Cisco Meraki v0.2.4 published on Friday, Jun 14, 2024 by Pulumi
meraki.networks.getApplianceSecurityIntrusion
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as meraki from "@pulumi/meraki";
const example = meraki.networks.getApplianceSecurityIntrusion({
networkId: "string",
});
export const merakiNetworksApplianceSecurityIntrusionExample = example.then(example => example.item);
import pulumi
import pulumi_meraki as meraki
example = meraki.networks.get_appliance_security_intrusion(network_id="string")
pulumi.export("merakiNetworksApplianceSecurityIntrusionExample", example.item)
package main
import (
"github.com/pulumi/pulumi-meraki/sdk/go/meraki/networks"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := networks.LookupApplianceSecurityIntrusion(ctx, &networks.LookupApplianceSecurityIntrusionArgs{
NetworkId: "string",
}, nil)
if err != nil {
return err
}
ctx.Export("merakiNetworksApplianceSecurityIntrusionExample", example.Item)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Meraki = Pulumi.Meraki;
return await Deployment.RunAsync(() =>
{
var example = Meraki.Networks.GetApplianceSecurityIntrusion.Invoke(new()
{
NetworkId = "string",
});
return new Dictionary<string, object?>
{
["merakiNetworksApplianceSecurityIntrusionExample"] = example.Apply(getApplianceSecurityIntrusionResult => getApplianceSecurityIntrusionResult.Item),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.networks.NetworksFunctions;
import com.pulumi.meraki.networks.inputs.GetApplianceSecurityIntrusionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = NetworksFunctions.getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs.builder()
.networkId("string")
.build());
ctx.export("merakiNetworksApplianceSecurityIntrusionExample", example.applyValue(getApplianceSecurityIntrusionResult -> getApplianceSecurityIntrusionResult.item()));
}
}
variables:
example:
fn::invoke:
Function: meraki:networks:getApplianceSecurityIntrusion
Arguments:
networkId: string
outputs:
merakiNetworksApplianceSecurityIntrusionExample: ${example.item}
Using getApplianceSecurityIntrusion
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApplianceSecurityIntrusion(args: GetApplianceSecurityIntrusionArgs, opts?: InvokeOptions): Promise<GetApplianceSecurityIntrusionResult>
function getApplianceSecurityIntrusionOutput(args: GetApplianceSecurityIntrusionOutputArgs, opts?: InvokeOptions): Output<GetApplianceSecurityIntrusionResult>
def get_appliance_security_intrusion(network_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetApplianceSecurityIntrusionResult
def get_appliance_security_intrusion_output(network_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetApplianceSecurityIntrusionResult]
func LookupApplianceSecurityIntrusion(ctx *Context, args *LookupApplianceSecurityIntrusionArgs, opts ...InvokeOption) (*LookupApplianceSecurityIntrusionResult, error)
func LookupApplianceSecurityIntrusionOutput(ctx *Context, args *LookupApplianceSecurityIntrusionOutputArgs, opts ...InvokeOption) LookupApplianceSecurityIntrusionResultOutput
> Note: This function is named LookupApplianceSecurityIntrusion
in the Go SDK.
public static class GetApplianceSecurityIntrusion
{
public static Task<GetApplianceSecurityIntrusionResult> InvokeAsync(GetApplianceSecurityIntrusionArgs args, InvokeOptions? opts = null)
public static Output<GetApplianceSecurityIntrusionResult> Invoke(GetApplianceSecurityIntrusionInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetApplianceSecurityIntrusionResult> getApplianceSecurityIntrusion(GetApplianceSecurityIntrusionArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: meraki:networks/getApplianceSecurityIntrusion:getApplianceSecurityIntrusion
arguments:
# arguments dictionary
The following arguments are supported:
- Network
Id string - networkId path parameter. Network ID
- Network
Id string - networkId path parameter. Network ID
- network
Id String - networkId path parameter. Network ID
- network
Id string - networkId path parameter. Network ID
- network_
id str - networkId path parameter. Network ID
- network
Id String - networkId path parameter. Network ID
getApplianceSecurityIntrusion Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Security Intrusion Item - Network
Id string - networkId path parameter. Network ID
- Id string
- The provider-assigned unique ID for this managed resource.
- Item
Get
Appliance Security Intrusion Item - Network
Id string - networkId path parameter. Network ID
- id String
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Security Intrusion Item - network
Id String - networkId path parameter. Network ID
- id string
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Security Intrusion Item - network
Id string - networkId path parameter. Network ID
- id str
- The provider-assigned unique ID for this managed resource.
- item
Get
Appliance Security Intrusion Item - network_
id str - networkId path parameter. Network ID
- id String
- The provider-assigned unique ID for this managed resource.
- item Property Map
- network
Id String - networkId path parameter. Network ID
Supporting Types
GetApplianceSecurityIntrusionItem
- Ids
Rulesets string - Intrusion detection ruleset
- Mode string
- Intrusion detection mode
- Protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- Ids
Rulesets string - Intrusion detection ruleset
- Mode string
- Intrusion detection mode
- Protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids
Rulesets String - Intrusion detection ruleset
- mode String
- Intrusion detection mode
- protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids
Rulesets string - Intrusion detection ruleset
- mode string
- Intrusion detection mode
- protected
Networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids_
rulesets str - Intrusion detection ruleset
- mode str
- Intrusion detection mode
- protected_
networks GetAppliance Security Intrusion Item Protected Networks - Networks included in and excluded from the detection engine
- ids
Rulesets String - Intrusion detection ruleset
- mode String
- Intrusion detection mode
- protected
Networks Property Map - Networks included in and excluded from the detection engine
GetApplianceSecurityIntrusionItemProtectedNetworks
- Excluded
Cidrs List<string> - List of IP addresses or subnets being excluded from protection
- Included
Cidrs List<string> - List of IP addresses or subnets being protected
- Use
Default bool - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- Excluded
Cidrs []string - List of IP addresses or subnets being excluded from protection
- Included
Cidrs []string - List of IP addresses or subnets being protected
- Use
Default bool - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded
Cidrs List<String> - List of IP addresses or subnets being excluded from protection
- included
Cidrs List<String> - List of IP addresses or subnets being protected
- use
Default Boolean - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded
Cidrs string[] - List of IP addresses or subnets being excluded from protection
- included
Cidrs string[] - List of IP addresses or subnets being protected
- use
Default boolean - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded_
cidrs Sequence[str] - List of IP addresses or subnets being excluded from protection
- included_
cidrs Sequence[str] - List of IP addresses or subnets being protected
- use_
default bool - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
- excluded
Cidrs List<String> - List of IP addresses or subnets being excluded from protection
- included
Cidrs List<String> - List of IP addresses or subnets being protected
- use
Default Boolean - Whether special IPv4 addresses should be used (see: https://tools.ietf.org/html/rfc5735)
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
meraki
Terraform Provider.