Skip to content

Commit cc36917

Browse files
author
ci.datadog-api-spec
committed
Regenerate client from commit 04d32e8 of spec repo
1 parent ea9be4f commit cc36917

6 files changed

Lines changed: 336 additions & 9 deletions

File tree

config/_default/menus/api.en.yaml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2624,6 +2624,30 @@ menu:
26242624
unstable:
26252625
- v2
26262626
order: 69
2627+
- name: Get suggested actions for a signal
2628+
url: '#get-suggested-actions-for-a-signal'
2629+
identifier: security-monitoring-get-suggested-actions-for-a-signal
2630+
parent: security-monitoring
2631+
generated: true
2632+
params:
2633+
versions:
2634+
- v2
2635+
operationids:
2636+
- GetSuggestedActionsMatchingSignal
2637+
unstable: []
2638+
order: 88
2639+
- name: Get investigation queries for a signal
2640+
url: '#get-investigation-queries-for-a-signal'
2641+
identifier: security-monitoring-get-investigation-queries-for-a-signal
2642+
parent: security-monitoring
2643+
generated: true
2644+
params:
2645+
versions:
2646+
- v2
2647+
operationids:
2648+
- GetInvestigationLogQueriesMatchingSignal
2649+
unstable: []
2650+
order: 87
26272651
- name: Change the related incidents of a security signal
26282652
url: '#change-the-related-incidents-of-a-security-signal'
26292653
identifier: security-monitoring-change-the-related-incidents-of-a-security-signal

content/en/api/v2/datasets/examples.json

Lines changed: 6 additions & 6 deletions
Large diffs are not rendered by default.

content/en/api/v2/security-monitoring/examples.json

Lines changed: 106 additions & 0 deletions
Large diffs are not rendered by default.

