGcpPubSubAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpPubSubAuditLogId":{"type":"string"},"integrationType":{"type":"string","description":"The integration type. Must be one of `PROJECT` or `ORGANIZATION`.\n"},"intgGuid":{"type":"string"},"isOrg":{"type":"boolean"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"organizationId":{"type":"string","description":"The organization ID. Required if \u003cspan pulumi-lang-nodejs=\"`integrationType`\" pulumi-lang-dotnet=\"`IntegrationType`\" pulumi-lang-go=\"`integrationType`\" pulumi-lang-python=\"`integration_type`\" pulumi-lang-yaml=\"`integrationType`\" pulumi-lang-java=\"`integrationType`\"\u003e`integration_type`\u003c/span\u003e is set to `ORGANIZATION`.\n"},"projectId":{"type":"string","description":"The project ID.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscriptionId":{"type":"string","description":"The PubSub Subscription.\n"},"topicId":{"type":"string","description":"The PubSub Topic.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGcpPubSubAuditLogId","integrationType","intgGuid","isOrg","name","projectId","subscriptionId","topicId"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpPubSubAuditLogCredentials:IntegrationGcpPubSubAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpPubSubAuditLogId":{"type":"string"},"integrationType":{"type":"string","description":"The integration type. Must be one of `PROJECT` or `ORGANIZATION`.\n"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"organizationId":{"type":"string","description":"The organization ID. Required if \u003cspan pulumi-lang-nodejs=\"`integrationType`\" pulumi-lang-dotnet=\"`IntegrationType`\" pulumi-lang-go=\"`integrationType`\" pulumi-lang-python=\"`integration_type`\" pulumi-lang-yaml=\"`integrationType`\" pulumi-lang-java=\"`integrationType`\"\u003e`integration_type`\u003c/span\u003e is set to `ORGANIZATION`.\n"},"projectId":{"type":"string","description":"The project ID.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscriptionId":{"type":"string","description":"The PubSub Subscription.\n"},"topicId":{"type":"string","description":"The PubSub Topic.\n"}},"requiredInputs":["credentials","integrationType","projectId","subscriptionId","topicId"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGcpPubSubAuditLog resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcpPubSubAuditLogCredentials:IntegrationGcpPubSubAuditLogCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcpPubSubAuditLogId":{"type":"string"},"integrationType":{"type":"string","description":"The integration type. Must be one of `PROJECT` or `ORGANIZATION`.\n"},"intgGuid":{"type":"string"},"isOrg":{"type":"boolean"},"name":{"type":"string","description":"The GCP Audit Trail integration name.\n"},"organizationId":{"type":"string","description":"The organization ID. Required if \u003cspan pulumi-lang-nodejs=\"`integrationType`\" pulumi-lang-dotnet=\"`IntegrationType`\" pulumi-lang-go=\"`integrationType`\" pulumi-lang-python=\"`integration_type`\" pulumi-lang-yaml=\"`integrationType`\" pulumi-lang-java=\"`integrationType`\"\u003e`integration_type`\u003c/span\u003e is set to `ORGANIZATION`.\n"},"projectId":{"type":"string","description":"The project ID.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"subscriptionId":{"type":"string","description":"The PubSub Subscription.\n"},"topicId":{"type":"string","description":"The PubSub Topic.\n"}},"type":"object"}},"lacework:index/integrationGcr:IntegrationGcr":{"description":"\n\n## Import\n\nA Lacework GCR integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGcr:IntegrationGcr example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcrCredentials:IntegrationGcrCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcrId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGcrLimitByLabel:IntegrationGcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The GCR integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"registryDomain":{"type":"string","description":"The GCR domain, which specifies the location where you store the images. Supported domains are `gcr.io`, `us.gcr.io`, `eu.gcr.io`, or `asia.gcr.io`.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","integrationGcrId","intgGuid","name","orgLevel","registryDomain","typeName"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcrCredentials:IntegrationGcrCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcrId":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGcrLimitByLabel:IntegrationGcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The GCR integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"registryDomain":{"type":"string","description":"The GCR domain, which specifies the location where you store the images. Supported domains are `gcr.io`, `us.gcr.io`, `eu.gcr.io`, or `asia.gcr.io`.\n"}},"requiredInputs":["credentials","registryDomain"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGcr resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationGcrCredentials:IntegrationGcrCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGcrId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGcrLimitByLabel:IntegrationGcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabels`\" pulumi-lang-dotnet=\"`LimitByLabels`\" pulumi-lang-go=\"`limitByLabels`\" pulumi-lang-python=\"`limit_by_labels`\" pulumi-lang-yaml=\"`limitByLabels`\" pulumi-lang-java=\"`limitByLabels`\"\u003e`limit_by_labels`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The GCR integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"registryDomain":{"type":"string","description":"The GCR domain, which specifies the location where you store the images. Supported domains are `gcr.io`, `us.gcr.io`, `eu.gcr.io`, or `asia.gcr.io`.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationGhcr:IntegrationGhcr":{"description":"Use this resource to integrate a Github Container Registry (GHCR) with Lacework to assess, identify,\nand report vulnerabilities found in the operating system software packages in container images. \nFor more information, see the [Integrate Github Container Registry documentation](https://docs.lacework.com/integrate-github-container-registry).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.IntegrationGhcr(\"example\", {\n    name: \"My Github registry Registry\",\n    username: \"my-user\",\n    password: \"a-secret-password\",\n    ssl: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.IntegrationGhcr(\"example\",\n    name=\"My Github registry Registry\",\n    username=\"my-user\",\n    password=\"a-secret-password\",\n    ssl=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.IntegrationGhcr(\"example\", new()\n    {\n        Name = \"My Github registry Registry\",\n        Username = \"my-user\",\n        Password = \"a-secret-password\",\n        Ssl = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationGhcr(ctx, \"example\", \u0026lacework.IntegrationGhcrArgs{\n\t\t\tName:     pulumi.String(\"My Github registry Registry\"),\n\t\t\tUsername: pulumi.String(\"my-user\"),\n\t\t\tPassword: pulumi.String(\"a-secret-password\"),\n\t\t\tSsl:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationGhcr;\nimport com.pulumi.lacework.IntegrationGhcrArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IntegrationGhcr(\"example\", IntegrationGhcrArgs.builder()\n            .name(\"My Github registry Registry\")\n            .username(\"my-user\")\n            .password(\"a-secret-password\")\n            .ssl(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:IntegrationGhcr\n    properties:\n      name: My Github registry Registry\n      username: my-user\n      password: a-secret-password\n      ssl: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Github container registry integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationGhcr:IntegrationGhcr example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGhcrId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGhcrLimitByLabel:IntegrationGhcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The Github personal access token with permission `read:packages`.\n","secret":true},"registryDomain":{"type":"string"},"registryNotifications":{"type":"boolean","description":"Subscribe to registry notifications. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"ssl":{"type":"boolean","description":"Enable or disable SSL communication. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"typeName":{"type":"string"},"username":{"type":"string","description":"The Github username.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationGhcrId","intgGuid","name","orgLevel","password","registryDomain","typeName","username"],"inputProperties":{"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGhcrId":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGhcrLimitByLabel:IntegrationGhcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"password":{"type":"string","description":"The Github personal access token with permission `read:packages`.\n","secret":true},"registryNotifications":{"type":"boolean","description":"Subscribe to registry notifications. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"ssl":{"type":"boolean","description":"Enable or disable SSL communication. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"username":{"type":"string","description":"The Github username.\n"}},"requiredInputs":["password","username"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationGhcr resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationGhcrId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationGhcrLimitByLabel:IntegrationGhcrLimitByLabel"},"description":"A list of key/value labels to limit the assessment of images. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The integration name.\n"},"nonOsPackageSupport":{"type":"boolean","description":"Enable [program language scanning](https://docs.lacework.com/container-image-support#language-libraries-support). Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"orgLevel":{"type":"boolean"},"password":{"type":"string","description":"The Github personal access token with permission `read:packages`.\n","secret":true},"registryDomain":{"type":"string"},"registryNotifications":{"type":"boolean","description":"Subscribe to registry notifications. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"ssl":{"type":"boolean","description":"Enable or disable SSL communication. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"typeName":{"type":"string"},"username":{"type":"string","description":"The Github username.\n"}},"type":"object"}},"lacework:index/integrationInlineScanner:IntegrationInlineScanner":{"description":"Use this resource to integrate an Inline Scanner with Lacework to assess, identify,\nand report vulnerabilities found as part of Inline Scanner integration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.IntegrationInlineScanner(\"example\", {name: \"My Inline Scanner Example\"});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.IntegrationInlineScanner(\"example\", name=\"My Inline Scanner Example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.IntegrationInlineScanner(\"example\", new()\n    {\n        Name = \"My Inline Scanner Example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationInlineScanner(ctx, \"example\", \u0026lacework.IntegrationInlineScannerArgs{\n\t\t\tName: pulumi.String(\"My Inline Scanner Example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationInlineScanner;\nimport com.pulumi.lacework.IntegrationInlineScannerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IntegrationInlineScanner(\"example\", IntegrationInlineScannerArgs.builder()\n            .name(\"My Inline Scanner Example\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:IntegrationInlineScanner\n    properties:\n      name: My Inline Scanner Example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Inline Scanner container registry integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationInlineScanner:IntegrationInlineScanner example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"identifierTags":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationInlineScannerIdentifierTag:IntegrationInlineScannerIdentifierTag"},"description":"A list of identifier tags as key:value pairs"},"integrationInlineScannerId":{"type":"string"},"intgGuid":{"type":"string"},"limitNumScan":{"type":"number","description":"The maximum number of newest container images to assess per repository."},"name":{"type":"string","description":"The Container Registry integration name.\n"},"orgLevel":{"type":"boolean"},"serverToken":{"type":"string","description":"The Inline Scanner access token.\n"},"serverUri":{"type":"string","description":"The location where to download the Inline Scanner binary.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationInlineScannerId","intgGuid","name","orgLevel","serverToken","serverUri","typeName"],"inputProperties":{"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"identifierTags":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationInlineScannerIdentifierTag:IntegrationInlineScannerIdentifierTag"},"description":"A list of identifier tags as key:value pairs"},"integrationInlineScannerId":{"type":"string"},"limitNumScan":{"type":"number","description":"The maximum number of newest container images to assess per repository."},"name":{"type":"string","description":"The Container Registry integration name.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationInlineScanner resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"identifierTags":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationInlineScannerIdentifierTag:IntegrationInlineScannerIdentifierTag"},"description":"A list of identifier tags as key:value pairs"},"integrationInlineScannerId":{"type":"string"},"intgGuid":{"type":"string"},"limitNumScan":{"type":"number","description":"The maximum number of newest container images to assess per repository."},"name":{"type":"string","description":"The Container Registry integration name.\n"},"orgLevel":{"type":"boolean"},"serverToken":{"type":"string","description":"The Inline Scanner access token.\n"},"serverUri":{"type":"string","description":"The location where to download the Inline Scanner binary.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/integrationOciCfg:IntegrationOciCfg":{"description":"Use this resource to configure an OCI Configuration integration to analyze OCI compliance.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst accountAbc = new lacework.IntegrationOciCfg(\"account_abc\", {\n    name: \"account ABC\",\n    tenantId: \"ocid1.tenancy.oc1..abcdefghijklmnopqrstuvxyz1234567890\",\n    tenantName: \"tenant_xyz\",\n    homeRegion: \"us-sanjose-1\",\n    userOcid: \"ocid1.user.oc1..abcdefghijklmnopqrstuvxyz1234567890\",\n    credentials: {\n        fingerprint: \"00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f\",\n        privateKey: `-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n`,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\naccount_abc = lacework.IntegrationOciCfg(\"account_abc\",\n    name=\"account ABC\",\n    tenant_id=\"ocid1.tenancy.oc1..abcdefghijklmnopqrstuvxyz1234567890\",\n    tenant_name=\"tenant_xyz\",\n    home_region=\"us-sanjose-1\",\n    user_ocid=\"ocid1.user.oc1..abcdefghijklmnopqrstuvxyz1234567890\",\n    credentials={\n        \"fingerprint\": \"00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f\",\n        \"private_key\": \"\"\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\"\"\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accountAbc = new Lacework.IntegrationOciCfg(\"account_abc\", new()\n    {\n        Name = \"account ABC\",\n        TenantId = \"ocid1.tenancy.oc1..abcdefghijklmnopqrstuvxyz1234567890\",\n        TenantName = \"tenant_xyz\",\n        HomeRegion = \"us-sanjose-1\",\n        UserOcid = \"ocid1.user.oc1..abcdefghijklmnopqrstuvxyz1234567890\",\n        Credentials = new Lacework.Inputs.IntegrationOciCfgCredentialsArgs\n        {\n            Fingerprint = \"00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f\",\n            PrivateKey = @\"-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationOciCfg(ctx, \"account_abc\", \u0026lacework.IntegrationOciCfgArgs{\n\t\t\tName:       pulumi.String(\"account ABC\"),\n\t\t\tTenantId:   pulumi.String(\"ocid1.tenancy.oc1..abcdefghijklmnopqrstuvxyz1234567890\"),\n\t\t\tTenantName: pulumi.String(\"tenant_xyz\"),\n\t\t\tHomeRegion: pulumi.String(\"us-sanjose-1\"),\n\t\t\tUserOcid:   pulumi.String(\"ocid1.user.oc1..abcdefghijklmnopqrstuvxyz1234567890\"),\n\t\t\tCredentials: \u0026lacework.IntegrationOciCfgCredentialsArgs{\n\t\t\t\tFingerprint: pulumi.String(\"00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f\"),\n\t\t\t\tPrivateKey:  pulumi.String(\"-----BEGIN PRIVATE KEY-----\\n ... -----END PRIVATE KEY-----\\n\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationOciCfg;\nimport com.pulumi.lacework.IntegrationOciCfgArgs;\nimport com.pulumi.lacework.inputs.IntegrationOciCfgCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accountAbc = new IntegrationOciCfg(\"accountAbc\", IntegrationOciCfgArgs.builder()\n            .name(\"account ABC\")\n            .tenantId(\"ocid1.tenancy.oc1..abcdefghijklmnopqrstuvxyz1234567890\")\n            .tenantName(\"tenant_xyz\")\n            .homeRegion(\"us-sanjose-1\")\n            .userOcid(\"ocid1.user.oc1..abcdefghijklmnopqrstuvxyz1234567890\")\n            .credentials(IntegrationOciCfgCredentialsArgs.builder()\n                .fingerprint(\"00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f\")\n                .privateKey(\"\"\"\n-----BEGIN PRIVATE KEY-----\n ... -----END PRIVATE KEY-----\n                \"\"\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accountAbc:\n    type: lacework:IntegrationOciCfg\n    name: account_abc\n    properties:\n      name: account ABC\n      tenantId: ocid1.tenancy.oc1..abcdefghijklmnopqrstuvxyz1234567890\n      tenantName: tenant_xyz\n      homeRegion: us-sanjose-1\n      userOcid: ocid1.user.oc1..abcdefghijklmnopqrstuvxyz1234567890\n      credentials:\n        fingerprint: 00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f\n        privateKey: |\n          -----BEGIN PRIVATE KEY-----\n           ... -----END PRIVATE KEY-----\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework OCI Config integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationOciCfg:IntegrationOciCfg account_abc EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework cloud-account list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationOciCfgCredentials:IntegrationOciCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean"},"homeRegion":{"type":"string","description":"The home region of the tenant to be integrated with Lacework.\n"},"integrationOciCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The OCI Configuration integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"tenantId":{"type":"string","description":"The OCID of the tenant to be integrated with Lacework.\n"},"tenantName":{"type":"string","description":"The name of the tenant to be integrated with Lacework.\n"},"typeName":{"type":"string"},"userOcid":{"type":"string","description":"The OCID of the OCI user used used in the integration.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","credentials","homeRegion","integrationOciCfgId","intgGuid","name","orgLevel","tenantId","tenantName","typeName","userOcid"],"inputProperties":{"credentials":{"$ref":"#/types/lacework:index%2FIntegrationOciCfgCredentials:IntegrationOciCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean"},"homeRegion":{"type":"string","description":"The home region of the tenant to be integrated with Lacework.\n"},"integrationOciCfgId":{"type":"string"},"name":{"type":"string","description":"The OCI Configuration integration name.