kubernetesSecretEvidence resource type
Namespace: microsoft.graph.security
Represents a Kubernetes secret entity.
Inherits from alertEvidence.
Properties
Property | Type | Description |
---|---|---|
createdDateTime | DateTimeOffset | The date and time when the evidence was created and added to the alert. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . Inherited from alertEvidence. |
name | String | The secret name. |
namespace | microsoft.graph.security.kubernetesNamespaceEvidence | The secret namespace. |
remediationStatus | microsoft.graph.security.evidenceRemediationStatus | Status of the remediation action taken. The possible values are: none , remediated , prevented , blocked , notFound , unknownFutureValue . Inherited from alertEvidence. |
remediationStatusDetails | String | Details about the remediation status. Inherited from alertEvidence. |
roles | microsoft.graph.security.evidenceRole collection | One or more roles that an evidence entity represents in an alert. For example, an IP address that is associated with an attacker has the evidence role Attacker . Possible values are: unknown , contextual , scanned , source , destination , created , added , compromised , edited , attacked , attacker , commandAndControl , loaded , suspicious , policyViolator , unknownFutureValue . Inherited from alertEvidence. |
secretType | String | The secret type can include both built-in types and custom ones. Examples of built-in types are: Opaque , kubernetes.io/service-account-token , kubernetes.io/dockercfg , kubernetes.io/dockerconfigjson , kubernetes.io/basic-auth , kubernetes.io/ssh-auth , kubernetes.io/tls , bootstrap.kubernetes.io/token . |
tags | String collection | Array of custom tags associated with an evidence instance. For example, to denote a group of devices or high value assets. Inherited from alertEvidence. |
verdict | microsoft.graph.security.evidenceVerdict | The decision reached by automated investigation. The possible values are: unknown , suspicious , malicious , noThreatsFound , unknownFutureValue . Inherited from alertEvidence. |
Relationships
None.
JSON representation
The following is a JSON representation of the resource.
{
"@odata.type": "#microsoft.graph.security.kubernetesSecretEvidence",
"createdDateTime": "String (timestamp)",
"name": "String",
"namespace": {
"@odata.type": "microsoft.graph.security.kubernetesNamespaceEvidence"
},
"remediationStatus": "String",
"remediationStatusDetails": "String",
"roles": ["String"],
"secretType": "String",
"tags": ["String"],
"verdict": "String"
}
피드백
https://aka.ms/ContentUserFeedback
출시 예정: 2024년 내내 콘텐츠에 대한 피드백 메커니즘으로 GitHub 문제를 단계적으로 폐지하고 이를 새로운 피드백 시스템으로 바꿀 예정입니다. 자세한 내용은 다음을 참조하세요.다음에 대한 사용자 의견 제출 및 보기