data/api/v2/full_spec.yaml

Lines changed: 191 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25277,7 +25277,7 @@ components:
2527725277
product:
2527825278
description: |-
2527925279
Name of the product the dataset is for. Possible values are 'apm', 'rum',
25280-
'metrics' (Custom Metrics), 'logs', 'error_tracking', 'cloud_cost', and 'sd_repoinfo'.
25280+
'metrics', 'logs', 'error_tracking', 'cloud_cost', and 'sd_repoinfo'.
2528125281
example: "logs"
2528225282
type: string
2528325283
required:
@@ -58761,6 +58761,17 @@ components:
5876158761
required:
5876258762
- data
5876358763
type: object
58764+
SecurityMonitoringSignalInvestigationQueryTemplateVariables:
58765+
additionalProperties:
58766+
items:
58767+
description: A value for this template variable extracted from the signal.
58768+
type: string
58769+
type: array
58770+
description: Template variables applied to the investigation log query, mapping attribute paths to values extracted from the signal.
58771+
example:
58772+
"@userIdentity.arn":
58773+
- foo
58774+
type: object
5876458775
SecurityMonitoringSignalListRequest:
5876558776
description: The request for a security signal list.
5876658777
properties:
@@ -59146,6 +59157,82 @@ components:
5914659157
required:
5914759158
- data
5914859159
type: object
59160+
SecurityMonitoringSignalSuggestedAction:
59161+
description: A suggested action for a security signal.
59162+
properties:
59163+
attributes:
59164+
$ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionAttributes"
59165+
id:
59166+
description: The unique ID of the suggested action.
59167+
example: w00-t10-992
59168+
type: string
59169+
type:
59170+
$ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionType"
59171+
required:
59172+
- id
59173+
- type
59174+
- attributes
59175+
type: object
59176+
SecurityMonitoringSignalSuggestedActionAttributes:
59177+
description: Attributes of a suggested action for a security signal. The available fields depend on the action type.
59178+
properties:
59179+
name:
59180+
description: The name of the investigation log query.
59181+
example: Cloudtrail events for user ARN
59182+
type: string
59183+
query_filter:
59184+
description: The log query filter for the investigation.
59185+
example: 'source:cloudtrail @userIdentity.arn:"foo"'
59186+
type: string
59187+
template_variables:
59188+
$ref: "#/components/schemas/SecurityMonitoringSignalInvestigationQueryTemplateVariables"
59189+
title:
59190+
description: The title of the recommended blog post.
59191+
example: Monitor Okta logs to track system access and unusual activity
59192+
type: string
59193+
url:
59194+
description: The URL of the suggested action.
59195+
example: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
59196+
type: string
59197+
type: object
59198+
SecurityMonitoringSignalSuggestedActionList:
59199+
description: List of suggested actions for a security signal.
59200+
example:
59201+
- attributes:
59202+
name: Cloudtrail events for user ARN
59203+
query_filter: 'source:cloudtrail @userIdentity.arn:"foo"'
59204+
template_variables:
59205+
"@userIdentity.arn":
59206+
- foo
59207+
url: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
59208+
id: w00-t10-992
59209+
type: investigation_log_queries
59210+
- attributes:
59211+
title: Monitor Okta logs to track system access and unusual activity
59212+
url: https://www.datadoghq.com/blog/monitor-activity-with-okta/
59213+
id: bxy-o8v-i1a
59214+
type: recommended_blog_posts
59215+
items:
59216+
$ref: "#/components/schemas/SecurityMonitoringSignalSuggestedAction"
59217+
type: array
59218+
SecurityMonitoringSignalSuggestedActionType:
59219+
description: The type of the suggested action resource.
59220+
enum:
59221+
- investigation_log_queries
59222+
- recommended_blog_posts
59223+
example: investigation_log_queries
59224+
type: string
59225+
x-enum-varnames:
59226+
- INVESTIGATION_LOG_QUERIES
59227+
- RECOMMENDED_BLOG_POSTS
59228+
SecurityMonitoringSignalSuggestedActionsResponse:
59229+
description: Response with suggested actions for a security signal.
59230+
properties:
59231+
data:
59232+
$ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionList"
59233+
required:
59234+
- data
59235+
type: object
5914959236
SecurityMonitoringSignalTriageAttributes:
5915059237
description: Attributes describing a triage state update operation over a security signal.
5915159238
properties:
@@ -106064,6 +106151,57 @@ paths:
106064106151
operator: OR
106065106152
permissions:
106066106153
- security_monitoring_signals_write
106154+
/api/v2/security_monitoring/signals/{signal_id}/investigation_queries:
106155+
get:
106156+
description: Get the list of investigation log queries available for a given security signal.
106157+
operationId: GetInvestigationLogQueriesMatchingSignal
106158+
parameters:
106159+
- $ref: "#/components/parameters/SignalID"
106160+
responses:
106161+
"200":
106162+
content:
106163+
application/json:
106164+
examples:
106165+
default:
106166+
value:
106167+
data:
106168+
- attributes:
106169+
name: Cloudtrail events for user ARN
106170+
query_filter: 'source:cloudtrail @userIdentity.arn:"foo"'
106171+
template_variables:
106172+
"@userIdentity.arn":
106173+
- foo
106174+
url: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
106175+
id: w00-t10-992
106176+
type: investigation_log_queries
106177+
- attributes:
106178+
title: Monitor Okta logs to track system access and unusual activity
106179+
url: https://www.datadoghq.com/blog/monitor-activity-with-okta/
106180+
id: bxy-o8v-i1a
106181+
type: recommended_blog_posts
106182+
schema:
106183+
$ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionsResponse"
106184+
description: OK
106185+
"403":
106186+
$ref: "#/components/responses/NotAuthorizedResponse"
106187+
"404":
106188+
$ref: "#/components/responses/NotFoundResponse"
106189+
"429":
106190+
$ref: "#/components/responses/TooManyRequestsResponse"
106191+
security:
106192+
- apiKeyAuth: []
106193+
appKeyAuth: []
106194+
- AuthZ:
106195+
- security_monitoring_rules_read
106196+
- security_monitoring_signals_read
106197+
summary: Get investigation queries for a signal
106198+
tags: ["Security Monitoring"]
106199+
x-menu-order: 87
106200+
x-permission:
106201+
operator: AND
106202+
permissions:
106203+
- security_monitoring_rules_read
106204+
- security_monitoring_signals_read
106067106205
/api/v2/security_monitoring/signals/{signal_id}/state:
106068106206
patch:
106069106207
description: |-
@@ -106105,6 +106243,57 @@ paths:
106105106243
operator: OR
106106106244
permissions:
106107106245
- security_monitoring_signals_write
106246+
/api/v2/security_monitoring/signals/{signal_id}/suggested_actions:
106247+
get:
106248+
description: Get the list of suggested actions for a given security signal.
106249+
operationId: GetSuggestedActionsMatchingSignal
106250+
parameters:
106251+
- $ref: "#/components/parameters/SignalID"
106252+
responses:
106253+
"200":
106254+
content:
106255+
application/json:
106256+
examples:
106257+
default:
106258+
value:
106259+
data:
106260+
- attributes:
106261+
name: Cloudtrail events for user ARN
106262+
query_filter: 'source:cloudtrail @userIdentity.arn:"foo"'
106263+
template_variables:
106264+
"@userIdentity.arn":
106265+
- foo
106266+
url: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
106267+
id: w00-t10-992
106268+
type: investigation_log_queries
106269+
- attributes:
106270+
title: Monitor Okta logs to track system access and unusual activity
106271+
url: https://www.datadoghq.com/blog/monitor-activity-with-okta/
106272+
id: bxy-o8v-i1a
106273+
type: recommended_blog_posts
106274+
schema:
106275+
$ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionsResponse"
106276+
description: OK
106277+
"403":
106278+
$ref: "#/components/responses/NotAuthorizedResponse"
106279+
"404":
106280+
$ref: "#/components/responses/NotFoundResponse"
106281+
"429":
106282+
$ref: "#/components/responses/TooManyRequestsResponse"
106283+
security:
106284+
- apiKeyAuth: []
106285+
appKeyAuth: []
106286+
- AuthZ:
106287+
- security_monitoring_rules_read
106288+
- security_monitoring_signals_read
106289+
summary: Get suggested actions for a signal
106290+
tags: ["Security Monitoring"]
106291+
x-menu-order: 88
106292+
x-permission:
106293+
operator: AND
106294+
permissions:
106295+
- security_monitoring_rules_read
106296+
- security_monitoring_signals_read
106108106297
/api/v2/sensitive-data-scanner/config:
106109106298
get:
106110106299
description: List all the Scanning groups in your organization.
@@ -114679,7 +114868,7 @@ tags:
114679114868
- description: |-
114680114869
Data Access Controls in Datadog is a feature that allows administrators and access managers to regulate
114681114870
access to sensitive data. By defining Restricted Datasets, you can ensure that only specific teams or roles can
114682-
view certain types of telemetry (for example, logs, traces, custom metrics, and RUM data).
114871+
view certain types of telemetry (for example, logs, traces, metrics, and RUM data).
114683114872
name: Datasets
114684114873
- description: |-
114685114874
Manage Deployment Gates using this API to reduce the likelihood and impact of incidents caused by deployments. See the [Deployment Gates documentation](https://docs.datadoghq.com/deployment_gates/) for more information.