\n"},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"tenantId":{"type":"string","description":"The OCID of the tenant to be integrated with Lacework.\n"},"tenantName":{"type":"string","description":"The name of the tenant to be integrated with Lacework.\n"},"userOcid":{"type":"string","description":"The OCID of the OCI user used used in the integration.\n"}},"requiredInputs":["credentials","homeRegion","tenantId","tenantName","userOcid"],"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationOciCfg resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"credentials":{"$ref":"#/types/lacework:index%2FIntegrationOciCfgCredentials:IntegrationOciCfgCredentials","description":"The credentials needed by the integration. See Credentials below for details.\n"},"enabled":{"type":"boolean"},"homeRegion":{"type":"string","description":"The home region of the tenant to be integrated with Lacework.\n"},"integrationOciCfgId":{"type":"string"},"intgGuid":{"type":"string"},"name":{"type":"string","description":"The OCI Configuration integration name.\n"},"orgLevel":{"type":"boolean"},"retries":{"type":"number","description":"The number of attempts to create the external integration."},"tenantId":{"type":"string","description":"The OCID of the tenant to be integrated with Lacework.\n"},"tenantName":{"type":"string","description":"The name of the tenant to be integrated with Lacework.\n"},"typeName":{"type":"string"},"userOcid":{"type":"string","description":"The OCID of the OCI user used used in the integration.\n"}},"type":"object"}},"lacework:index/integrationProxyScanner:IntegrationProxyScanner":{"description":"Use this resource to integrate a Proxy Scanner with Lacework to assess, identify,\nand report vulnerabilities found as part of Proxy Scanner integration.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.IntegrationProxyScanner(\"example\", {name: \"My Proxy Scanner Example\"});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.IntegrationProxyScanner(\"example\", name=\"My Proxy Scanner Example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.IntegrationProxyScanner(\"example\", new()\n    {\n        Name = \"My Proxy Scanner Example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewIntegrationProxyScanner(ctx, \"example\", \u0026lacework.IntegrationProxyScannerArgs{\n\t\t\tName: pulumi.String(\"My Proxy Scanner Example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.IntegrationProxyScanner;\nimport com.pulumi.lacework.IntegrationProxyScannerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new IntegrationProxyScanner(\"example\", IntegrationProxyScannerArgs.builder()\n            .name(\"My Proxy Scanner Example\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:IntegrationProxyScanner\n    properties:\n      name: My Proxy Scanner Example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Proxy Scanner container registry integration can be imported using a `INT_GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/integrationProxyScanner:IntegrationProxyScanner example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `INT_GUID` from existing integrations in your account, use the\n\tLacework CLI command `lacework container-registry list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationProxyScannerId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationProxyScannerLimitByLabel:IntegrationProxyScannerLimitByLabel"},"description":"A key based map of labels to limit the assessment of images with matching `key:value` labels. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Container Registry integration name.\n"},"orgLevel":{"type":"boolean"},"serverToken":{"type":"string","description":"The Proxy Scanner access token.\n"},"serverUri":{"type":"string","description":"The location where to download the Proxy Scanner binary.\n"},"typeName":{"type":"string"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","integrationProxyScannerId","intgGuid","name","orgLevel","serverToken","serverUri","typeName"],"inputProperties":{"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationProxyScannerId":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationProxyScannerLimitByLabel:IntegrationProxyScannerLimitByLabel"},"description":"A key based map of labels to limit the assessment of images with matching `key:value` labels. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Container Registry integration name.\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering IntegrationProxyScanner resources.\n","properties":{"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"integrationProxyScannerId":{"type":"string"},"intgGuid":{"type":"string"},"limitByLabels":{"type":"array","items":{"$ref":"#/types/lacework:index%2FIntegrationProxyScannerLimitByLabel:IntegrationProxyScannerLimitByLabel"},"description":"A key based map of labels to limit the assessment of images with matching `key:value` labels. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitByRepositories":{"type":"array","items":{"type":"string"},"description":"A list of repositories to assess.\n"},"limitByTags":{"type":"array","items":{"type":"string"},"description":"A list of image tags to limit the assessment of images with matching tags. If you specify \u003cspan pulumi-lang-nodejs=\"`limitByTags`\" pulumi-lang-dotnet=\"`LimitByTags`\" pulumi-lang-go=\"`limitByTags`\" pulumi-lang-python=\"`limit_by_tags`\" pulumi-lang-yaml=\"`limitByTags`\" pulumi-lang-java=\"`limitByTags`\"\u003e`limit_by_tags`\u003c/span\u003e and \u003cspan pulumi-lang-nodejs=\"`limitByLabel`\" pulumi-lang-dotnet=\"`LimitByLabel`\" pulumi-lang-go=\"`limitByLabel`\" pulumi-lang-python=\"`limit_by_label`\" pulumi-lang-yaml=\"`limitByLabel`\" pulumi-lang-java=\"`limitByLabel`\"\u003e`limit_by_label`\u003c/span\u003e limits, they function as an `AND`.\n"},"limitNumImgs":{"type":"number","description":"The maximum number of newest container images to assess per repository. Must be one of \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`10`\" pulumi-lang-dotnet=\"`10`\" pulumi-lang-go=\"`10`\" pulumi-lang-python=\"`10`\" pulumi-lang-yaml=\"`10`\" pulumi-lang-java=\"`10`\"\u003e`10`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`15`\" pulumi-lang-dotnet=\"`15`\" pulumi-lang-go=\"`15`\" pulumi-lang-python=\"`15`\" pulumi-lang-yaml=\"`15`\" pulumi-lang-java=\"`15`\"\u003e`15`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`5`\" pulumi-lang-dotnet=\"`5`\" pulumi-lang-go=\"`5`\" pulumi-lang-python=\"`5`\" pulumi-lang-yaml=\"`5`\" pulumi-lang-java=\"`5`\"\u003e`5`\u003c/span\u003e.\n"},"name":{"type":"string","description":"The Container Registry integration name.\n"},"orgLevel":{"type":"boolean"},"serverToken":{"type":"string","description":"The Proxy Scanner access token.\n"},"serverUri":{"type":"string","description":"The location where to download the Proxy Scanner binary.\n"},"typeName":{"type":"string"}},"type":"object"}},"lacework:index/managedPolicies:ManagedPolicies":{"description":"Use this resource to update the \u003cspan pulumi-lang-nodejs=\"`state`\" pulumi-lang-dotnet=\"`State`\" pulumi-lang-go=\"`state`\" pulumi-lang-python=\"`state`\" pulumi-lang-yaml=\"`state`\" pulumi-lang-java=\"`state`\"\u003e`state`\u003c/span\u003e (enabled/disabled) and the \u003cspan pulumi-lang-nodejs=\"`severity`\" pulumi-lang-dotnet=\"`Severity`\" pulumi-lang-go=\"`severity`\" pulumi-lang-python=\"`severity`\" pulumi-lang-yaml=\"`severity`\" pulumi-lang-java=\"`severity`\"\u003e`severity`\u003c/span\u003e properties for Lacework-defined policies.\n\n## Example Usage\n\nThe following example shows how to manage three Lacework-defined policies.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.ManagedPolicies(\"example\", {policies: [\n    {\n        id: \"lacework-global-1\",\n        enabled: true,\n        severity: \"High\",\n    },\n    {\n        id: \"lacework-global-2\",\n        enabled: false,\n        severity: \"Critical\",\n    },\n    {\n        id: \"lacework-global-10\",\n        enabled: true,\n        severity: \"Low\",\n    },\n]});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.ManagedPolicies(\"example\", policies=[\n    {\n        \"id\": \"lacework-global-1\",\n        \"enabled\": True,\n        \"severity\": \"High\",\n    },\n    {\n        \"id\": \"lacework-global-2\",\n        \"enabled\": False,\n        \"severity\": \"Critical\",\n    },\n    {\n        \"id\": \"lacework-global-10\",\n        \"enabled\": True,\n        \"severity\": \"Low\",\n    },\n])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.ManagedPolicies(\"example\", new()\n    {\n        Policies = new[]\n        {\n            new Lacework.Inputs.ManagedPoliciesPolicyArgs\n            {\n                Id = \"lacework-global-1\",\n                Enabled = true,\n                Severity = \"High\",\n            },\n            new Lacework.Inputs.ManagedPoliciesPolicyArgs\n            {\n                Id = \"lacework-global-2\",\n                Enabled = false,\n                Severity = \"Critical\",\n            },\n            new Lacework.Inputs.ManagedPoliciesPolicyArgs\n            {\n                Id = \"lacework-global-10\",\n                Enabled = true,\n                Severity = \"Low\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewManagedPolicies(ctx, \"example\", \u0026lacework.ManagedPoliciesArgs{\n\t\t\tPolicies: lacework.ManagedPoliciesPolicyArray{\n\t\t\t\t\u0026lacework.ManagedPoliciesPolicyArgs{\n\t\t\t\t\tId:       pulumi.String(\"lacework-global-1\"),\n\t\t\t\t\tEnabled:  pulumi.Bool(true),\n\t\t\t\t\tSeverity: pulumi.String(\"High\"),\n\t\t\t\t},\n\t\t\t\t\u0026lacework.ManagedPoliciesPolicyArgs{\n\t\t\t\t\tId:       pulumi.String(\"lacework-global-2\"),\n\t\t\t\t\tEnabled:  pulumi.Bool(false),\n\t\t\t\t\tSeverity: pulumi.String(\"Critical\"),\n\t\t\t\t},\n\t\t\t\t\u0026lacework.ManagedPoliciesPolicyArgs{\n\t\t\t\t\tId:       pulumi.String(\"lacework-global-10\"),\n\t\t\t\t\tEnabled:  pulumi.Bool(true),\n\t\t\t\t\tSeverity: pulumi.String(\"Low\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.ManagedPolicies;\nimport com.pulumi.lacework.ManagedPoliciesArgs;\nimport com.pulumi.lacework.inputs.ManagedPoliciesPolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagedPolicies(\"example\", ManagedPoliciesArgs.builder()\n            .policies(            \n                ManagedPoliciesPolicyArgs.builder()\n                    .id(\"lacework-global-1\")\n                    .enabled(true)\n                    .severity(\"High\")\n                    .build(),\n                ManagedPoliciesPolicyArgs.builder()\n                    .id(\"lacework-global-2\")\n                    .enabled(false)\n                    .severity(\"Critical\")\n                    .build(),\n                ManagedPoliciesPolicyArgs.builder()\n                    .id(\"lacework-global-10\")\n                    .enabled(true)\n                    .severity(\"Low\")\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:ManagedPolicies\n    properties:\n      policies:\n        - id: lacework-global-1\n          enabled: true\n          severity: High\n        - id: lacework-global-2\n          enabled: false\n          severity: Critical\n        - id: lacework-global-10\n          enabled: true\n          severity: Low\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"managedPoliciesId":{"type":"string"},"policies":{"type":"array","items":{"$ref":"#/types/lacework:index%2FManagedPoliciesPolicy:ManagedPoliciesPolicy"},"description":"A list of Lacework managed policies"}},"type":"object","required":["managedPoliciesId","policies"],"inputProperties":{"managedPoliciesId":{"type":"string"},"policies":{"type":"array","items":{"$ref":"#/types/lacework:index%2FManagedPoliciesPolicy:ManagedPoliciesPolicy"},"description":"A list of Lacework managed policies"}},"requiredInputs":["policies"],"stateInputs":{"description":"Input properties used for looking up and filtering ManagedPolicies resources.\n","properties":{"managedPoliciesId":{"type":"string"},"policies":{"type":"array","items":{"$ref":"#/types/lacework:index%2FManagedPoliciesPolicy:ManagedPoliciesPolicy"},"description":"A list of Lacework managed policies"}},"type":"object"}},"lacework:index/policy:Policy":{"description":"Lacework provides a highly scalable platform for creating, customizing, and managing custom policies\nagainst any datasource that is exposed via the Lacework Query Language (LQL).\n\nFor more information, see the [Policy Overview Documentation](https://docs.lacework.net/console/custom-policy-overview).\n\n## Example Usage\n\nCreate a Lacework Policy to check for a change of password from an RDS cluster.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst aWSCTAAuroraPasswordChange = new lacework.Query(\"AWS_CTA_AuroraPasswordChange\", {\n    queryId: \"TF_AWS_CTA_AuroraPasswordChange\",\n    query: `  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 'rds.amazonaws.com'\n          and EVENT_NAME = 'ModifyDBCluster'\n          and value_exists(EVENT:requestParameters.masterUserPassword)\n          and EVENT:requestParameters.applyImmediately = true\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n`,\n});\nconst example = new lacework.Policy(\"example\", {\n    title: \"Aurora Password Change\",\n    description: \"Password for an Aurora RDS cluster was changed\",\n    remediation: \"Check that the password change was expected and ensure only specified users can modify the RDS cluster\",\n    queryId: aWSCTAAuroraPasswordChange.laceworkQueryId,\n    severity: \"High\",\n    type: \"Violation\",\n    evaluation: \"Hourly\",\n    tags: [\n        \"cloud_AWS\",\n        \"custom\",\n    ],\n    enabled: false,\n    alerting: {\n        enabled: false,\n        profile: \"LW_CloudTrail_Alerts.CloudTrailDefaultAlert_AwsResource\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\na_wscta_aurora_password_change = lacework.Query(\"AWS_CTA_AuroraPasswordChange\",\n    query_id=\"TF_AWS_CTA_AuroraPasswordChange\",\n    query=\"\"\"  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 'rds.amazonaws.com'\n          and EVENT_NAME = 'ModifyDBCluster'\n          and value_exists(EVENT:requestParameters.masterUserPassword)\n          and EVENT:requestParameters.applyImmediately = true\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n\"\"\")\nexample = lacework.Policy(\"example\",\n    title=\"Aurora Password Change\",\n    description=\"Password for an Aurora RDS cluster was changed\",\n    remediation=\"Check that the password change was expected and ensure only specified users can modify the RDS cluster\",\n    query_id=a_wscta_aurora_password_change.lacework_query_id,\n    severity=\"High\",\n    type=\"Violation\",\n    evaluation=\"Hourly\",\n    tags=[\n        \"cloud_AWS\",\n        \"custom\",\n    ],\n    enabled=False,\n    alerting={\n        \"enabled\": False,\n        \"profile\": \"LW_CloudTrail_Alerts.CloudTrailDefaultAlert_AwsResource\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var aWSCTAAuroraPasswordChange = new Lacework.Query(\"AWS_CTA_AuroraPasswordChange\", new()\n    {\n        QueryId = \"TF_AWS_CTA_AuroraPasswordChange\",\n        Query = @\"  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 'rds.amazonaws.com'\n          and EVENT_NAME = 'ModifyDBCluster'\n          and value_exists(EVENT:requestParameters.masterUserPassword)\n          and EVENT:requestParameters.applyImmediately = true\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n\",\n    });\n\n    var example = new Lacework.Policy(\"example\", new()\n    {\n        Title = \"Aurora Password Change\",\n        Description = \"Password for an Aurora RDS cluster was changed\",\n        Remediation = \"Check that the password change was expected and ensure only specified users can modify the RDS cluster\",\n        QueryId = aWSCTAAuroraPasswordChange.LaceworkQueryId,\n        Severity = \"High\",\n        Type = \"Violation\",\n        Evaluation = \"Hourly\",\n        Tags = new[]\n        {\n            \"cloud_AWS\",\n            \"custom\",\n        },\n        Enabled = false,\n        Alerting = new Lacework.Inputs.PolicyAlertingArgs\n        {\n            Enabled = false,\n            Profile = \"LW_CloudTrail_Alerts.CloudTrailDefaultAlert_AwsResource\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taWSCTAAuroraPasswordChange, err := lacework.NewQuery(ctx, \"AWS_CTA_AuroraPasswordChange\", \u0026lacework.QueryArgs{\n\t\t\tQueryId: pulumi.String(\"TF_AWS_CTA_AuroraPasswordChange\"),\n\t\t\tQuery: pulumi.String(`  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 'rds.amazonaws.com'\n          and EVENT_NAME = 'ModifyDBCluster'\n          and value_exists(EVENT:requestParameters.masterUserPassword)\n          and EVENT:requestParameters.applyImmediately = true\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n`),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewPolicy(ctx, \"example\", \u0026lacework.PolicyArgs{\n\t\t\tTitle:       pulumi.String(\"Aurora Password Change\"),\n\t\t\tDescription: pulumi.String(\"Password for an Aurora RDS cluster was changed\"),\n\t\t\tRemediation: pulumi.String(\"Check that the password change was expected and ensure only specified users can modify the RDS cluster\"),\n\t\t\tQueryId:     aWSCTAAuroraPasswordChange.LaceworkQueryId,\n\t\t\tSeverity:    pulumi.String(\"High\"),\n\t\t\tType:        pulumi.String(\"Violation\"),\n\t\t\tEvaluation:  pulumi.String(\"Hourly\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"cloud_AWS\"),\n\t\t\t\tpulumi.String(\"custom\"),\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tAlerting: \u0026lacework.PolicyAlertingArgs{\n\t\t\t\tEnabled: pulumi.Bool(false),\n\t\t\t\tProfile: pulumi.String(\"LW_CloudTrail_Alerts.CloudTrailDefaultAlert_AwsResource\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.Query;\nimport com.pulumi.lacework.QueryArgs;\nimport com.pulumi.lacework.Policy;\nimport com.pulumi.lacework.PolicyArgs;\nimport com.pulumi.lacework.inputs.PolicyAlertingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var aWSCTAAuroraPasswordChange = new Query(\"aWSCTAAuroraPasswordChange\", QueryArgs.builder()\n            .queryId(\"TF_AWS_CTA_AuroraPasswordChange\")\n            .query(\"\"\"\n  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 'rds.amazonaws.com'\n          and EVENT_NAME = 'ModifyDBCluster'\n          and value_exists(EVENT:requestParameters.masterUserPassword)\n          and EVENT:requestParameters.applyImmediately = true\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n            \"\"\")\n            .build());\n\n        var example = new Policy(\"example\", PolicyArgs.builder()\n            .title(\"Aurora Password Change\")\n            .description(\"Password for an Aurora RDS cluster was changed\")\n            .remediation(\"Check that the password change was expected and ensure only specified users can modify the RDS cluster\")\n            .queryId(aWSCTAAuroraPasswordChange.laceworkQueryId())\n            .severity(\"High\")\n            .type(\"Violation\")\n            .evaluation(\"Hourly\")\n            .tags(            \n                \"cloud_AWS\",\n                \"custom\")\n            .enabled(false)\n            .alerting(PolicyAlertingArgs.builder()\n                .enabled(false)\n                .profile(\"LW_CloudTrail_Alerts.CloudTrailDefaultAlert_AwsResource\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  aWSCTAAuroraPasswordChange:\n    type: lacework:Query\n    name: AWS_CTA_AuroraPasswordChange\n    properties:\n      queryId: TF_AWS_CTA_AuroraPasswordChange\n      query: |2\n          {\n              source {\n                  CloudTrailRawEvents\n              }\n              filter {\n                  EVENT_SOURCE = 'rds.amazonaws.com'\n                  and EVENT_NAME = 'ModifyDBCluster'\n                  and value_exists(EVENT:requestParameters.masterUserPassword)\n                  and EVENT:requestParameters.applyImmediately = true\n                  and ERROR_CODE is null\n              }\n              return distinct {\n                  INSERT_ID,\n                  INSERT_TIME,\n                  EVENT_TIME,\n                  EVENT\n              }\n          }\n  example:\n    type: lacework:Policy\n    properties:\n      title: Aurora Password Change\n      description: Password for an Aurora RDS cluster was changed\n      remediation: Check that the password change was expected and ensure only specified users can modify the RDS cluster\n      queryId: ${aWSCTAAuroraPasswordChange.laceworkQueryId}\n      severity: High\n      type: Violation\n      evaluation: Hourly\n      tags:\n        - cloud_AWS\n        - custom\n      enabled: false\n      alerting:\n        enabled: false\n        profile: LW_CloudTrail_Alerts.CloudTrailDefaultAlert_AwsResource\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003e **Note:** Lacework automatically generates a policy id when you create a policy, which is the recommended workflow.