kubernetesPodEvidence resource type
Namespace: microsoft.graph.security
Represents a Kubernetes pod entity.
Inherits from alertEvidence.
Properties
Property | Type | Description |
---|---|---|
containers | microsoft.graph.security.containerEvidence collection | The list of pod containers which are not init or ephemeral containers. |
controller | microsoft.graph.security.kubernetesControllerEvidence | The pod controller. |
createdDateTime | DateTimeOffset | The date and time when the evidence was created and added to the alert. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . Inherited from alertEvidence. |
ephemeralContainers | microsoft.graph.security.containerEvidence collection | The list of pod ephemeral containers. |
initContainers | microsoft.graph.security.containerEvidence collection | The list of pod init containers. |
labels | microsoft.graph.security.dictionary | The pod labels. |
name | String | The pod name. |
namespace | microsoft.graph.security.kubernetesNamespaceEvidence | The pod namespace. |
podIp | microsoft.graph.security.ipEvidence | The pod IP. |
remediationStatus | microsoft.graph.security.evidenceRemediationStatus | Status of the remediation action taken. The possible values are: none , remediated , prevented , blocked , notFound , unknownFutureValue . Inherited from alertEvidence. |
remediationStatusDetails | String | Details about the remediation status. Inherited from alertEvidence. |
roles | microsoft.graph.security.evidenceRole collection | One or more roles that an evidence entity represents in an alert. For example, an IP address that is associated with an attacker has the evidence role Attacker . Possible values are: unknown , contextual , scanned , source , destination , created , added , compromised , edited , attacked , attacker , commandAndControl , loaded , suspicious , policyViolator , unknownFutureValue . Inherited from alertEvidence. |
serviceAccount | microsoft.graph.security.kubernetesServiceAccountEvidence | The pod service account. |
tags | String collection | Array of custom tags associated with an evidence instance. For example, to denote a group of devices or high value assets. Inherited from alertEvidence. |
verdict | microsoft.graph.security.evidenceVerdict | The decision reached by automated investigation. The possible values are: unknown , suspicious , malicious , noThreatsFound , unknownFutureValue . Inherited from alertEvidence. |
Relationships
None.
JSON representation
The following JSON representation shows the resource type.
{
"@odata.type": "#microsoft.graph.security.kubernetesPodEvidence",
"containers": [{
"@odata.type": "microsoft.graph.security.containerEvidence"
}],
"controller": {
"@odata.type": "microsoft.graph.security.kubernetesControllerEvidence"
},
"createdDateTime": "String (timestamp)",
"ephemeralContainers": [{
"@odata.type": "microsoft.graph.security.containerEvidence"
}],
"initContainers": [{
"@odata.type": "microsoft.graph.security.containerEvidence"
}],
"labels": {
"@odata.type": "microsoft.graph.security.dictionary"
},
"name": "String",
"namespace": {
"@odata.type": "microsoft.graph.security.kubernetesNamespaceEvidence"
},
"podIp": {
"@odata.type": "microsoft.graph.security.ipEvidence"
},
"remediationStatus": "String",
"remediationStatusDetails": "String",
"roles": ["String"],
"serviceAccount": {
"@odata.type": "microsoft.graph.security.kubernetesServiceAccountEvidence"
},
"tags": ["String"],
"verdict": "String"
}