data/api/v2/translate_actions.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3721,12 +3721,20 @@
37213721
"request_description": "Attributes describing the signal update.",
37223722
"request_schema_description": "Request body for changing the related incidents of a given security monitoring signal."
37233723
},
3724+
"GetInvestigationLogQueriesMatchingSignal": {
3725+
"description": "Get the list of investigation log queries available for a given security signal.",
3726+
"summary": "Get investigation queries for a signal"
3727+
},
37243728
"EditSecurityMonitoringSignalState": {
37253729
"description": "Change the triage state of a security signal.",
37263730
"summary": "Change the triage state of a security signal",
37273731
"request_description": "Attributes describing the signal update.",
37283732
"request_schema_description": "Request body for changing the state of a given security monitoring signal."
37293733
},
3734+
"GetSuggestedActionsMatchingSignal": {
3735+
"description": "Get the list of suggested actions for a given security signal.",
3736+
"summary": "Get suggested actions for a signal"
3737+
},
37303738
"ListScanningGroups": {
37313739
"description": "List all the Scanning groups in your organization.",
37323740
"summary": "List Scanning Groups"

data/api/v2/translate_tags.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@
125125
},
126126
"datasets": {
127127
"name": "Datasets",
128-
"description": "Data Access Controls in Datadog is a feature that allows administrators and access managers to regulate\naccess to sensitive data. By defining Restricted Datasets, you can ensure that only specific teams or roles can\nview certain types of telemetry (for example, logs, traces, custom metrics, and RUM data)."
128+
"description": "Data Access Controls in Datadog is a feature that allows administrators and access managers to regulate\naccess to sensitive data. By defining Restricted Datasets, you can ensure that only specific teams or roles can\nview certain types of telemetry (for example, logs, traces, metrics, and RUM data)."
129129
},
130130
"deployment-gates": {
131131
"name": "Deployment Gates",

0 commit comments

Comments
 (0)