\nOptionally, you can define your own policy id using the \u003cspan pulumi-lang-nodejs=\"`policyIdSuffix`\" pulumi-lang-dotnet=\"`PolicyIdSuffix`\" pulumi-lang-go=\"`policyIdSuffix`\" pulumi-lang-python=\"`policy_id_suffix`\" pulumi-lang-yaml=\"`policyIdSuffix`\" pulumi-lang-java=\"`policyIdSuffix`\"\u003e`policy_id_suffix`\u003c/span\u003e, this suffix must be all lowercase letters,\noptionally followed by `-` and numbers, for example, `abcd-1234`. When you define your own policy id, Lacework prepends\nthe account name. The final policy id would then be `lwaccountname-abcd-1234`.\n\n## Import\n\nA Lacework policy can be imported using a `POLICY_ID`, e.g.\n\n```sh\n$ pulumi import lacework:index/policy:Policy example YourLQLPolicyID\n```\n-\u003e __Note:__ To retrieve the `POLICY_ID` from existing policies in your account, use the\nLacework CLI command `lacework policy list`. To install this tool follow\n[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"alerting":{"$ref":"#/types/lacework:index%2FPolicyAlerting:PolicyAlerting","description":"Alerting. See Alerting below for details.\n"},"computedTags":{"type":"string","description":"All policy tags, server generated and user specified tags"},"description":{"type":"string","description":"The description of the policy.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"evaluation":{"type":"string","description":"The evaluation frequency at which the policy will be evaluated. Valid values are\n`Hourly` or `Daily`. Defaults to `Hourly`.\n"},"limit":{"type":"number","description":"Set the maximum number of records returned by the policy.\nMaximum value is \u003cspan pulumi-lang-nodejs=\"`5000`\" pulumi-lang-dotnet=\"`5000`\" pulumi-lang-go=\"`5000`\" pulumi-lang-python=\"`5000`\" pulumi-lang-yaml=\"`5000`\" pulumi-lang-java=\"`5000`\"\u003e`5000`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`1000`\" pulumi-lang-dotnet=\"`1000`\" pulumi-lang-go=\"`1000`\" pulumi-lang-python=\"`1000`\" pulumi-lang-yaml=\"`1000`\" pulumi-lang-java=\"`1000`\"\u003e`1000`\u003c/span\u003e\n"},"owner":{"type":"string"},"policyIdSuffix":{"type":"string","description":"The string appended to the end of the policy id. If specified,\nthe policy id will be `\u003ctenant name\u003e-\u003cpolicy_id_suffix\u003e`. Supported format is `\u003cpolicy identifier\u003e`\nall lowercase up to 16 characters, followed by optional `-\u003cnumeric identifier\u003e` up to 8 digits.\nFor example: `abcd-1234` will make policy id `tenantname-abcd-1234`.\n"},"queryId":{"type":"string","description":"The query id.\n"},"remediation":{"type":"string","description":"The remediation message to display.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of policy tags.\n"},"title":{"type":"string","description":"The policy title.\n"},"type":{"type":"string","description":"The policy type must be `Violation`.\n"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object","required":["computedTags","description","owner","queryId","remediation","severity","title","type","updatedBy","updatedTime"],"inputProperties":{"alerting":{"$ref":"#/types/lacework:index%2FPolicyAlerting:PolicyAlerting","description":"Alerting. See Alerting below for details.\n"},"description":{"type":"string","description":"The description of the policy.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"evaluation":{"type":"string","description":"The evaluation frequency at which the policy will be evaluated. Valid values are\n`Hourly` or `Daily`. Defaults to `Hourly`.\n"},"limit":{"type":"number","description":"Set the maximum number of records returned by the policy.\nMaximum value is \u003cspan pulumi-lang-nodejs=\"`5000`\" pulumi-lang-dotnet=\"`5000`\" pulumi-lang-go=\"`5000`\" pulumi-lang-python=\"`5000`\" pulumi-lang-yaml=\"`5000`\" pulumi-lang-java=\"`5000`\"\u003e`5000`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`1000`\" pulumi-lang-dotnet=\"`1000`\" pulumi-lang-go=\"`1000`\" pulumi-lang-python=\"`1000`\" pulumi-lang-yaml=\"`1000`\" pulumi-lang-java=\"`1000`\"\u003e`1000`\u003c/span\u003e\n"},"policyIdSuffix":{"type":"string","description":"The string appended to the end of the policy id. If specified,\nthe policy id will be `\u003ctenant name\u003e-\u003cpolicy_id_suffix\u003e`. Supported format is `\u003cpolicy identifier\u003e`\nall lowercase up to 16 characters, followed by optional `-\u003cnumeric identifier\u003e` up to 8 digits.\nFor example: `abcd-1234` will make policy id `tenantname-abcd-1234`.\n"},"queryId":{"type":"string","description":"The query id.\n"},"remediation":{"type":"string","description":"The remediation message to display.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of policy tags.\n"},"title":{"type":"string","description":"The policy title.\n"},"type":{"type":"string","description":"The policy type must be `Violation`.\n"}},"requiredInputs":["description","queryId","remediation","severity","title","type"],"stateInputs":{"description":"Input properties used for looking up and filtering Policy resources.\n","properties":{"alerting":{"$ref":"#/types/lacework:index%2FPolicyAlerting:PolicyAlerting","description":"Alerting. See Alerting below for details.\n"},"computedTags":{"type":"string","description":"All policy tags, server generated and user specified tags"},"description":{"type":"string","description":"The description of the policy.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"evaluation":{"type":"string","description":"The evaluation frequency at which the policy will be evaluated. Valid values are\n`Hourly` or `Daily`. Defaults to `Hourly`.\n"},"limit":{"type":"number","description":"Set the maximum number of records returned by the policy.\nMaximum value is \u003cspan pulumi-lang-nodejs=\"`5000`\" pulumi-lang-dotnet=\"`5000`\" pulumi-lang-go=\"`5000`\" pulumi-lang-python=\"`5000`\" pulumi-lang-yaml=\"`5000`\" pulumi-lang-java=\"`5000`\"\u003e`5000`\u003c/span\u003e. Defaults to \u003cspan pulumi-lang-nodejs=\"`1000`\" pulumi-lang-dotnet=\"`1000`\" pulumi-lang-go=\"`1000`\" pulumi-lang-python=\"`1000`\" pulumi-lang-yaml=\"`1000`\" pulumi-lang-java=\"`1000`\"\u003e`1000`\u003c/span\u003e\n"},"owner":{"type":"string"},"policyIdSuffix":{"type":"string","description":"The string appended to the end of the policy id. If specified,\nthe policy id will be `\u003ctenant name\u003e-\u003cpolicy_id_suffix\u003e`. Supported format is `\u003cpolicy identifier\u003e`\nall lowercase up to 16 characters, followed by optional `-\u003cnumeric identifier\u003e` up to 8 digits.\nFor example: `abcd-1234` will make policy id `tenantname-abcd-1234`.\n"},"queryId":{"type":"string","description":"The query id.\n"},"remediation":{"type":"string","description":"The remediation message to display.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of policy tags.\n"},"title":{"type":"string","description":"The policy title.\n"},"type":{"type":"string","description":"The policy type must be `Violation`.\n"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object"}},"lacework:index/policyCompliance:PolicyCompliance":{"description":"Lacework provides a highly scalable platform for creating, customizing, and managing custom policies\nagainst any datasource that is exposed via the Lacework Query Language (LQL).\n\nFor more information, see the [Policy Overview Documentation](https://docs.lacework.net/console/custom-policy-overview).\n\n## Example Usage\n\nCreate a Lacework Compliance Policy to check for unenabled CloudTrail log file validation.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst aWSConfigCloudTrailLogFileValidationNotEnabled = new lacework.Query(\"AWS_Config_CloudTrailLogFileValidationNotEnabled\", {\n    queryId: \"LW_Global_AWS_Config_CloudTrailLogFileValidationNotEnabled\",\n    query: `  {\n    source {\n      LW_CFG_AWS_CLOUDTRAIL\n    }\n    filter {\n      RESOURCE_CONFIG:LogFileValidationEnabled = 'false'\n    }\n    return distinct {\n      ACCOUNT_ALIAS,\n      ACCOUNT_ID,\n      ARN as RESOURCE_KEY,\n      RESOURCE_REGION,\n      RESOURCE_TYPE,\n      SERVICE,\n      'CloudTrailLogFileValidationNotEnabled' as COMPLIANCE_FAILURE_REASON\n    }\n  }\n`,\n});\nconst example = new lacework.PolicyCompliance(\"example\", {\n    queryId: aWSConfigCloudTrailLogFileValidationNotEnabled.laceworkQueryId,\n    title: \"Ensure CloudTrail log file validation is enabled\",\n    enabled: false,\n    severity: \"High\",\n    description: `CloudTrail log file validation creates a digitally signed digest\nfile containing a hash of each log that CloudTrail writes to S3. These digest\nfiles can be used to determine whether a log file was changed, deleted, or unchanged\nafter CloudTrail delivered the log. It is recommended that file validation be\nenabled on all CloudTrails.`,\n    remediation: `Perform the following to enable log file validation on a given trail:\nFrom Console:\n1. Sign in to the AWS Management Console and open the IAM console at (https://console.aws.amazon.com/cloudtrail)\n2. Click on Trails on the left navigation pane\n3. Click on target trail\n4. Within the S3 section click on the edit icon (pencil)\n5. Click Advanced\n6. Click on the Yes radio button in section Enable log file validation\n7. Click Save\nFrom Command Line:\naws cloudtrail update-trail --name \u003ctrail_name\u003e --enable-log-file-validation\nNote that periodic validation of logs using these digests can be performed by running the following command:\naws cloudtrail validate-logs --trail-arn \u003ctrail_arn\u003e --start-time \u003cstart_time\u003e --end-time \u003cend_time\u003e`,\n    tags: [\"security:compliance\"],\n    alertingEnabled: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\na_ws_config_cloud_trail_log_file_validation_not_enabled = lacework.Query(\"AWS_Config_CloudTrailLogFileValidationNotEnabled\",\n    query_id=\"LW_Global_AWS_Config_CloudTrailLogFileValidationNotEnabled\",\n    query=\"\"\"  {\n    source {\n      LW_CFG_AWS_CLOUDTRAIL\n    }\n    filter {\n      RESOURCE_CONFIG:LogFileValidationEnabled = 'false'\n    }\n    return distinct {\n      ACCOUNT_ALIAS,\n      ACCOUNT_ID,\n      ARN as RESOURCE_KEY,\n      RESOURCE_REGION,\n      RESOURCE_TYPE,\n      SERVICE,\n      'CloudTrailLogFileValidationNotEnabled' as COMPLIANCE_FAILURE_REASON\n    }\n  }\n\"\"\")\nexample = lacework.PolicyCompliance(\"example\",\n    query_id=a_ws_config_cloud_trail_log_file_validation_not_enabled.lacework_query_id,\n    title=\"Ensure CloudTrail log file validation is enabled\",\n    enabled=False,\n    severity=\"High\",\n    description=\"\"\"CloudTrail log file validation creates a digitally signed digest\nfile containing a hash of each log that CloudTrail writes to S3. These digest\nfiles can be used to determine whether a log file was changed, deleted, or unchanged\nafter CloudTrail delivered the log. It is recommended that file validation be\nenabled on all CloudTrails.\"\"\",\n    remediation=\"\"\"Perform the following to enable log file validation on a given trail:\nFrom Console:\n1. Sign in to the AWS Management Console and open the IAM console at (https://console.aws.amazon.com/cloudtrail)\n2. Click on Trails on the left navigation pane\n3. Click on target trail\n4. Within the S3 section click on the edit icon (pencil)\n5. Click Advanced\n6. Click on the Yes radio button in section Enable log file validation\n7. Click Save\nFrom Command Line:\naws cloudtrail update-trail --name \u003ctrail_name\u003e --enable-log-file-validation\nNote that periodic validation of logs using these digests can be performed by running the following command:\naws cloudtrail validate-logs --trail-arn \u003ctrail_arn\u003e --start-time \u003cstart_time\u003e --end-time \u003cend_time\u003e\"\"\",\n    tags=[\"security:compliance\"],\n    alerting_enabled=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var aWSConfigCloudTrailLogFileValidationNotEnabled = new Lacework.Query(\"AWS_Config_CloudTrailLogFileValidationNotEnabled\", new()\n    {\n        QueryId = \"LW_Global_AWS_Config_CloudTrailLogFileValidationNotEnabled\",\n        Query = @\"  {\n    source {\n      LW_CFG_AWS_CLOUDTRAIL\n    }\n    filter {\n      RESOURCE_CONFIG:LogFileValidationEnabled = 'false'\n    }\n    return distinct {\n      ACCOUNT_ALIAS,\n      ACCOUNT_ID,\n      ARN as RESOURCE_KEY,\n      RESOURCE_REGION,\n      RESOURCE_TYPE,\n      SERVICE,\n      'CloudTrailLogFileValidationNotEnabled' as COMPLIANCE_FAILURE_REASON\n    }\n  }\n\",\n    });\n\n    var example = new Lacework.PolicyCompliance(\"example\", new()\n    {\n        QueryId = aWSConfigCloudTrailLogFileValidationNotEnabled.LaceworkQueryId,\n        Title = \"Ensure CloudTrail log file validation is enabled\",\n        Enabled = false,\n        Severity = \"High\",\n        Description = @\"CloudTrail log file validation creates a digitally signed digest\nfile containing a hash of each log that CloudTrail writes to S3. These digest\nfiles can be used to determine whether a log file was changed, deleted, or unchanged\nafter CloudTrail delivered the log. It is recommended that file validation be\nenabled on all CloudTrails.\",\n        Remediation = @\"Perform the following to enable log file validation on a given trail:\nFrom Console:\n1. Sign in to the AWS Management Console and open the IAM console at (https://console.aws.amazon.com/cloudtrail)\n2. Click on Trails on the left navigation pane\n3. Click on target trail\n4. Within the S3 section click on the edit icon (pencil)\n5. Click Advanced\n6. Click on the Yes radio button in section Enable log file validation\n7. Click Save\nFrom Command Line:\naws cloudtrail update-trail --name \u003ctrail_name\u003e --enable-log-file-validation\nNote that periodic validation of logs using these digests can be performed by running the following command:\naws cloudtrail validate-logs --trail-arn \u003ctrail_arn\u003e --start-time \u003cstart_time\u003e --end-time \u003cend_time\u003e\",\n        Tags = new[]\n        {\n            \"security:compliance\",\n        },\n        AlertingEnabled = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taWSConfigCloudTrailLogFileValidationNotEnabled, err := lacework.NewQuery(ctx, \"AWS_Config_CloudTrailLogFileValidationNotEnabled\", \u0026lacework.QueryArgs{\n\t\t\tQueryId: pulumi.String(\"LW_Global_AWS_Config_CloudTrailLogFileValidationNotEnabled\"),\n\t\t\tQuery: pulumi.String(`  {\n    source {\n      LW_CFG_AWS_CLOUDTRAIL\n    }\n    filter {\n      RESOURCE_CONFIG:LogFileValidationEnabled = 'false'\n    }\n    return distinct {\n      ACCOUNT_ALIAS,\n      ACCOUNT_ID,\n      ARN as RESOURCE_KEY,\n      RESOURCE_REGION,\n      RESOURCE_TYPE,\n      SERVICE,\n      'CloudTrailLogFileValidationNotEnabled' as COMPLIANCE_FAILURE_REASON\n    }\n  }\n`),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewPolicyCompliance(ctx, \"example\", \u0026lacework.PolicyComplianceArgs{\n\t\t\tQueryId:     aWSConfigCloudTrailLogFileValidationNotEnabled.LaceworkQueryId,\n\t\t\tTitle:       pulumi.String(\"Ensure CloudTrail log file validation is enabled\"),\n\t\t\tEnabled:     pulumi.Bool(false),\n\t\t\tSeverity:    pulumi.String(\"High\"),\n\t\t\tDescription: pulumi.String(\"CloudTrail log file validation creates a digitally signed digest\\nfile containing a hash of each log that CloudTrail writes to S3. These digest\\nfiles can be used to determine whether a log file was changed, deleted, or unchanged\\nafter CloudTrail delivered the log. It is recommended that file validation be\\nenabled on all CloudTrails.\"),\n\t\t\tRemediation: pulumi.String(`Perform the following to enable log file validation on a given trail:\nFrom Console:\n1. Sign in to the AWS Management Console and open the IAM console at (https://console.aws.amazon.com/cloudtrail)\n2. Click on Trails on the left navigation pane\n3. Click on target trail\n4. Within the S3 section click on the edit icon (pencil)\n5. Click Advanced\n6. Click on the Yes radio button in section Enable log file validation\n7. Click Save\nFrom Command Line:\naws cloudtrail update-trail --name \u003ctrail_name\u003e --enable-log-file-validation\nNote that periodic validation of logs using these digests can be performed by running the following command:\naws cloudtrail validate-logs --trail-arn \u003ctrail_arn\u003e --start-time \u003cstart_time\u003e --end-time \u003cend_time\u003e`),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"security:compliance\"),\n\t\t\t},\n\t\t\tAlertingEnabled: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.Query;\nimport com.pulumi.lacework.QueryArgs;\nimport com.pulumi.lacework.PolicyCompliance;\nimport com.pulumi.lacework.PolicyComplianceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var aWSConfigCloudTrailLogFileValidationNotEnabled = new Query(\"aWSConfigCloudTrailLogFileValidationNotEnabled\", QueryArgs.builder()\n            .queryId(\"LW_Global_AWS_Config_CloudTrailLogFileValidationNotEnabled\")\n            .query(\"\"\"\n  {\n    source {\n      LW_CFG_AWS_CLOUDTRAIL\n    }\n    filter {\n      RESOURCE_CONFIG:LogFileValidationEnabled = 'false'\n    }\n    return distinct {\n      ACCOUNT_ALIAS,\n      ACCOUNT_ID,\n      ARN as RESOURCE_KEY,\n      RESOURCE_REGION,\n      RESOURCE_TYPE,\n      SERVICE,\n      'CloudTrailLogFileValidationNotEnabled' as COMPLIANCE_FAILURE_REASON\n    }\n  }\n            \"\"\")\n            .build());\n\n        var example = new PolicyCompliance(\"example\", PolicyComplianceArgs.builder()\n            .queryId(aWSConfigCloudTrailLogFileValidationNotEnabled.laceworkQueryId())\n            .title(\"Ensure CloudTrail log file validation is enabled\")\n            .enabled(false)\n            .severity(\"High\")\n            .description(\"\"\"\nCloudTrail log file validation creates a digitally signed digest\nfile containing a hash of each log that CloudTrail writes to S3. These digest\nfiles can be used to determine whether a log file was changed, deleted, or unchanged\nafter CloudTrail delivered the log. It is recommended that file validation be\nenabled on all CloudTrails.            \"\"\")\n            .remediation(\"\"\"\nPerform the following to enable log file validation on a given trail:\nFrom Console:\n1. Sign in to the AWS Management Console and open the IAM console at (https://console.aws.amazon.com/cloudtrail)\n2. Click on Trails on the left navigation pane\n3. Click on target trail\n4. Within the S3 section click on the edit icon (pencil)\n5. Click Advanced\n6. Click on the Yes radio button in section Enable log file validation\n7. Click Save\nFrom Command Line:\naws cloudtrail update-trail --name \u003ctrail_name\u003e --enable-log-file-validation\nNote that periodic validation of logs using these digests can be performed by running the following command:\naws cloudtrail validate-logs --trail-arn \u003ctrail_arn\u003e --start-time \u003cstart_time\u003e --end-time \u003cend_time\u003e            \"\"\")\n            .tags(\"security:compliance\")\n            .alertingEnabled(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  aWSConfigCloudTrailLogFileValidationNotEnabled:\n    type: lacework:Query\n    name: AWS_Config_CloudTrailLogFileValidationNotEnabled\n    properties:\n      queryId: LW_Global_AWS_Config_CloudTrailLogFileValidationNotEnabled\n      query: |2\n          {\n            source {\n              LW_CFG_AWS_CLOUDTRAIL\n            }\n            filter {\n              RESOURCE_CONFIG:LogFileValidationEnabled = 'false'\n            }\n            return distinct {\n              ACCOUNT_ALIAS,\n              ACCOUNT_ID,\n              ARN as RESOURCE_KEY,\n              RESOURCE_REGION,\n              RESOURCE_TYPE,\n              SERVICE,\n              'CloudTrailLogFileValidationNotEnabled' as COMPLIANCE_FAILURE_REASON\n            }\n          }\n  example:\n    type: lacework:PolicyCompliance\n    properties:\n      queryId: ${aWSConfigCloudTrailLogFileValidationNotEnabled.laceworkQueryId}\n      title: Ensure CloudTrail log file validation is enabled\n      enabled: false\n      severity: High\n      description: |-\n        CloudTrail log file validation creates a digitally signed digest\n        file containing a hash of each log that CloudTrail writes to S3. These digest\n        files can be used to determine whether a log file was changed, deleted, or unchanged\n        after CloudTrail delivered the log. It is recommended that file validation be\n        enabled on all CloudTrails.\n      remediation: |-\n        Perform the following to enable log file validation on a given trail:\n        From Console:\n        1. Sign in to the AWS Management Console and open the IAM console at (https://console.aws.amazon.com/cloudtrail)\n        2. Click on Trails on the left navigation pane\n        3. Click on target trail\n        4. Within the S3 section click on the edit icon (pencil)\n        5. Click Advanced\n        6. Click on the Yes radio button in section Enable log file validation\n        7. Click Save\n        From Command Line:\n        aws cloudtrail update-trail --name \u003ctrail_name\u003e --enable-log-file-validation\n        Note that periodic validation of logs using these digests can be performed by running the following command:\n        aws cloudtrail validate-logs --trail-arn \u003ctrail_arn\u003e --start-time \u003cstart_time\u003e --end-time \u003cend_time\u003e\n      tags:\n        - security:compliance\n      alertingEnabled: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003e **Note:** Lacework automatically generates a policy id when you create a policy, which is the recommended workflow.\nOptionally, you can define your own policy id using the \u003cspan pulumi-lang-nodejs=\"`policyIdSuffix`\" pulumi-lang-dotnet=\"`PolicyIdSuffix`\" pulumi-lang-go=\"`policyIdSuffix`\" pulumi-lang-python=\"`policy_id_suffix`\" pulumi-lang-yaml=\"`policyIdSuffix`\" pulumi-lang-java=\"`policyIdSuffix`\"\u003e`policy_id_suffix`\u003c/span\u003e, this suffix must be all lowercase letters,\noptionally followed by `-` and numbers, for example, `abcd-1234`. When you define your own policy id, Lacework prepends\nthe account name. The final policy id would then be `lwaccountname-abcd-1234`.\n\n## Import\n\nA Lacework compliance policy can be imported using a `POLICY_ID`, e.g.\n\n```sh\n$ pulumi import lacework:index/policyCompliance:PolicyCompliance example YourLQLPolicyID\n```\n-\u003e __Note:__ To retrieve the `POLICY_ID` from existing policies in your account, use the\nLacework CLI command `lacework policy list`. To install this tool follow\n[this documentation](https://docs.lacework.net/cli/).\n\n","properties":{"alertingEnabled":{"type":"boolean","description":"Whether the alerting profile is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n","deprecationMessage":"Deprecated"},"computedTags":{"type":"string","description":"All policy tags, server generated and user specified tags"},"description":{"type":"string","description":"The description of the policy.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"owner":{"type":"string"},"policyIdSuffix":{"type":"string","description":"The string appended to the end of the policy id.\n"},"queryId":{"type":"string","description":"The query id.\n"},"remediation":{"type":"string","description":"The remediation message to display.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of policy tags.\n"},"title":{"type":"string","description":"The policy title.\n"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object","required":["computedTags","description","owner","queryId","remediation","severity","title","updatedBy","updatedTime"],"inputProperties":{"alertingEnabled":{"type":"boolean","description":"Whether the alerting profile is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n","deprecationMessage":"Deprecated"},"description":{"type":"string","description":"The description of the policy.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"policyIdSuffix":{"type":"string","description":"The string appended to the end of the policy id.\n"},"queryId":{"type":"string","description":"The query id.\n"},"remediation":{"type":"string","description":"The remediation message to display.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of policy tags.\n"},"title":{"type":"string","description":"The policy title.\n"}},"requiredInputs":["description","queryId","remediation","severity","title"],"stateInputs":{"description":"Input properties used for looking up and filtering PolicyCompliance resources.\n","properties":{"alertingEnabled":{"type":"boolean","description":"Whether the alerting profile is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n","deprecationMessage":"Deprecated"},"computedTags":{"type":"string","description":"All policy tags, server generated and user specified tags"},"description":{"type":"string","description":"The description of the policy.\n"},"enabled":{"type":"boolean","description":"Whether the policy is enabled or disabled. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"owner":{"type":"string"},"policyIdSuffix":{"type":"string","description":"The string appended to the end of the policy id.\n"},"queryId":{"type":"string","description":"The query id.\n"},"remediation":{"type":"string","description":"The remediation message to display.\n"},"severity":{"type":"string","description":"The list of the severities. Valid severities include:\n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"tags":{"type":"array","items":{"type":"string"},"description":"A list of policy tags.\n"},"title":{"type":"string","description":"The policy title.\n"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object"}},"lacework:index/policyException:PolicyException":{"description":"Add exceptions to Lacework policies\n\nFor more information, see the [Adding Exceptions to a Policy](https://docs.lacework.com/add-exception-to-LQL-policy-lw-console).\n\n## Example Usage\n\nCreate a Lacework Policy Exception to exempt specified aws account from policy.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.PolicyException(\"example\", {\n    policyId: \"lacework-global-73\",\n    description: \"Exception for account 123456789\",\n    constraints: [{\n        fieldKey: \"accountIds\",\n        fieldValues: [\"123456789\"],\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.PolicyException(\"example\",\n    policy_id=\"lacework-global-73\",\n    description=\"Exception for account 123456789\",\n    constraints=[{\n        \"field_key\": \"accountIds\",\n        \"field_values\": [\"123456789\"],\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.PolicyException(\"example\", new()\n    {\n        PolicyId = \"lacework-global-73\",\n        Description = \"Exception for account 123456789\",\n        Constraints = new[]\n        {\n            new Lacework.Inputs.PolicyExceptionConstraintArgs\n            {\n                FieldKey = \"accountIds\",\n                FieldValues = new[]\n                {\n                    \"123456789\",\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewPolicyException(ctx, \"example\", \u0026lacework.PolicyExceptionArgs{\n\t\t\tPolicyId:    pulumi.String(\"lacework-global-73\"),\n\t\t\tDescription: pulumi.String(\"Exception for account 123456789\"),\n\t\t\tConstraints: lacework.PolicyExceptionConstraintArray{\n\t\t\t\t\u0026lacework.PolicyExceptionConstraintArgs{\n\t\t\t\t\tFieldKey: pulumi.String(\"accountIds\"),\n\t\t\t\t\tFieldValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"123456789\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.PolicyException;\nimport com.pulumi.lacework.PolicyExceptionArgs;\nimport com.pulumi.lacework.inputs.PolicyExceptionConstraintArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new PolicyException(\"example\", PolicyExceptionArgs.builder()\n            .policyId(\"lacework-global-73\")\n            .description(\"Exception for account 123456789\")\n            .constraints(PolicyExceptionConstraintArgs.builder()\n                .fieldKey(\"accountIds\")\n                .fieldValues(\"123456789\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:PolicyException\n    properties:\n      policyId: lacework-global-73\n      description: Exception for account 123456789\n      constraints:\n        - fieldKey: accountIds\n          fieldValues:\n            - '123456789'\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\nCreate a Lacework Policy Exception to exempt specified `resourceTags` from policy.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.PolicyException(\"example\", {\n    policyId: \"lacework-global-73\",\n    description: \"Exception for resource tag example1 and example2\",\n    constraints: [{\n        fieldKey: \"resourceTags\",\n        fieldValuesMaps: [\n            {\n                key: \"example_tag1\",\n                values: [\n                    \"example_value\",\n                    \"example_value1\",\n                ],\n            },\n            {\n                key: \"example_tag2\",\n                values: [\n                    \"example_value\",\n                    \"example_value1\",\n                ],\n            },\n        ],\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.PolicyException(\"example\",\n    policy_id=\"lacework-global-73\",\n    description=\"Exception for resource tag example1 and example2\",\n    constraints=[{\n        \"field_key\": \"resourceTags\",\n        \"field_values_maps\": [\n            {\n                \"key\": \"example_tag1\",\n                \"values\": [\n                    \"example_value\",\n                    \"example_value1\",\n                ],\n            },\n            {\n                \"key\": \"example_tag2\",\n                \"values\": [\n                    \"example_value\",\n                    \"example_value1\",\n                ],\n            },\n        ],\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.PolicyException(\"example\", new()\n    {\n        PolicyId = \"lacework-global-73\",\n        Description = \"Exception for resource tag example1 and example2\",\n        Constraints = new[]\n        {\n            new Lacework.Inputs.PolicyExceptionConstraintArgs\n            {\n                FieldKey = \"resourceTags\",\n                FieldValuesMaps = new[]\n                {\n                    new Lacework.Inputs.PolicyExceptionConstraintFieldValuesMapArgs\n                    {\n                        Key = \"example_tag1\",\n                        Values = new[]\n                        {\n                            \"example_value\",\n                            \"example_value1\",\n                        },\n                    },\n                    new Lacework.Inputs.PolicyExceptionConstraintFieldValuesMapArgs\n                    {\n                        Key = \"example_tag2\",\n                        Values = new[]\n                        {\n                            \"example_value\",\n                            \"example_value1\",\n                        },\n                    },\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewPolicyException(ctx, \"example\", \u0026lacework.PolicyExceptionArgs{\n\t\t\tPolicyId:    pulumi.String(\"lacework-global-73\"),\n\t\t\tDescription: pulumi.String(\"Exception for resource tag example1 and example2\"),\n\t\t\tConstraints: lacework.PolicyExceptionConstraintArray{\n\t\t\t\t\u0026lacework.PolicyExceptionConstraintArgs{\n\t\t\t\t\tFieldKey: pulumi.String(\"resourceTags\"),\n\t\t\t\t\tFieldValuesMaps: lacework.PolicyExceptionConstraintFieldValuesMapArray{\n\t\t\t\t\t\t\u0026lacework.PolicyExceptionConstraintFieldValuesMapArgs{\n\t\t\t\t\t\t\tKey: pulumi.String(\"example_tag1\"),\n\t\t\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\t\t\tpulumi.String(\"example_value\"),\n\t\t\t\t\t\t\t\tpulumi.String(\"example_value1\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\u0026lacework.PolicyExceptionConstraintFieldValuesMapArgs{\n\t\t\t\t\t\t\tKey: pulumi.String(\"example_tag2\"),\n\t\t\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\t\t\tpulumi.String(\"example_value\"),\n\t\t\t\t\t\t\t\tpulumi.String(\"example_value1\"),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.PolicyException;\nimport com.pulumi.lacework.PolicyExceptionArgs;\nimport com.pulumi.lacework.inputs.PolicyExceptionConstraintArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new PolicyException(\"example\", PolicyExceptionArgs.builder()\n            .policyId(\"lacework-global-73\")\n            .description(\"Exception for resource tag example1 and example2\")\n            .constraints(PolicyExceptionConstraintArgs.builder()\n                .fieldKey(\"resourceTags\")\n                .fieldValuesMaps(                \n                    PolicyExceptionConstraintFieldValuesMapArgs.builder()\n                        .key(\"example_tag1\")\n                        .values(                        \n                            \"example_value\",\n                            \"example_value1\")\n                        .build(),\n                    PolicyExceptionConstraintFieldValuesMapArgs.builder()\n                        .key(\"example_tag2\")\n                        .values(                        \n                            \"example_value\",\n                            \"example_value1\")\n                        .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:PolicyException\n    properties:\n      policyId: lacework-global-73\n      description: Exception for resource tag example1 and example2\n      constraints:\n        - fieldKey: resourceTags\n          fieldValuesMaps:\n            - key: example_tag1\n              values:\n                - example_value\n                - example_value1\n            - key: example_tag2\n              values:\n                - example_value\n                - example_value1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework policy can be imported using a `POLICY_ID` and `EXCEPTION_ID`, e.g.\n\n```sh\n$ pulumi import lacework:index/policyException:PolicyException example YourLQLPolicyID YourExceptionID\n```\n\n","properties":{"constraints":{"type":"array","items":{"$ref":"#/types/lacework:index%2FPolicyExceptionConstraint:PolicyExceptionConstraint"},"description":"Constraint. See Constraint below for details.\n"},"description":{"type":"string","description":"The description of the policy exception.\n"},"policyId":{"type":"string","description":"The id of the policy the exception is associated.\n"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object","required":["constraints","description","policyId","updatedBy","updatedTime"],"inputProperties":{"constraints":{"type":"array","items":{"$ref":"#/types/lacework:index%2FPolicyExceptionConstraint:PolicyExceptionConstraint"},"description":"Constraint. See Constraint below for details.\n"},"description":{"type":"string","description":"The description of the policy exception.\n"},"policyId":{"type":"string","description":"The id of the policy the exception is associated.\n"}},"requiredInputs":["constraints","description","policyId"],"stateInputs":{"description":"Input properties used for looking up and filtering PolicyException resources.\n","properties":{"constraints":{"type":"array","items":{"$ref":"#/types/lacework:index%2FPolicyExceptionConstraint:PolicyExceptionConstraint"},"description":"Constraint. See Constraint below for details.\n"},"description":{"type":"string","description":"The description of the policy exception.\n"},"policyId":{"type":"string","description":"The id of the policy the exception is associated.\n"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object"}},"lacework:index/query:Query":{"description":"To provide customizable specification of datasources, Lacework provides the Lacework Query Language (LQL). \nLQL is a human-readable text syntax for specifying selection, filtering, and manipulation of data. \nIt overlaps with SQL in its syntax and what it allows.\n\nFor more information, see the [LQL Overview Documentation](https://docs.lacework.com/lql-overview).\n\n## Example Usage\n\nQuery all EC2 instances with public IP addresses.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.Query(\"example\", {\n    queryId: \"TF_AWS_Config_EC2InstanceWithPublicIPAddress\",\n    query: `  {\n      source {\n          LW_CFG_AWS_EC2_INSTANCES\n      }\n      filter {\n          value_exists(RESOURCE_CONFIG:PublicIpAddress)\n      }\n      return distinct {\n          ACCOUNT_ALIAS,\n          ACCOUNT_ID,\n          ARN as RESOURCE_KEY,\n          RESOURCE_REGION,\n          RESOURCE_TYPE,\n          SERVICE,\n          case when RESOURCE_TYPE = 'ec2:instance' then 'HasPublicIp'\n          end as COMPLIANCE_FAILURE_REASON\n      }\n  }\n`,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.Query(\"example\",\n    query_id=\"TF_AWS_Config_EC2InstanceWithPublicIPAddress\",\n    query=\"\"\"  {\n      source {\n          LW_CFG_AWS_EC2_INSTANCES\n      }\n      filter {\n          value_exists(RESOURCE_CONFIG:PublicIpAddress)\n      }\n      return distinct {\n          ACCOUNT_ALIAS,\n          ACCOUNT_ID,\n          ARN as RESOURCE_KEY,\n          RESOURCE_REGION,\n          RESOURCE_TYPE,\n          SERVICE,\n          case when RESOURCE_TYPE = 'ec2:instance' then 'HasPublicIp'\n          end as COMPLIANCE_FAILURE_REASON\n      }\n  }\n\"\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.Query(\"example\", new()\n    {\n        QueryId = \"TF_AWS_Config_EC2InstanceWithPublicIPAddress\",\n        Query = @\"  {\n      source {\n          LW_CFG_AWS_EC2_INSTANCES\n      }\n      filter {\n          value_exists(RESOURCE_CONFIG:PublicIpAddress)\n      }\n      return distinct {\n          ACCOUNT_ALIAS,\n          ACCOUNT_ID,\n          ARN as RESOURCE_KEY,\n          RESOURCE_REGION,\n          RESOURCE_TYPE,\n          SERVICE,\n          case when RESOURCE_TYPE = 'ec2:instance' then 'HasPublicIp'\n          end as COMPLIANCE_FAILURE_REASON\n      }\n  }\n\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewQuery(ctx, \"example\", \u0026lacework.QueryArgs{\n\t\t\tQueryId: pulumi.String(\"TF_AWS_Config_EC2InstanceWithPublicIPAddress\"),\n\t\t\tQuery: pulumi.String(`  {\n      source {\n          LW_CFG_AWS_EC2_INSTANCES\n      }\n      filter {\n          value_exists(RESOURCE_CONFIG:PublicIpAddress)\n      }\n      return distinct {\n          ACCOUNT_ALIAS,\n          ACCOUNT_ID,\n          ARN as RESOURCE_KEY,\n          RESOURCE_REGION,\n          RESOURCE_TYPE,\n          SERVICE,\n          case when RESOURCE_TYPE = 'ec2:instance' then 'HasPublicIp'\n          end as COMPLIANCE_FAILURE_REASON\n      }\n  }\n`),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.Query;\nimport com.pulumi.lacework.QueryArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new Query(\"example\", QueryArgs.builder()\n            .queryId(\"TF_AWS_Config_EC2InstanceWithPublicIPAddress\")\n            .query(\"\"\"\n  {\n      source {\n          LW_CFG_AWS_EC2_INSTANCES\n      }\n      filter {\n          value_exists(RESOURCE_CONFIG:PublicIpAddress)\n      }\n      return distinct {\n          ACCOUNT_ALIAS,\n          ACCOUNT_ID,\n          ARN as RESOURCE_KEY,\n          RESOURCE_REGION,\n          RESOURCE_TYPE,\n          SERVICE,\n          case when RESOURCE_TYPE = 'ec2:instance' then 'HasPublicIp'\n          end as COMPLIANCE_FAILURE_REASON\n      }\n  }\n            \"\"\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:Query\n    properties:\n      queryId: TF_AWS_Config_EC2InstanceWithPublicIPAddress\n      query: |2\n          {\n              source {\n                  LW_CFG_AWS_EC2_INSTANCES\n              }\n              filter {\n                  value_exists(RESOURCE_CONFIG:PublicIpAddress)\n              }\n              return distinct {\n                  ACCOUNT_ALIAS,\n                  ACCOUNT_ID,\n                  ARN as RESOURCE_KEY,\n                  RESOURCE_REGION,\n                  RESOURCE_TYPE,\n                  SERVICE,\n                  case when RESOURCE_TYPE = 'ec2:instance' then 'HasPublicIp'\n                  end as COMPLIANCE_FAILURE_REASON\n              }\n          }\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nQuery CloudTrail events and filter only S3 buckets with ACL 'public-read', 'public-read-write' or 'authenticated-read'.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.Query(\"example\", {\n    queryId: \"TF_AWS_CTA_S3PublicACLCreated\",\n    query: `  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 's3.amazonaws.com'\n          and EVENT_NAME = 'CreateBucket'\n          and EVENT:requestParameters.\\\\\"x-amz-acl\\\\\"\n          in ('public-read', 'public-read-write', 'authenticated-read')\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n`,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.Query(\"example\",\n    query_id=\"TF_AWS_CTA_S3PublicACLCreated\",\n    query=\"\"\"  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 's3.amazonaws.com'\n          and EVENT_NAME = 'CreateBucket'\n          and EVENT:requestParameters.\\\"x-amz-acl\\\"\n          in ('public-read', 'public-read-write', 'authenticated-read')\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n\"\"\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.Query(\"example\", new()\n    {\n        QueryId = \"TF_AWS_CTA_S3PublicACLCreated\",\n        Query = @\"  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 's3.amazonaws.com'\n          and EVENT_NAME = 'CreateBucket'\n          and EVENT:requestParameters.\\\"\"x-amz-acl\\\"\"\n          in ('public-read', 'public-read-write', 'authenticated-read')\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewQuery(ctx, \"example\", \u0026lacework.QueryArgs{\n\t\t\tQueryId: pulumi.String(\"TF_AWS_CTA_S3PublicACLCreated\"),\n\t\t\tQuery: pulumi.String(`  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 's3.amazonaws.com'\n          and EVENT_NAME = 'CreateBucket'\n          and EVENT:requestParameters.\\\"x-amz-acl\\\"\n          in ('public-read', 'public-read-write', 'authenticated-read')\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n`),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.Query;\nimport com.pulumi.lacework.QueryArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new Query(\"example\", QueryArgs.builder()\n            .queryId(\"TF_AWS_CTA_S3PublicACLCreated\")\n            .query(\"\"\"\n  {\n      source {\n          CloudTrailRawEvents\n      }\n      filter {\n          EVENT_SOURCE = 's3.amazonaws.com'\n          and EVENT_NAME = 'CreateBucket'\n          and EVENT:requestParameters.\\\"x-amz-acl\\\"\n          in ('public-read', 'public-read-write', 'authenticated-read')\n          and ERROR_CODE is null\n      }\n      return distinct {\n          INSERT_ID,\n          INSERT_TIME,\n          EVENT_TIME,\n          EVENT\n      }\n  }\n            \"\"\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:Query\n    properties:\n      queryId: TF_AWS_CTA_S3PublicACLCreated\n      query: |2\n          {\n              source {\n                  CloudTrailRawEvents\n              }\n              filter {\n                  EVENT_SOURCE = 's3.amazonaws.com'\n                  and EVENT_NAME = 'CreateBucket'\n                  and EVENT:requestParameters.\\\"x-amz-acl\\\"\n                  in ('public-read', 'public-read-write', 'authenticated-read')\n                  and ERROR_CODE is null\n              }\n              return distinct {\n                  INSERT_ID,\n                  INSERT_TIME,\n                  EVENT_TIME,\n                  EVENT\n              }\n          }\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework query can be imported using a `QUERY_ID`, e.g.\n\n```sh\n$ pulumi import lacework:index/query:Query example YourLQLQueryID\n```\n-\u003e __Note:__ To retrieve the `QUERY_ID` from existing queries in your account, use the\nLacework CLI command `lacework query list`. To install this tool follow\n[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"laceworkQueryId":{"type":"string"},"owner":{"type":"string"},"query":{"type":"string","description":"The query string.\n"},"queryId":{"type":"string","description":"The query id.\n"},"resultSchema":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object","required":["laceworkQueryId","owner","query","queryId","resultSchema","updatedBy","updatedTime"],"inputProperties":{"laceworkQueryId":{"type":"string"},"query":{"type":"string","description":"The query string.\n"},"queryId":{"type":"string","description":"The query id.\n"}},"requiredInputs":["query","queryId"],"stateInputs":{"description":"Input properties used for looking up and filtering Query resources.\n","properties":{"laceworkQueryId":{"type":"string"},"owner":{"type":"string"},"query":{"type":"string","description":"The query string.\n"},"queryId":{"type":"string","description":"The query id.\n"},"resultSchema":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object"}},"lacework:index/reportRule:ReportRule":{"description":"Use this resource to create a Lacework Report Rule in order to route reports to one or more email alert channels.\nFor more information, see the [Report Rules documentation](https://docs.lacework.com/report-rules).\n\n## Example Usage\n\n### Report Rule with Aws Compliance Reports\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst teamEmail = new lacework.index.ReportChannelEmail(\"team_email\", {\n    name: \"Team Emails\",\n    recipients: [\n        \"foo@example.com\",\n        \"bar@example.com\",\n    ],\n});\nconst example = new lacework.ReportRule(\"example\", {\n    name: \"My Report Rule\",\n    description: \"This is an example report rule\",\n    emailAlertChannels: [teamEmail.id],\n    severities: [\n        \"Critical\",\n        \"High\",\n    ],\n    awsComplianceReports: {\n        cisS3: true,\n    },\n    weeklySnapshot: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nteam_email = lacework.index.ReportChannelEmail(\"team_email\",\n    name=Team Emails,\n    recipients=[\n        foo@example.com,\n        bar@example.com,\n    ])\nexample = lacework.ReportRule(\"example\",\n    name=\"My Report Rule\",\n    description=\"This is an example report rule\",\n    email_alert_channels=[team_email[\"id\"]],\n    severities=[\n        \"Critical\",\n        \"High\",\n    ],\n    aws_compliance_reports={\n        \"cis_s3\": True,\n    },\n    weekly_snapshot=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var teamEmail = new Lacework.Index.ReportChannelEmail(\"team_email\", new()\n    {\n        Name = \"Team Emails\",\n        Recipients = new[]\n        {\n            \"foo@example.com\",\n            \"bar@example.com\",\n        },\n    });\n\n    var example = new Lacework.ReportRule(\"example\", new()\n    {\n        Name = \"My Report Rule\",\n        Description = \"This is an example report rule\",\n        EmailAlertChannels = new[]\n        {\n            teamEmail.Id,\n        },\n        Severities = new[]\n        {\n            \"Critical\",\n            \"High\",\n        },\n        AwsComplianceReports = new Lacework.Inputs.ReportRuleAwsComplianceReportsArgs\n        {\n            CisS3 = true,\n        },\n        WeeklySnapshot = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tteamEmail, err := lacework.NewReportChannelEmail(ctx, \"team_email\", \u0026lacework.ReportChannelEmailArgs{\n\t\t\tName: \"Team Emails\",\n\t\t\tRecipients: []string{\n\t\t\t\t\"foo@example.com\",\n\t\t\t\t\"bar@example.com\",\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewReportRule(ctx, \"example\", \u0026lacework.ReportRuleArgs{\n\t\t\tName:        pulumi.String(\"My Report Rule\"),\n\t\t\tDescription: pulumi.String(\"This is an example report rule\"),\n\t\t\tEmailAlertChannels: pulumi.StringArray{\n\t\t\t\tteamEmail.Id,\n\t\t\t},\n\t\t\tSeverities: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Critical\"),\n\t\t\t\tpulumi.String(\"High\"),\n\t\t\t},\n\t\t\tAwsComplianceReports: \u0026lacework.ReportRuleAwsComplianceReportsArgs{\n\t\t\t\tCisS3: pulumi.Bool(true),\n\t\t\t},\n\t\t\tWeeklySnapshot: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.ReportChannelEmail;\nimport com.pulumi.lacework.ReportChannelEmailArgs;\nimport com.pulumi.lacework.ReportRule;\nimport com.pulumi.lacework.ReportRuleArgs;\nimport com.pulumi.lacework.inputs.ReportRuleAwsComplianceReportsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var teamEmail = new ReportChannelEmail(\"teamEmail\", ReportChannelEmailArgs.builder()\n            .name(\"Team Emails\")\n            .recipients(List.of(            \n                \"foo@example.com\",\n                \"bar@example.com\"))\n            .build());\n\n        var example = new ReportRule(\"example\", ReportRuleArgs.builder()\n            .name(\"My Report Rule\")\n            .description(\"This is an example report rule\")\n            .emailAlertChannels(teamEmail.id())\n            .severities(            \n                \"Critical\",\n                \"High\")\n            .awsComplianceReports(ReportRuleAwsComplianceReportsArgs.builder()\n                .cisS3(true)\n                .build())\n            .weeklySnapshot(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  teamEmail:\n    type: lacework:ReportChannelEmail\n    name: team_email\n    properties:\n      name: Team Emails\n      recipients:\n        - foo@example.com\n        - bar@example.com\n  example:\n    type: lacework:ReportRule\n    properties:\n      name: My Report Rule\n      description: This is an example report rule\n      emailAlertChannels:\n        - ${teamEmail.id}\n      severities:\n        - Critical\n        - High\n      awsComplianceReports:\n        cisS3: true\n      weeklySnapshot: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Report Rule with Gcp Compliance Reports and Gcp Resource Group\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst teamEmail = new lacework.AlertChannelEmail(\"team_email\", {\n    name: \"Team Emails\",\n    recipients: [\n        \"foo@example.com\",\n        \"bar@example.com\",\n    ],\n});\nconst allGcpProjects = new lacework.index.ResourceGroupGcp(\"all_gcp_projects\", {\n    name: \"GCP Resource Group\",\n    description: \"All Gcp Projects\",\n    organization: \"MyGcpOrg\",\n    projects: [\"*\"],\n});\nconst example = new lacework.ReportRule(\"example\", {\n    name: \"My Report Rule\",\n    description: \"This is an example report rule\",\n    emailAlertChannels: [teamEmailLaceworkReportChannelEmail.id],\n    resourceGroups: [allGcpProjects.id],\n    severities: [\"Critical\"],\n    gcpComplianceReports: {\n        k8s: true,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nteam_email = lacework.AlertChannelEmail(\"team_email\",\n    name=\"Team Emails\",\n    recipients=[\n        \"foo@example.com\",\n        \"bar@example.com\",\n    ])\nall_gcp_projects = lacework.index.ResourceGroupGcp(\"all_gcp_projects\",\n    name=GCP Resource Group,\n    description=All Gcp Projects,\n    organization=MyGcpOrg,\n    projects=[*])\nexample = lacework.ReportRule(\"example\",\n    name=\"My Report Rule\",\n    description=\"This is an example report rule\",\n    email_alert_channels=[team_email_lacework_report_channel_email[\"id\"]],\n    resource_groups=[all_gcp_projects[\"id\"]],\n    severities=[\"Critical\"],\n    gcp_compliance_reports={\n        \"k8s\": True,\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var teamEmail = new Lacework.AlertChannelEmail(\"team_email\", new()\n    {\n        Name = \"Team Emails\",\n        Recipients = new[]\n        {\n            \"foo@example.com\",\n            \"bar@example.com\",\n        },\n    });\n\n    var allGcpProjects = new Lacework.Index.ResourceGroupGcp(\"all_gcp_projects\", new()\n    {\n        Name = \"GCP Resource Group\",\n        Description = \"All Gcp Projects\",\n        Organization = \"MyGcpOrg\",\n        Projects = new[]\n        {\n            \"*\",\n        },\n    });\n\n    var example = new Lacework.ReportRule(\"example\", new()\n    {\n        Name = \"My Report Rule\",\n        Description = \"This is an example report rule\",\n        EmailAlertChannels = new[]\n        {\n            teamEmailLaceworkReportChannelEmail.Id,\n        },\n        ResourceGroups = new[]\n        {\n            allGcpProjects.Id,\n        },\n        Severities = new[]\n        {\n            \"Critical\",\n        },\n        GcpComplianceReports = new Lacework.Inputs.ReportRuleGcpComplianceReportsArgs\n        {\n            K8s = true,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewAlertChannelEmail(ctx, \"team_email\", \u0026lacework.AlertChannelEmailArgs{\n\t\t\tName: pulumi.String(\"Team Emails\"),\n\t\t\tRecipients: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo@example.com\"),\n\t\t\t\tpulumi.String(\"bar@example.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tallGcpProjects, err := lacework.NewResourceGroupGcp(ctx, \"all_gcp_projects\", \u0026lacework.ResourceGroupGcpArgs{\n\t\t\tName:         \"GCP Resource Group\",\n\t\t\tDescription:  \"All Gcp Projects\",\n\t\t\tOrganization: \"MyGcpOrg\",\n\t\t\tProjects: []string{\n\t\t\t\t\"*\",\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = lacework.NewReportRule(ctx, \"example\", \u0026lacework.ReportRuleArgs{\n\t\t\tName:        pulumi.String(\"My Report Rule\"),\n\t\t\tDescription: pulumi.String(\"This is an example report rule\"),\n\t\t\tEmailAlertChannels: pulumi.StringArray{\n\t\t\t\tteamEmailLaceworkReportChannelEmail.Id,\n\t\t\t},\n\t\t\tResourceGroups: pulumi.StringArray{\n\t\t\t\tallGcpProjects.Id,\n\t\t\t},\n\t\t\tSeverities: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Critical\"),\n\t\t\t},\n\t\t\tGcpComplianceReports: \u0026lacework.ReportRuleGcpComplianceReportsArgs{\n\t\t\t\tK8s: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.AlertChannelEmail;\nimport com.pulumi.lacework.AlertChannelEmailArgs;\nimport com.pulumi.lacework.ResourceGroupGcp;\nimport com.pulumi.lacework.ResourceGroupGcpArgs;\nimport com.pulumi.lacework.ReportRule;\nimport com.pulumi.lacework.ReportRuleArgs;\nimport com.pulumi.lacework.inputs.ReportRuleGcpComplianceReportsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var teamEmail = new AlertChannelEmail(\"teamEmail\", AlertChannelEmailArgs.builder()\n            .name(\"Team Emails\")\n            .recipients(            \n                \"foo@example.com\",\n                \"bar@example.com\")\n            .build());\n\n        var allGcpProjects = new ResourceGroupGcp(\"allGcpProjects\", ResourceGroupGcpArgs.builder()\n            .name(\"GCP Resource Group\")\n            .description(\"All Gcp Projects\")\n            .organization(\"MyGcpOrg\")\n            .projects(List.of(\"*\"))\n            .build());\n\n        var example = new ReportRule(\"example\", ReportRuleArgs.builder()\n            .name(\"My Report Rule\")\n            .description(\"This is an example report rule\")\n            .emailAlertChannels(teamEmailLaceworkReportChannelEmail.id())\n            .resourceGroups(allGcpProjects.id())\n            .severities(\"Critical\")\n            .gcpComplianceReports(ReportRuleGcpComplianceReportsArgs.builder()\n                .k8s(true)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  teamEmail:\n    type: lacework:AlertChannelEmail\n    name: team_email\n    properties:\n      name: Team Emails\n      recipients:\n        - foo@example.com\n        - bar@example.com\n  allGcpProjects:\n    type: lacework:ResourceGroupGcp\n    name: all_gcp_projects\n    properties:\n      name: GCP Resource Group\n      description: All Gcp Projects\n      organization: MyGcpOrg\n      projects:\n        - '*'\n  example:\n    type: lacework:ReportRule\n    properties:\n      name: My Report Rule\n      description: This is an example report rule\n      emailAlertChannels:\n        - ${teamEmailLaceworkReportChannelEmail.id}\n      resourceGroups:\n        - ${allGcpProjects.id}\n      severities:\n        - Critical\n      gcpComplianceReports:\n        k8s: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework Report Rule can be imported using a `GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/reportRule:ReportRule example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n","properties":{"awsComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleAwsComplianceReports:ReportRuleAwsComplianceReports","description":"Compliance reports for Aws. See Aws Compliance Reports below for details.\n"},"azureComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleAzureComplianceReports:ReportRuleAzureComplianceReports","description":"Compliance reports for Azure. See Azure Compliance Reports below for details.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"dailyComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleDailyComplianceReports:ReportRuleDailyComplianceReports","description":"Daily event summary reports. See Daily Compliance Reports below for details.\n"},"description":{"type":"string","description":"The description of the report rule.\n"},"emailAlertChannels":{"type":"array","items":{"type":"string"},"description":"The list of email alert channels for the rule to use.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"gcpComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleGcpComplianceReports:ReportRuleGcpComplianceReports","description":"Compliance reports for Gcp. See Gcp Compliance Reports below for details.\n"},"guid":{"type":"string"},"name":{"type":"string","description":"The report rule name.\n"},"reportRuleId":{"type":"string"},"resourceGroups":{"type":"array","items":{"type":"string"},"description":"The list of resource groups the rule will apply to.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of the severities that the rule will apply. Valid severities include: \n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"type":{"type":"string"},"weeklySnapshot":{"type":"boolean","description":"A weekly compliance trend report for all monitored resources. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object","required":["createdOrUpdatedBy","createdOrUpdatedTime","emailAlertChannels","guid","name","reportRuleId","severities","type"],"inputProperties":{"awsComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleAwsComplianceReports:ReportRuleAwsComplianceReports","description":"Compliance reports for Aws. See Aws Compliance Reports below for details.\n"},"azureComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleAzureComplianceReports:ReportRuleAzureComplianceReports","description":"Compliance reports for Azure. See Azure Compliance Reports below for details.\n"},"dailyComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleDailyComplianceReports:ReportRuleDailyComplianceReports","description":"Daily event summary reports. See Daily Compliance Reports below for details.\n"},"description":{"type":"string","description":"The description of the report rule.\n"},"emailAlertChannels":{"type":"array","items":{"type":"string"},"description":"The list of email alert channels for the rule to use.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"gcpComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleGcpComplianceReports:ReportRuleGcpComplianceReports","description":"Compliance reports for Gcp. See Gcp Compliance Reports below for details.\n"},"name":{"type":"string","description":"The report rule name.\n"},"reportRuleId":{"type":"string"},"resourceGroups":{"type":"array","items":{"type":"string"},"description":"The list of resource groups the rule will apply to.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of the severities that the rule will apply. Valid severities include: \n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"weeklySnapshot":{"type":"boolean","description":"A weekly compliance trend report for all monitored resources. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"requiredInputs":["emailAlertChannels","severities"],"stateInputs":{"description":"Input properties used for looking up and filtering ReportRule resources.\n","properties":{"awsComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleAwsComplianceReports:ReportRuleAwsComplianceReports","description":"Compliance reports for Aws. See Aws Compliance Reports below for details.\n"},"azureComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleAzureComplianceReports:ReportRuleAzureComplianceReports","description":"Compliance reports for Azure. See Azure Compliance Reports below for details.\n"},"createdOrUpdatedBy":{"type":"string"},"createdOrUpdatedTime":{"type":"string"},"dailyComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleDailyComplianceReports:ReportRuleDailyComplianceReports","description":"Daily event summary reports. See Daily Compliance Reports below for details.\n"},"description":{"type":"string","description":"The description of the report rule.\n"},"emailAlertChannels":{"type":"array","items":{"type":"string"},"description":"The list of email alert channels for the rule to use.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"gcpComplianceReports":{"$ref":"#/types/lacework:index%2FReportRuleGcpComplianceReports:ReportRuleGcpComplianceReports","description":"Compliance reports for Gcp. See Gcp Compliance Reports below for details.\n"},"guid":{"type":"string"},"name":{"type":"string","description":"The report rule name.\n"},"reportRuleId":{"type":"string"},"resourceGroups":{"type":"array","items":{"type":"string"},"description":"The list of resource groups the rule will apply to.\n"},"severities":{"type":"array","items":{"type":"string"},"description":"The list of the severities that the rule will apply. Valid severities include: \n`Critical`, `High`, `Medium`, `Low` and `Info`.\n"},"type":{"type":"string"},"weeklySnapshot":{"type":"boolean","description":"A weekly compliance trend report for all monitored resources. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"}},"type":"object"}},"lacework:index/resourceGroup:ResourceGroup":{"description":"\n\n## Import\n\nYou can import a Lacework resource group by `RESOURCE_GROUP_GUID`, for example:\n\n```sh\n$ pulumi import lacework:index/resourceGroup:ResourceGroup example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `RESOURCE_GROUP_GUID` from existing resource groups in your account,\nuse the Lacework CLI command `lacework resource-group list`. To install this tool follow\n[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"description":{"type":"string","description":"The description of the resource group.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groups":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroup:ResourceGroupGroup"},"description":"The representation of the expression that a resource must match to be \npart of the resource group. Groups can be nested up to 3 levels deep and can be combined by\nindividual filters. See the [api-docs](https://docs.fortinet.com/document/lacework-forticnapp/latest/api-reference/690087/using-the-resource-groups-api#filterable-fields) for the supported fields.\nEach \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e must have at least one of \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`filter`\" pulumi-lang-dotnet=\"`Filter`\" pulumi-lang-go=\"`filter`\" pulumi-lang-python=\"`filter`\" pulumi-lang-yaml=\"`filter`\" pulumi-lang-java=\"`filter`\"\u003e`filter`\u003c/span\u003e defined.\n"},"isDefault":{"type":"boolean","description":"Whether the resource group is a default resource group."},"lastUpdated":{"type":"string","description":"The time in millis when the resource was last updated"},"name":{"type":"string","description":"The resource group name.\n"},"type":{"type":"string","description":"The type of resource group being created, AWS, GCP, or AZURE\n"},"updatedBy":{"type":"string","description":"The username of the lacework user who performed the last update"}},"type":"object","required":["enabled","groups","isDefault","lastUpdated","name","type","updatedBy"],"inputProperties":{"description":{"type":"string","description":"The description of the resource group.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groups":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroup:ResourceGroupGroup"},"description":"The representation of the expression that a resource must match to be \npart of the resource group. Groups can be nested up to 3 levels deep and can be combined by\nindividual filters. See the [api-docs](https://docs.fortinet.com/document/lacework-forticnapp/latest/api-reference/690087/using-the-resource-groups-api#filterable-fields) for the supported fields.\nEach \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e must have at least one of \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`filter`\" pulumi-lang-dotnet=\"`Filter`\" pulumi-lang-go=\"`filter`\" pulumi-lang-python=\"`filter`\" pulumi-lang-yaml=\"`filter`\" pulumi-lang-java=\"`filter`\"\u003e`filter`\u003c/span\u003e defined.\n"},"name":{"type":"string","description":"The resource group name.\n"},"type":{"type":"string","description":"The type of resource group being created, AWS, GCP, or AZURE\n"}},"requiredInputs":["groups","type"],"stateInputs":{"description":"Input properties used for looking up and filtering ResourceGroup resources.\n","properties":{"description":{"type":"string","description":"The description of the resource group.\n"},"enabled":{"type":"boolean","description":"The state of the external integration. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"groups":{"type":"array","items":{"$ref":"#/types/lacework:index%2FResourceGroupGroup:ResourceGroupGroup"},"description":"The representation of the expression that a resource must match to be \npart of the resource group. Groups can be nested up to 3 levels deep and can be combined by\nindividual filters. See the [api-docs](https://docs.fortinet.com/document/lacework-forticnapp/latest/api-reference/690087/using-the-resource-groups-api#filterable-fields) for the supported fields.\nEach \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e must have at least one of \u003cspan pulumi-lang-nodejs=\"`group`\" pulumi-lang-dotnet=\"`Group`\" pulumi-lang-go=\"`group`\" pulumi-lang-python=\"`group`\" pulumi-lang-yaml=\"`group`\" pulumi-lang-java=\"`group`\"\u003e`group`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`filter`\" pulumi-lang-dotnet=\"`Filter`\" pulumi-lang-go=\"`filter`\" pulumi-lang-python=\"`filter`\" pulumi-lang-yaml=\"`filter`\" pulumi-lang-java=\"`filter`\"\u003e`filter`\u003c/span\u003e defined.\n"},"isDefault":{"type":"boolean","description":"Whether the resource group is a default resource group."},"lastUpdated":{"type":"string","description":"The time in millis when the resource was last updated"},"name":{"type":"string","description":"The resource group name.\n"},"type":{"type":"string","description":"The type of resource group being created, AWS, GCP, or AZURE\n"},"updatedBy":{"type":"string","description":"The username of the lacework user who performed the last update"}},"type":"object"}},"lacework:index/teamMember:TeamMember":{"description":"Team members can be granted access to multiple Lacework accounts and have different roles for each account. Team members can also be granted organization-level roles.\n\nLacework supports the following account roles:\n* **Administrator Role** - Full access to all functionalities\n* **User Role** - View only and no access to API keys\n\nLacework supports the following organization roles:\n* **Org Administrator Role** - The member has admin privileges for organization settings and admin privileges for all accounts within the organization\n* **Org User Role** - The member has user privileges for organization settings and user privileges for all accounts within the organization\n\nFor more information, see the [Team Members documentation](https://docs.lacework.com/team-members).\n\n## Example Usage\n\n### Standalone Account\n\nTeam member that has **User Role** access into a Lacework standalone account.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst harry = new lacework.TeamMember(\"harry\", {\n    firstName: \"Harry\",\n    lastName: \"Potter\",\n    email: \"harry@hogwarts.io\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nharry = lacework.TeamMember(\"harry\",\n    first_name=\"Harry\",\n    last_name=\"Potter\",\n    email=\"harry@hogwarts.io\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var harry = new Lacework.TeamMember(\"harry\", new()\n    {\n        FirstName = \"Harry\",\n        LastName = \"Potter\",\n        Email = \"harry@hogwarts.io\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewTeamMember(ctx, \"harry\", \u0026lacework.TeamMemberArgs{\n\t\t\tFirstName: pulumi.String(\"Harry\"),\n\t\t\tLastName:  pulumi.String(\"Potter\"),\n\t\t\tEmail:     pulumi.String(\"harry@hogwarts.io\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.TeamMember;\nimport com.pulumi.lacework.TeamMemberArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var harry = new TeamMember(\"harry\", TeamMemberArgs.builder()\n            .firstName(\"Harry\")\n            .lastName(\"Potter\")\n            .email(\"harry@hogwarts.io\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  harry:\n    type: lacework:TeamMember\n    properties:\n      firstName: Harry\n      lastName: Potter\n      email: harry@hogwarts.io\n```\n\u003c!--End PulumiCodeChooser --\u003e\nTeam member with **Administrator Role** access.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst hermione = new lacework.TeamMember(\"hermione\", {\n    firstName: \"Hermione\",\n    lastName: \"Granger\",\n    email: \"hermione@hogwarts.io\",\n    administrator: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nhermione = lacework.TeamMember(\"hermione\",\n    first_name=\"Hermione\",\n    last_name=\"Granger\",\n    email=\"hermione@hogwarts.io\",\n    administrator=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var hermione = new Lacework.TeamMember(\"hermione\", new()\n    {\n        FirstName = \"Hermione\",\n        LastName = \"Granger\",\n        Email = \"hermione@hogwarts.io\",\n        Administrator = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewTeamMember(ctx, \"hermione\", \u0026lacework.TeamMemberArgs{\n\t\t\tFirstName:     pulumi.String(\"Hermione\"),\n\t\t\tLastName:      pulumi.String(\"Granger\"),\n\t\t\tEmail:         pulumi.String(\"hermione@hogwarts.io\"),\n\t\t\tAdministrator: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.TeamMember;\nimport com.pulumi.lacework.TeamMemberArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var hermione = new TeamMember(\"hermione\", TeamMemberArgs.builder()\n            .firstName(\"Hermione\")\n            .lastName(\"Granger\")\n            .email(\"hermione@hogwarts.io\")\n            .administrator(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  hermione:\n    type: lacework:TeamMember\n    properties:\n      firstName: Hermione\n      lastName: Granger\n      email: hermione@hogwarts.io\n      administrator: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\n### Organizational Account\n\nTo manage team members at the organization-level you need to define a Lacework provider with the\n\u003cspan pulumi-lang-nodejs=\"`organization`\" pulumi-lang-dotnet=\"`Organization`\" pulumi-lang-go=\"`organization`\" pulumi-lang-python=\"`organization`\" pulumi-lang-yaml=\"`organization`\" pulumi-lang-java=\"`organization`\"\u003e`organization`\u003c/span\u003e argument set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\n```\n```python\nimport pulumi\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n    }\n}\n```\n```yaml\n{}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nTeam member that has **User Role** access for all accounts within the Lacework organization.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst ron = new lacework.TeamMember(\"ron\", {\n    firstName: \"Ron\",\n    lastName: \"Weasley\",\n    email: \"ron@hogwarts.io\",\n    organization: {\n        user: true,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nron = lacework.TeamMember(\"ron\",\n    first_name=\"Ron\",\n    last_name=\"Weasley\",\n    email=\"ron@hogwarts.io\",\n    organization={\n        \"user\": True,\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var ron = new Lacework.TeamMember(\"ron\", new()\n    {\n        FirstName = \"Ron\",\n        LastName = \"Weasley\",\n        Email = \"ron@hogwarts.io\",\n        Organization = new Lacework.Inputs.TeamMemberOrganizationArgs\n        {\n            User = true,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewTeamMember(ctx, \"ron\", \u0026lacework.TeamMemberArgs{\n\t\t\tFirstName: pulumi.String(\"Ron\"),\n\t\t\tLastName:  pulumi.String(\"Weasley\"),\n\t\t\tEmail:     pulumi.String(\"ron@hogwarts.io\"),\n\t\t\tOrganization: \u0026lacework.TeamMemberOrganizationArgs{\n\t\t\t\tUser: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.TeamMember;\nimport com.pulumi.lacework.TeamMemberArgs;\nimport com.pulumi.lacework.inputs.TeamMemberOrganizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var ron = new TeamMember(\"ron\", TeamMemberArgs.builder()\n            .firstName(\"Ron\")\n            .lastName(\"Weasley\")\n            .email(\"ron@hogwarts.io\")\n            .organization(TeamMemberOrganizationArgs.builder()\n                .user(true)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  ron:\n    type: lacework:TeamMember\n    properties:\n      firstName: Ron\n      lastName: Weasley\n      email: ron@hogwarts.io\n      organization:\n        user: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nTeam member with **Administrator** privileges for all accounts within the organization.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst albus = new lacework.TeamMember(\"albus\", {\n    firstName: \"Albus\",\n    lastName: \"Dumbledore\",\n    email: \"albus@hogwarts.io\",\n    organization: {\n        administrator: true,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nalbus = lacework.TeamMember(\"albus\",\n    first_name=\"Albus\",\n    last_name=\"Dumbledore\",\n    email=\"albus@hogwarts.io\",\n    organization={\n        \"administrator\": True,\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var albus = new Lacework.TeamMember(\"albus\", new()\n    {\n        FirstName = \"Albus\",\n        LastName = \"Dumbledore\",\n        Email = \"albus@hogwarts.io\",\n        Organization = new Lacework.Inputs.TeamMemberOrganizationArgs\n        {\n            Administrator = true,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewTeamMember(ctx, \"albus\", \u0026lacework.TeamMemberArgs{\n\t\t\tFirstName: pulumi.String(\"Albus\"),\n\t\t\tLastName:  pulumi.String(\"Dumbledore\"),\n\t\t\tEmail:     pulumi.String(\"albus@hogwarts.io\"),\n\t\t\tOrganization: \u0026lacework.TeamMemberOrganizationArgs{\n\t\t\t\tAdministrator: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.TeamMember;\nimport com.pulumi.lacework.TeamMemberArgs;\nimport com.pulumi.lacework.inputs.TeamMemberOrganizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var albus = new TeamMember(\"albus\", TeamMemberArgs.builder()\n            .firstName(\"Albus\")\n            .lastName(\"Dumbledore\")\n            .email(\"albus@hogwarts.io\")\n            .organization(TeamMemberOrganizationArgs.builder()\n                .administrator(true)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  albus:\n    type: lacework:TeamMember\n    properties:\n      firstName: Albus\n      lastName: Dumbledore\n      email: albus@hogwarts.io\n      organization:\n        administrator: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nTeam Member that has access to multiple accounts within a Lacework organization. The member is an\nadministrator for `SLYTHERIN` account, and a regular user for `HUFFLEPUFF`, `RAVENCLAW`, and `GRYFFINDOR`.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst severus = new lacework.TeamMember(\"severus\", {\n    firstName: \"Severus\",\n    lastName: \"Snape\",\n    email: \"severus@hogwarts.io\",\n    organization: {\n        adminAccounts: [\"SLYTHERIN\"],\n        userAccounts: [\n            \"HUFFLEPUFF\",\n            \"RAVENCLAW\",\n            \"GRYFFINDOR\",\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nseverus = lacework.TeamMember(\"severus\",\n    first_name=\"Severus\",\n    last_name=\"Snape\",\n    email=\"severus@hogwarts.io\",\n    organization={\n        \"admin_accounts\": [\"SLYTHERIN\"],\n        \"user_accounts\": [\n            \"HUFFLEPUFF\",\n            \"RAVENCLAW\",\n            \"GRYFFINDOR\",\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var severus = new Lacework.TeamMember(\"severus\", new()\n    {\n        FirstName = \"Severus\",\n        LastName = \"Snape\",\n        Email = \"severus@hogwarts.io\",\n        Organization = new Lacework.Inputs.TeamMemberOrganizationArgs\n        {\n            AdminAccounts = new[]\n            {\n                \"SLYTHERIN\",\n            },\n            UserAccounts = new[]\n            {\n                \"HUFFLEPUFF\",\n                \"RAVENCLAW\",\n                \"GRYFFINDOR\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewTeamMember(ctx, \"severus\", \u0026lacework.TeamMemberArgs{\n\t\t\tFirstName: pulumi.String(\"Severus\"),\n\t\t\tLastName:  pulumi.String(\"Snape\"),\n\t\t\tEmail:     pulumi.String(\"severus@hogwarts.io\"),\n\t\t\tOrganization: \u0026lacework.TeamMemberOrganizationArgs{\n\t\t\t\tAdminAccounts: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"SLYTHERIN\"),\n\t\t\t\t},\n\t\t\t\tUserAccounts: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"HUFFLEPUFF\"),\n\t\t\t\t\tpulumi.String(\"RAVENCLAW\"),\n\t\t\t\t\tpulumi.String(\"GRYFFINDOR\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.TeamMember;\nimport com.pulumi.lacework.TeamMemberArgs;\nimport com.pulumi.lacework.inputs.TeamMemberOrganizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var severus = new TeamMember(\"severus\", TeamMemberArgs.builder()\n            .firstName(\"Severus\")\n            .lastName(\"Snape\")\n            .email(\"severus@hogwarts.io\")\n            .organization(TeamMemberOrganizationArgs.builder()\n                .adminAccounts(\"SLYTHERIN\")\n                .userAccounts(                \n                    \"HUFFLEPUFF\",\n                    \"RAVENCLAW\",\n                    \"GRYFFINDOR\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  severus:\n    type: lacework:TeamMember\n    properties:\n      firstName: Severus\n      lastName: Snape\n      email: severus@hogwarts.io\n      organization:\n        adminAccounts:\n          - SLYTHERIN\n        userAccounts:\n          - HUFFLEPUFF\n          - RAVENCLAW\n          - GRYFFINDOR\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\n### Import Organizational Team Member\n\nA Lacework organization-level team member can be imported using the `email`, e.g.\n\n```sh\n$ pulumi import lacework:index/teamMember:TeamMember albus albus@hogwarts.io\n```\n\nuse the Lacework CLI command `lacework team-member list`. To install this tool follow\n\n[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"administrator":{"type":"boolean","description":"Set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e to make the team member an administrator, otherwise the member will be a regular user. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"company":{"type":"string","description":"The company name"},"createdTime":{"type":"string"},"email":{"type":"string","description":"The team member email address, which will also be used as the username.\n"},"enabled":{"type":"boolean","description":"The state of the team member. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"firstName":{"type":"string","description":"The team member first name.\n"},"guid":{"type":"string"},"lastName":{"type":"string","description":"The team member last name.\n"},"organization":{"$ref":"#/types/lacework:index%2FTeamMemberOrganization:TeamMemberOrganization","description":"Use this block to manage organization-level team members. See Organization below for details.\n"},"teamMemberId":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object","required":["company","createdTime","email","firstName","guid","lastName","teamMemberId","updatedBy","updatedTime"],"inputProperties":{"administrator":{"type":"boolean","description":"Set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e to make the team member an administrator, otherwise the member will be a regular user. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"company":{"type":"string","description":"The company name"},"email":{"type":"string","description":"The team member email address, which will also be used as the username.\n"},"enabled":{"type":"boolean","description":"The state of the team member. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"firstName":{"type":"string","description":"The team member first name.\n"},"lastName":{"type":"string","description":"The team member last name.\n"},"organization":{"$ref":"#/types/lacework:index%2FTeamMemberOrganization:TeamMemberOrganization","description":"Use this block to manage organization-level team members. See Organization below for details.\n"},"teamMemberId":{"type":"string"}},"requiredInputs":["company","email","firstName","lastName"],"stateInputs":{"description":"Input properties used for looking up and filtering TeamMember resources.\n","properties":{"administrator":{"type":"boolean","description":"Set to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e to make the team member an administrator, otherwise the member will be a regular user. Defaults to \u003cspan pulumi-lang-nodejs=\"`false`\" pulumi-lang-dotnet=\"`False`\" pulumi-lang-go=\"`false`\" pulumi-lang-python=\"`false`\" pulumi-lang-yaml=\"`false`\" pulumi-lang-java=\"`false`\"\u003e`false`\u003c/span\u003e.\n"},"company":{"type":"string","description":"The company name"},"createdTime":{"type":"string"},"email":{"type":"string","description":"The team member email address, which will also be used as the username.\n"},"enabled":{"type":"boolean","description":"The state of the team member. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"firstName":{"type":"string","description":"The team member first name.\n"},"guid":{"type":"string"},"lastName":{"type":"string","description":"The team member last name.\n"},"organization":{"$ref":"#/types/lacework:index%2FTeamMemberOrganization:TeamMemberOrganization","description":"Use this block to manage organization-level team members. See Organization below for details.\n"},"teamMemberId":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"}},"type":"object"}},"lacework:index/vulnerabilityExceptionContainer:VulnerabilityExceptionContainer":{"description":"Use this resource to manage Lacework vulnerability exceptions to control and customize your alert\nprofile for containers, such as for a particular vulnerability in a container registry. Customize\nyour exceptions by defining the resource scope, vulnerability criteria, and context for each exception.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.VulnerabilityExceptionContainer(\"example\", {\n    name: \"My Vuln Exception\",\n    description: \"This is a container vulnerability exception\",\n    enabled: true,\n    reason: \"Accepted Risk\",\n    expiry: \"2023-06-06T15:55:15Z\",\n    vulnerabilityCriteria: {\n        severities: [\n            \"Critical\",\n            \"High\",\n        ],\n        cves: [\n            \"cve-2021-11111\",\n            \"cve-2021-22222\",\n        ],\n        fixableVuln: \"true\",\n        packages: [\n            {\n                name: \"myPackage\",\n                version: \"1.0.0\",\n            },\n            {\n                name: \"myOtherPackage\",\n                version: \"1.0.0\",\n            },\n        ],\n    },\n    resourceScope: {\n        imageIds: [\"sha256:3b83d9104a4c4ccf76433756f14a2ad109e2aae15444b63339\"],\n        imageTags: [\n            \"4.0\",\n            \"1.0\",\n            \"3.1\",\n            \"5.0\",\n        ],\n        namespaces: [\"debian\"],\n        registries: [\"index.docker.io\"],\n        repositories: [\"lacework/lacework-cli\"],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.VulnerabilityExceptionContainer(\"example\",\n    name=\"My Vuln Exception\",\n    description=\"This is a container vulnerability exception\",\n    enabled=True,\n    reason=\"Accepted Risk\",\n    expiry=\"2023-06-06T15:55:15Z\",\n    vulnerability_criteria={\n        \"severities\": [\n            \"Critical\",\n            \"High\",\n        ],\n        \"cves\": [\n            \"cve-2021-11111\",\n            \"cve-2021-22222\",\n        ],\n        \"fixable_vuln\": \"true\",\n        \"packages\": [\n            {\n                \"name\": \"myPackage\",\n                \"version\": \"1.0.0\",\n            },\n            {\n                \"name\": \"myOtherPackage\",\n                \"version\": \"1.0.0\",\n            },\n        ],\n    },\n    resource_scope={\n        \"image_ids\": [\"sha256:3b83d9104a4c4ccf76433756f14a2ad109e2aae15444b63339\"],\n        \"image_tags\": [\n            \"4.0\",\n            \"1.0\",\n            \"3.1\",\n            \"5.0\",\n        ],\n        \"namespaces\": [\"debian\"],\n        \"registries\": [\"index.docker.io\"],\n        \"repositories\": [\"lacework/lacework-cli\"],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.VulnerabilityExceptionContainer(\"example\", new()\n    {\n        Name = \"My Vuln Exception\",\n        Description = \"This is a container vulnerability exception\",\n        Enabled = true,\n        Reason = \"Accepted Risk\",\n        Expiry = \"2023-06-06T15:55:15Z\",\n        VulnerabilityCriteria = new Lacework.Inputs.VulnerabilityExceptionContainerVulnerabilityCriteriaArgs\n        {\n            Severities = new[]\n            {\n                \"Critical\",\n                \"High\",\n            },\n            Cves = new[]\n            {\n                \"cve-2021-11111\",\n                \"cve-2021-22222\",\n            },\n            FixableVuln = \"true\",\n            Packages = new[]\n            {\n                new Lacework.Inputs.VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArgs\n                {\n                    Name = \"myPackage\",\n                    Version = \"1.0.0\",\n                },\n                new Lacework.Inputs.VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArgs\n                {\n                    Name = \"myOtherPackage\",\n                    Version = \"1.0.0\",\n                },\n            },\n        },\n        ResourceScope = new Lacework.Inputs.VulnerabilityExceptionContainerResourceScopeArgs\n        {\n            ImageIds = new[]\n            {\n                \"sha256:3b83d9104a4c4ccf76433756f14a2ad109e2aae15444b63339\",\n            },\n            ImageTags = new[]\n            {\n                \"4.0\",\n                \"1.0\",\n                \"3.1\",\n                \"5.0\",\n            },\n            Namespaces = new[]\n            {\n                \"debian\",\n            },\n            Registries = new[]\n            {\n                \"index.docker.io\",\n            },\n            Repositories = new[]\n            {\n                \"lacework/lacework-cli\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewVulnerabilityExceptionContainer(ctx, \"example\", \u0026lacework.VulnerabilityExceptionContainerArgs{\n\t\t\tName:        pulumi.String(\"My Vuln Exception\"),\n\t\t\tDescription: pulumi.String(\"This is a container vulnerability exception\"),\n\t\t\tEnabled:     pulumi.Bool(true),\n\t\t\tReason:      pulumi.String(\"Accepted Risk\"),\n\t\t\tExpiry:      pulumi.String(\"2023-06-06T15:55:15Z\"),\n\t\t\tVulnerabilityCriteria: \u0026lacework.VulnerabilityExceptionContainerVulnerabilityCriteriaArgs{\n\t\t\t\tSeverities: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"Critical\"),\n\t\t\t\t\tpulumi.String(\"High\"),\n\t\t\t\t},\n\t\t\t\tCves: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"cve-2021-11111\"),\n\t\t\t\t\tpulumi.String(\"cve-2021-22222\"),\n\t\t\t\t},\n\t\t\t\tFixableVuln: pulumi.String(\"true\"),\n\t\t\t\tPackages: lacework.VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArray{\n\t\t\t\t\t\u0026lacework.VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArgs{\n\t\t\t\t\t\tName:    pulumi.String(\"myPackage\"),\n\t\t\t\t\t\tVersion: pulumi.String(\"1.0.0\"),\n\t\t\t\t\t},\n\t\t\t\t\t\u0026lacework.VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArgs{\n\t\t\t\t\t\tName:    pulumi.String(\"myOtherPackage\"),\n\t\t\t\t\t\tVersion: pulumi.String(\"1.0.0\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tResourceScope: \u0026lacework.VulnerabilityExceptionContainerResourceScopeArgs{\n\t\t\t\tImageIds: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"sha256:3b83d9104a4c4ccf76433756f14a2ad109e2aae15444b63339\"),\n\t\t\t\t},\n\t\t\t\tImageTags: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"4.0\"),\n\t\t\t\t\tpulumi.String(\"1.0\"),\n\t\t\t\t\tpulumi.String(\"3.1\"),\n\t\t\t\t\tpulumi.String(\"5.0\"),\n\t\t\t\t},\n\t\t\t\tNamespaces: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"debian\"),\n\t\t\t\t},\n\t\t\t\tRegistries: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"index.docker.io\"),\n\t\t\t\t},\n\t\t\t\tRepositories: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"lacework/lacework-cli\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.VulnerabilityExceptionContainer;\nimport com.pulumi.lacework.VulnerabilityExceptionContainerArgs;\nimport com.pulumi.lacework.inputs.VulnerabilityExceptionContainerVulnerabilityCriteriaArgs;\nimport com.pulumi.lacework.inputs.VulnerabilityExceptionContainerResourceScopeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new VulnerabilityExceptionContainer(\"example\", VulnerabilityExceptionContainerArgs.builder()\n            .name(\"My Vuln Exception\")\n            .description(\"This is a container vulnerability exception\")\n            .enabled(true)\n            .reason(\"Accepted Risk\")\n            .expiry(\"2023-06-06T15:55:15Z\")\n            .vulnerabilityCriteria(VulnerabilityExceptionContainerVulnerabilityCriteriaArgs.builder()\n                .severities(                \n                    \"Critical\",\n                    \"High\")\n                .cves(                \n                    \"cve-2021-11111\",\n                    \"cve-2021-22222\")\n                .fixableVuln(\"true\")\n                .packages(                \n                    VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArgs.builder()\n                        .name(\"myPackage\")\n                        .version(\"1.0.0\")\n                        .build(),\n                    VulnerabilityExceptionContainerVulnerabilityCriteriaPackageArgs.builder()\n                        .name(\"myOtherPackage\")\n                        .version(\"1.0.0\")\n                        .build())\n                .build())\n            .resourceScope(VulnerabilityExceptionContainerResourceScopeArgs.builder()\n                .imageIds(\"sha256:3b83d9104a4c4ccf76433756f14a2ad109e2aae15444b63339\")\n                .imageTags(                \n                    \"4.0\",\n                    \"1.0\",\n                    \"3.1\",\n                    \"5.0\")\n                .namespaces(\"debian\")\n                .registries(\"index.docker.io\")\n                .repositories(\"lacework/lacework-cli\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:VulnerabilityExceptionContainer\n    properties:\n      name: My Vuln Exception\n      description: This is a container vulnerability exception\n      enabled: true\n      reason: Accepted Risk\n      expiry: 2023-06-06T15:55:15Z\n      vulnerabilityCriteria:\n        severities:\n          - Critical\n          - High\n        cves:\n          - cve-2021-11111\n          - cve-2021-22222\n        fixableVuln: 'true'\n        packages:\n          - name: myPackage\n            version: 1.0.0\n          - name: myOtherPackage\n            version: 1.0.0\n      resourceScope:\n        imageIds:\n          - sha256:3b83d9104a4c4ccf76433756f14a2ad109e2aae15444b63339\n        imageTags:\n          - '4.0'\n          - '1.0'\n          - '3.1'\n          - '5.0'\n        namespaces:\n          - debian\n        registries:\n          - index.docker.io\n        repositories:\n          - lacework/lacework-cli\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework vulnerability wxception for containers can be imported using a `GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/vulnerabilityExceptionContainer:VulnerabilityExceptionContainer example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `GUID` from existing vulnerability exception in your account, use\nthe Lacework CLI command `lacework vulnerability-exception list`. To install this tool follow\n[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdBy":{"type":"string"},"createdTime":{"type":"string"},"description":{"type":"string","description":"The description of the vulnerability exception.\n"},"enabled":{"type":"boolean","description":"The state of the vulnerability exception. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"expiry":{"type":"string","description":"The expiration date of the vulnerability exception. Example: `2022-06-01T16:35:00Z`.\n"},"guid":{"type":"string"},"name":{"type":"string","description":"The vulnerability exception name.\n"},"reason":{"type":"string","description":"The reason for the exception to exist. Valid reasons include: `Accepted Risk`,\n`False Positive`, `Compensating Controls`, `Fix Pending` and `Other`. See\n[Vulnerability Exceptions Use Cases](https://docs.lacework.com/console/vulnerability-exceptions-overview)\nfor more details.\n"},"resourceScope":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerResourceScope:VulnerabilityExceptionContainerResourceScope","description":"Define which resources will be affected by the exclusion. See\nResource Scope below for details.\n"},"type":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"},"vulnerabilityCriteria":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerVulnerabilityCriteria:VulnerabilityExceptionContainerVulnerabilityCriteria","description":"The criteria of the vulnerability to be excluded.\nSee Vulnerability Criteria below for details.\n"},"vulnerabilityExceptionContainerId":{"type":"string"}},"type":"object","required":["createdBy","createdTime","guid","name","type","updatedBy","updatedTime","vulnerabilityCriteria","vulnerabilityExceptionContainerId"],"inputProperties":{"description":{"type":"string","description":"The description of the vulnerability exception.\n"},"enabled":{"type":"boolean","description":"The state of the vulnerability exception. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"expiry":{"type":"string","description":"The expiration date of the vulnerability exception. Example: `2022-06-01T16:35:00Z`.\n"},"name":{"type":"string","description":"The vulnerability exception name.\n"},"reason":{"type":"string","description":"The reason for the exception to exist. Valid reasons include: `Accepted Risk`,\n`False Positive`, `Compensating Controls`, `Fix Pending` and `Other`. See\n[Vulnerability Exceptions Use Cases](https://docs.lacework.com/console/vulnerability-exceptions-overview)\nfor more details.\n"},"resourceScope":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerResourceScope:VulnerabilityExceptionContainerResourceScope","description":"Define which resources will be affected by the exclusion. See\nResource Scope below for details.\n"},"vulnerabilityCriteria":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerVulnerabilityCriteria:VulnerabilityExceptionContainerVulnerabilityCriteria","description":"The criteria of the vulnerability to be excluded.\nSee Vulnerability Criteria below for details.\n"},"vulnerabilityExceptionContainerId":{"type":"string"}},"requiredInputs":["vulnerabilityCriteria"],"stateInputs":{"description":"Input properties used for looking up and filtering VulnerabilityExceptionContainer resources.\n","properties":{"createdBy":{"type":"string"},"createdTime":{"type":"string"},"description":{"type":"string","description":"The description of the vulnerability exception.\n"},"enabled":{"type":"boolean","description":"The state of the vulnerability exception. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"expiry":{"type":"string","description":"The expiration date of the vulnerability exception. Example: `2022-06-01T16:35:00Z`.\n"},"guid":{"type":"string"},"name":{"type":"string","description":"The vulnerability exception name.\n"},"reason":{"type":"string","description":"The reason for the exception to exist. Valid reasons include: `Accepted Risk`,\n`False Positive`, `Compensating Controls`, `Fix Pending` and `Other`. See\n[Vulnerability Exceptions Use Cases](https://docs.lacework.com/console/vulnerability-exceptions-overview)\nfor more details.\n"},"resourceScope":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerResourceScope:VulnerabilityExceptionContainerResourceScope","description":"Define which resources will be affected by the exclusion. See\nResource Scope below for details.\n"},"type":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"},"vulnerabilityCriteria":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionContainerVulnerabilityCriteria:VulnerabilityExceptionContainerVulnerabilityCriteria","description":"The criteria of the vulnerability to be excluded.\nSee Vulnerability Criteria below for details.\n"},"vulnerabilityExceptionContainerId":{"type":"string"}},"type":"object"}},"lacework:index/vulnerabilityExceptionHost:VulnerabilityExceptionHost":{"description":"Use this resource to manage Lacework vulnerability exceptions to control and customize your alert\nprofile for hosts, such as for a known package on a specific host. Customize your exceptions by\ndefining the resource scope, vulnerability criteria, and context for each exception.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst example = new lacework.VulnerabilityExceptionHost(\"example\", {\n    name: \"My Vuln Exception\",\n    description: \"This is a host vulnerability exception\",\n    enabled: true,\n    reason: \"Accepted Risk\",\n    expiry: \"2023-06-06T15:55:15Z\",\n    vulnerabilityCriteria: {\n        severities: [\"Critical\"],\n        cves: [\n            \"cve-2021-11111\",\n            \"cve-2021-22222\",\n        ],\n        fixableVuln: \"true\",\n        packages: [\n            {\n                name: \"myPackage\",\n                version: \"1.0.0\",\n            },\n            {\n                name: \"myOtherPackage\",\n                version: \"1.0.0\",\n            },\n        ],\n    },\n    resourceScope: {\n        hostnames: [\n            \"host1\",\n            \"host2\",\n        ],\n        clusterNames: [\n            \"cluster1\",\n            \"cluster2\",\n        ],\n        namespaces: [\n            \"namespace1\",\n            \"namespace2\",\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nexample = lacework.VulnerabilityExceptionHost(\"example\",\n    name=\"My Vuln Exception\",\n    description=\"This is a host vulnerability exception\",\n    enabled=True,\n    reason=\"Accepted Risk\",\n    expiry=\"2023-06-06T15:55:15Z\",\n    vulnerability_criteria={\n        \"severities\": [\"Critical\"],\n        \"cves\": [\n            \"cve-2021-11111\",\n            \"cve-2021-22222\",\n        ],\n        \"fixable_vuln\": \"true\",\n        \"packages\": [\n            {\n                \"name\": \"myPackage\",\n                \"version\": \"1.0.0\",\n            },\n            {\n                \"name\": \"myOtherPackage\",\n                \"version\": \"1.0.0\",\n            },\n        ],\n    },\n    resource_scope={\n        \"hostnames\": [\n            \"host1\",\n            \"host2\",\n        ],\n        \"cluster_names\": [\n            \"cluster1\",\n            \"cluster2\",\n        ],\n        \"namespaces\": [\n            \"namespace1\",\n            \"namespace2\",\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Lacework.VulnerabilityExceptionHost(\"example\", new()\n    {\n        Name = \"My Vuln Exception\",\n        Description = \"This is a host vulnerability exception\",\n        Enabled = true,\n        Reason = \"Accepted Risk\",\n        Expiry = \"2023-06-06T15:55:15Z\",\n        VulnerabilityCriteria = new Lacework.Inputs.VulnerabilityExceptionHostVulnerabilityCriteriaArgs\n        {\n            Severities = new[]\n            {\n                \"Critical\",\n            },\n            Cves = new[]\n            {\n                \"cve-2021-11111\",\n                \"cve-2021-22222\",\n            },\n            FixableVuln = \"true\",\n            Packages = new[]\n            {\n                new Lacework.Inputs.VulnerabilityExceptionHostVulnerabilityCriteriaPackageArgs\n                {\n                    Name = \"myPackage\",\n                    Version = \"1.0.0\",\n                },\n                new Lacework.Inputs.VulnerabilityExceptionHostVulnerabilityCriteriaPackageArgs\n                {\n                    Name = \"myOtherPackage\",\n                    Version = \"1.0.0\",\n                },\n            },\n        },\n        ResourceScope = new Lacework.Inputs.VulnerabilityExceptionHostResourceScopeArgs\n        {\n            Hostnames = new[]\n            {\n                \"host1\",\n                \"host2\",\n            },\n            ClusterNames = new[]\n            {\n                \"cluster1\",\n                \"cluster2\",\n            },\n            Namespaces = new[]\n            {\n                \"namespace1\",\n                \"namespace2\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.NewVulnerabilityExceptionHost(ctx, \"example\", \u0026lacework.VulnerabilityExceptionHostArgs{\n\t\t\tName:        pulumi.String(\"My Vuln Exception\"),\n\t\t\tDescription: pulumi.String(\"This is a host vulnerability exception\"),\n\t\t\tEnabled:     pulumi.Bool(true),\n\t\t\tReason:      pulumi.String(\"Accepted Risk\"),\n\t\t\tExpiry:      pulumi.String(\"2023-06-06T15:55:15Z\"),\n\t\t\tVulnerabilityCriteria: \u0026lacework.VulnerabilityExceptionHostVulnerabilityCriteriaArgs{\n\t\t\t\tSeverities: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"Critical\"),\n\t\t\t\t},\n\t\t\t\tCves: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"cve-2021-11111\"),\n\t\t\t\t\tpulumi.String(\"cve-2021-22222\"),\n\t\t\t\t},\n\t\t\t\tFixableVuln: pulumi.String(\"true\"),\n\t\t\t\tPackages: lacework.VulnerabilityExceptionHostVulnerabilityCriteriaPackageArray{\n\t\t\t\t\t\u0026lacework.VulnerabilityExceptionHostVulnerabilityCriteriaPackageArgs{\n\t\t\t\t\t\tName:    pulumi.String(\"myPackage\"),\n\t\t\t\t\t\tVersion: pulumi.String(\"1.0.0\"),\n\t\t\t\t\t},\n\t\t\t\t\t\u0026lacework.VulnerabilityExceptionHostVulnerabilityCriteriaPackageArgs{\n\t\t\t\t\t\tName:    pulumi.String(\"myOtherPackage\"),\n\t\t\t\t\t\tVersion: pulumi.String(\"1.0.0\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tResourceScope: \u0026lacework.VulnerabilityExceptionHostResourceScopeArgs{\n\t\t\t\tHostnames: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"host1\"),\n\t\t\t\t\tpulumi.String(\"host2\"),\n\t\t\t\t},\n\t\t\t\tClusterNames: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"cluster1\"),\n\t\t\t\t\tpulumi.String(\"cluster2\"),\n\t\t\t\t},\n\t\t\t\tNamespaces: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"namespace1\"),\n\t\t\t\t\tpulumi.String(\"namespace2\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.VulnerabilityExceptionHost;\nimport com.pulumi.lacework.VulnerabilityExceptionHostArgs;\nimport com.pulumi.lacework.inputs.VulnerabilityExceptionHostVulnerabilityCriteriaArgs;\nimport com.pulumi.lacework.inputs.VulnerabilityExceptionHostResourceScopeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new VulnerabilityExceptionHost(\"example\", VulnerabilityExceptionHostArgs.builder()\n            .name(\"My Vuln Exception\")\n            .description(\"This is a host vulnerability exception\")\n            .enabled(true)\n            .reason(\"Accepted Risk\")\n            .expiry(\"2023-06-06T15:55:15Z\")\n            .vulnerabilityCriteria(VulnerabilityExceptionHostVulnerabilityCriteriaArgs.builder()\n                .severities(\"Critical\")\n                .cves(                \n                    \"cve-2021-11111\",\n                    \"cve-2021-22222\")\n                .fixableVuln(\"true\")\n                .packages(                \n                    VulnerabilityExceptionHostVulnerabilityCriteriaPackageArgs.builder()\n                        .name(\"myPackage\")\n                        .version(\"1.0.0\")\n                        .build(),\n                    VulnerabilityExceptionHostVulnerabilityCriteriaPackageArgs.builder()\n                        .name(\"myOtherPackage\")\n                        .version(\"1.0.0\")\n                        .build())\n                .build())\n            .resourceScope(VulnerabilityExceptionHostResourceScopeArgs.builder()\n                .hostnames(                \n                    \"host1\",\n                    \"host2\")\n                .clusterNames(                \n                    \"cluster1\",\n                    \"cluster2\")\n                .namespaces(                \n                    \"namespace1\",\n                    \"namespace2\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: lacework:VulnerabilityExceptionHost\n    properties:\n      name: My Vuln Exception\n      description: This is a host vulnerability exception\n      enabled: true\n      reason: Accepted Risk\n      expiry: 2023-06-06T15:55:15Z\n      vulnerabilityCriteria:\n        severities:\n          - Critical\n        cves:\n          - cve-2021-11111\n          - cve-2021-22222\n        fixableVuln: 'true'\n        packages:\n          - name: myPackage\n            version: 1.0.0\n          - name: myOtherPackage\n            version: 1.0.0\n      resourceScope:\n        hostnames:\n          - host1\n          - host2\n        clusterNames:\n          - cluster1\n          - cluster2\n        namespaces:\n          - namespace1\n          - namespace2\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA Lacework vulnerability exception for hosts can be imported using a `GUID`, e.g.\n\n```sh\n$ pulumi import lacework:index/vulnerabilityExceptionHost:VulnerabilityExceptionHost example EXAMPLE_1234BAE1E42182964D23973F44CFEA3C4AB63B99E9A1EC5\n```\n-\u003e __Note:__ To retrieve the `GUID` from existing vulnerability exception in your account, use\nthe Lacework CLI command `lacework vulnerability-exception list`. To install this tool follow\n[this documentation](https://docs.lacework.com/cli/).\n\n","properties":{"createdBy":{"type":"string"},"createdTime":{"type":"string"},"description":{"type":"string","description":"The description of the vulnerability exception.\n"},"enabled":{"type":"boolean","description":"The state of the vulnerability exception. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"expiry":{"type":"string","description":"The expiration date of the vulnerability exception. Example: `2022-06-01T16:35:00Z`.\n"},"guid":{"type":"string"},"name":{"type":"string","description":"The vulnerability exception name.\n"},"reason":{"type":"string","description":"The reason for the exception to exist. Valid reasons include: `Accepted Risk`,\n`False Positive`, `Compensating Controls`, `Fix Pending` and `Other`. See\n[Vulnerability Exceptions Use Cases](https://docs.lacework.com/console/vulnerability-exceptions-overview)\nfor more details.\n"},"resourceScope":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostResourceScope:VulnerabilityExceptionHostResourceScope","description":"Define which resources will be affected by the exclusion. See\nResource Scope below for details.\n"},"type":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"},"vulnerabilityCriteria":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostVulnerabilityCriteria:VulnerabilityExceptionHostVulnerabilityCriteria","description":"The criteria of the vulnerability to be excluded.\nSee Vulnerability Criteria below for details.\n"},"vulnerabilityExceptionHostId":{"type":"string"}},"type":"object","required":["createdBy","createdTime","guid","name","type","updatedBy","updatedTime","vulnerabilityCriteria","vulnerabilityExceptionHostId"],"inputProperties":{"description":{"type":"string","description":"The description of the vulnerability exception.\n"},"enabled":{"type":"boolean","description":"The state of the vulnerability exception. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"expiry":{"type":"string","description":"The expiration date of the vulnerability exception. Example: `2022-06-01T16:35:00Z`.\n"},"name":{"type":"string","description":"The vulnerability exception name.\n"},"reason":{"type":"string","description":"The reason for the exception to exist. Valid reasons include: `Accepted Risk`,\n`False Positive`, `Compensating Controls`, `Fix Pending` and `Other`. See\n[Vulnerability Exceptions Use Cases](https://docs.lacework.com/console/vulnerability-exceptions-overview)\nfor more details.\n"},"resourceScope":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostResourceScope:VulnerabilityExceptionHostResourceScope","description":"Define which resources will be affected by the exclusion. See\nResource Scope below for details.\n"},"vulnerabilityCriteria":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostVulnerabilityCriteria:VulnerabilityExceptionHostVulnerabilityCriteria","description":"The criteria of the vulnerability to be excluded.\nSee Vulnerability Criteria below for details.\n"},"vulnerabilityExceptionHostId":{"type":"string"}},"requiredInputs":["vulnerabilityCriteria"],"stateInputs":{"description":"Input properties used for looking up and filtering VulnerabilityExceptionHost resources.\n","properties":{"createdBy":{"type":"string"},"createdTime":{"type":"string"},"description":{"type":"string","description":"The description of the vulnerability exception.\n"},"enabled":{"type":"boolean","description":"The state of the vulnerability exception. Defaults to \u003cspan pulumi-lang-nodejs=\"`true`\" pulumi-lang-dotnet=\"`True`\" pulumi-lang-go=\"`true`\" pulumi-lang-python=\"`true`\" pulumi-lang-yaml=\"`true`\" pulumi-lang-java=\"`true`\"\u003e`true`\u003c/span\u003e.\n"},"expiry":{"type":"string","description":"The expiration date of the vulnerability exception. Example: `2022-06-01T16:35:00Z`.\n"},"guid":{"type":"string"},"name":{"type":"string","description":"The vulnerability exception name.\n"},"reason":{"type":"string","description":"The reason for the exception to exist. Valid reasons include: `Accepted Risk`,\n`False Positive`, `Compensating Controls`, `Fix Pending` and `Other`. See\n[Vulnerability Exceptions Use Cases](https://docs.lacework.com/console/vulnerability-exceptions-overview)\nfor more details.\n"},"resourceScope":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostResourceScope:VulnerabilityExceptionHostResourceScope","description":"Define which resources will be affected by the exclusion. See\nResource Scope below for details.\n"},"type":{"type":"string"},"updatedBy":{"type":"string"},"updatedTime":{"type":"string"},"vulnerabilityCriteria":{"$ref":"#/types/lacework:index%2FVulnerabilityExceptionHostVulnerabilityCriteria:VulnerabilityExceptionHostVulnerabilityCriteria","description":"The criteria of the vulnerability to be excluded.\nSee Vulnerability Criteria below for details.\n"},"vulnerabilityExceptionHostId":{"type":"string"}},"type":"object"}}},"functions":{"lacework:index/getAgentAccessToken:getAgentAccessToken":{"description":"Retrieve Lacework agent access tokens.\n\n\u003e **Note:** To list all agent access tokens in your Lacework account, use the\n\tLacework CLI command `lacework agent token list`. To install this tool follow\n\t[this documentation](https://docs.lacework.com/cli/).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst k8s = lacework.getAgentAccessToken({\n    name: \"k8s-deployments\",\n});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\nk8s = lacework.get_agent_access_token(name=\"k8s-deployments\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var k8s = Lacework.GetAgentAccessToken.Invoke(new()\n    {\n        Name = \"k8s-deployments\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.LookupAgentAccessToken(ctx, \u0026lacework.LookupAgentAccessTokenArgs{\n\t\t\tName: \"k8s-deployments\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.LaceworkFunctions;\nimport com.pulumi.lacework.inputs.GetAgentAccessTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var k8s = LaceworkFunctions.getAgentAccessToken(GetAgentAccessTokenArgs.builder()\n            .name(\"k8s-deployments\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  k8s:\n    fn::invoke:\n      function: lacework:getAgentAccessToken\n      arguments:\n        name: k8s-deployments\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getAgentAccessToken.\n","properties":{"id":{"type":"string"},"name":{"type":"string","description":"The agent access token name.\n"}},"type":"object","required":["name"]},"outputs":{"description":"A collection of values returned by getAgentAccessToken.\n","properties":{"id":{"type":"string"},"name":{"type":"string"},"token":{"description":"The agent access token.\n","secret":true,"type":"string"}},"required":["id","name","token"],"type":"object"}},"lacework:index/getApiToken:getApiToken":{"description":"Use this data source to generate API access tokens that can be used to interact with the\nexternal Lacework API.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst development = lacework.getApiToken({});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\ndevelopment = lacework.get_api_token()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var development = Lacework.GetApiToken.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.GetApiToken(ctx, \u0026lacework.GetApiTokenArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.LaceworkFunctions;\nimport com.pulumi.lacework.inputs.GetApiTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var development = LaceworkFunctions.getApiToken(GetApiTokenArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  development:\n    fn::invoke:\n      function: lacework:getApiToken\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getApiToken.\n","properties":{"id":{"type":"string"}},"type":"object"},"outputs":{"description":"A collection of values returned by getApiToken.\n","properties":{"id":{"type":"string"},"token":{"description":"An API access token.\n","secret":true,"type":"string"}},"required":["id","token"],"type":"object"}},"lacework:index/getMetricModule:getMetricModule":{"inputs":{"description":"A collection of arguments for invoking getMetricModule.\n","properties":{"id":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object","required":["name","version"]},"outputs":{"description":"A collection of values returned by getMetricModule.\n","properties":{"id":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"required":["id","name","version"],"type":"object"}},"lacework:index/getUserProfile:getUserProfile":{"description":"Use this data source to retrieve the User Profile of the current Lacework user.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as lacework from \"@pulumi/lacework\";\n\nconst current = lacework.getUserProfile({});\n```\n```python\nimport pulumi\nimport pulumi_lacework as lacework\n\ncurrent = lacework.get_user_profile()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Lacework = Pulumi.Lacework;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var current = Lacework.GetUserProfile.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/lacework/v2/lacework\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := lacework.GetUserProfile(ctx, \u0026lacework.GetUserProfileArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.lacework.LaceworkFunctions;\nimport com.pulumi.lacework.inputs.GetUserProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var current = LaceworkFunctions.getUserProfile(GetUserProfileArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  current:\n    fn::invoke:\n      function: lacework:getUserProfile\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getUserProfile.\n","properties":{"id":{"type":"string"}},"type":"object"},"outputs":{"description":"A collection of values returned by getUserProfile.\n","properties":{"accounts":{"description":"A list of accounts in the Lacework tenant. See Account below for details.\n","items":{"$ref":"#/types/lacework:index%2FgetUserProfileAccount:getUserProfileAccount"},"type":"array"},"id":{"type":"string"},"orgAccount":{"description":"A boolean representing whether the user has an organization account.\n","type":"boolean"},"orgAdmin":{"description":"A boolean representing whether the user is an organization admin.\n","type":"boolean"},"orgUser":{"description":"A boolean representing whether the user is an organization user.\n","type":"boolean"},"url":{"description":"A string representing the login URL for the Lacework account.\n","type":"string"},"username":{"description":"The username of the current user.\n","type":"string"}},"required":["accounts","id","orgAccount","orgAdmin","orgUser","url","username"],"type":"object"}},"pulumi:providers:lacework/terraformConfig":{"description":"This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.","inputs":{"properties":{"__self__":{"$ref":"#/resources/pulumi:providers:lacework"}},"type":"object","required":["__self__"]},"outputs":{"properties":{"result":{"additionalProperties":{"$ref":"pulumi.json#/Any"},"type":"object"}},"required":["result"],"type":"object"}}},"parameterization":{"baseProvider":{"name":"terraform-provider","version":"1.0.1"},"parameter":"eyJyZW1vdGUiOnsidXJsIjoicmVnaXN0cnkub3BlbnRvZnUub3JnL2xhY2V3b3JrL2xhY2V3b3JrIiwidmVyc2lvbiI6IjIuMi4wIn19"}}