@@ -25277,7 +25277,7 @@ components:
2527725277 product:
2527825278 description: |-
2527925279 Name of the product the dataset is for. Possible values are 'apm', 'rum',
25280- 'metrics' (Custom Metrics) , 'logs', 'error_tracking', 'cloud_cost', and 'sd_repoinfo'.
25280+ 'metrics', 'logs', 'error_tracking', 'cloud_cost', and 'sd_repoinfo'.
2528125281 example: "logs"
2528225282 type: string
2528325283 required:
@@ -58761,6 +58761,17 @@ components:
5876158761 required:
5876258762 - data
5876358763 type: object
58764+ SecurityMonitoringSignalInvestigationQueryTemplateVariables:
58765+ additionalProperties:
58766+ items:
58767+ description: A value for this template variable extracted from the signal.
58768+ type: string
58769+ type: array
58770+ description: Template variables applied to the investigation log query, mapping attribute paths to values extracted from the signal.
58771+ example:
58772+ "@userIdentity.arn":
58773+ - foo
58774+ type: object
5876458775 SecurityMonitoringSignalListRequest:
5876558776 description: The request for a security signal list.
5876658777 properties:
@@ -59146,6 +59157,82 @@ components:
5914659157 required:
5914759158 - data
5914859159 type: object
59160+ SecurityMonitoringSignalSuggestedAction:
59161+ description: A suggested action for a security signal.
59162+ properties:
59163+ attributes:
59164+ $ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionAttributes"
59165+ id:
59166+ description: The unique ID of the suggested action.
59167+ example: w00-t10-992
59168+ type: string
59169+ type:
59170+ $ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionType"
59171+ required:
59172+ - id
59173+ - type
59174+ - attributes
59175+ type: object
59176+ SecurityMonitoringSignalSuggestedActionAttributes:
59177+ description: Attributes of a suggested action for a security signal. The available fields depend on the action type.
59178+ properties:
59179+ name:
59180+ description: The name of the investigation log query.
59181+ example: Cloudtrail events for user ARN
59182+ type: string
59183+ query_filter:
59184+ description: The log query filter for the investigation.
59185+ example: 'source:cloudtrail @userIdentity.arn:"foo"'
59186+ type: string
59187+ template_variables:
59188+ $ref: "#/components/schemas/SecurityMonitoringSignalInvestigationQueryTemplateVariables"
59189+ title:
59190+ description: The title of the recommended blog post.
59191+ example: Monitor Okta logs to track system access and unusual activity
59192+ type: string
59193+ url:
59194+ description: The URL of the suggested action.
59195+ example: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
59196+ type: string
59197+ type: object
59198+ SecurityMonitoringSignalSuggestedActionList:
59199+ description: List of suggested actions for a security signal.
59200+ example:
59201+ - attributes:
59202+ name: Cloudtrail events for user ARN
59203+ query_filter: 'source:cloudtrail @userIdentity.arn:"foo"'
59204+ template_variables:
59205+ "@userIdentity.arn":
59206+ - foo
59207+ url: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
59208+ id: w00-t10-992
59209+ type: investigation_log_queries
59210+ - attributes:
59211+ title: Monitor Okta logs to track system access and unusual activity
59212+ url: https://www.datadoghq.com/blog/monitor-activity-with-okta/
59213+ id: bxy-o8v-i1a
59214+ type: recommended_blog_posts
59215+ items:
59216+ $ref: "#/components/schemas/SecurityMonitoringSignalSuggestedAction"
59217+ type: array
59218+ SecurityMonitoringSignalSuggestedActionType:
59219+ description: The type of the suggested action resource.
59220+ enum:
59221+ - investigation_log_queries
59222+ - recommended_blog_posts
59223+ example: investigation_log_queries
59224+ type: string
59225+ x-enum-varnames:
59226+ - INVESTIGATION_LOG_QUERIES
59227+ - RECOMMENDED_BLOG_POSTS
59228+ SecurityMonitoringSignalSuggestedActionsResponse:
59229+ description: Response with suggested actions for a security signal.
59230+ properties:
59231+ data:
59232+ $ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionList"
59233+ required:
59234+ - data
59235+ type: object
5914959236 SecurityMonitoringSignalTriageAttributes:
5915059237 description: Attributes describing a triage state update operation over a security signal.
5915159238 properties:
@@ -106064,6 +106151,57 @@ paths:
106064106151 operator: OR
106065106152 permissions:
106066106153 - security_monitoring_signals_write
106154+ /api/v2/security_monitoring/signals/{signal_id}/investigation_queries:
106155+ get:
106156+ description: Get the list of investigation log queries available for a given security signal.
106157+ operationId: GetInvestigationLogQueriesMatchingSignal
106158+ parameters:
106159+ - $ref: "#/components/parameters/SignalID"
106160+ responses:
106161+ "200":
106162+ content:
106163+ application/json:
106164+ examples:
106165+ default:
106166+ value:
106167+ data:
106168+ - attributes:
106169+ name: Cloudtrail events for user ARN
106170+ query_filter: 'source:cloudtrail @userIdentity.arn:"foo"'
106171+ template_variables:
106172+ "@userIdentity.arn":
106173+ - foo
106174+ url: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
106175+ id: w00-t10-992
106176+ type: investigation_log_queries
106177+ - attributes:
106178+ title: Monitor Okta logs to track system access and unusual activity
106179+ url: https://www.datadoghq.com/blog/monitor-activity-with-okta/
106180+ id: bxy-o8v-i1a
106181+ type: recommended_blog_posts
106182+ schema:
106183+ $ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionsResponse"
106184+ description: OK
106185+ "403":
106186+ $ref: "#/components/responses/NotAuthorizedResponse"
106187+ "404":
106188+ $ref: "#/components/responses/NotFoundResponse"
106189+ "429":
106190+ $ref: "#/components/responses/TooManyRequestsResponse"
106191+ security:
106192+ - apiKeyAuth: []
106193+ appKeyAuth: []
106194+ - AuthZ:
106195+ - security_monitoring_rules_read
106196+ - security_monitoring_signals_read
106197+ summary: Get investigation queries for a signal
106198+ tags: ["Security Monitoring"]
106199+ x-menu-order: 87
106200+ x-permission:
106201+ operator: AND
106202+ permissions:
106203+ - security_monitoring_rules_read
106204+ - security_monitoring_signals_read
106067106205 /api/v2/security_monitoring/signals/{signal_id}/state:
106068106206 patch:
106069106207 description: |-
@@ -106105,6 +106243,57 @@ paths:
106105106243 operator: OR
106106106244 permissions:
106107106245 - security_monitoring_signals_write
106246+ /api/v2/security_monitoring/signals/{signal_id}/suggested_actions:
106247+ get:
106248+ description: Get the list of suggested actions for a given security signal.
106249+ operationId: GetSuggestedActionsMatchingSignal
106250+ parameters:
106251+ - $ref: "#/components/parameters/SignalID"
106252+ responses:
106253+ "200":
106254+ content:
106255+ application/json:
106256+ examples:
106257+ default:
106258+ value:
106259+ data:
106260+ - attributes:
106261+ name: Cloudtrail events for user ARN
106262+ query_filter: 'source:cloudtrail @userIdentity.arn:"foo"'
106263+ template_variables:
106264+ "@userIdentity.arn":
106265+ - foo
106266+ url: /logs?query=source%3Acloudtrail+%40userIdentity.arn%3A%22foo%22
106267+ id: w00-t10-992
106268+ type: investigation_log_queries
106269+ - attributes:
106270+ title: Monitor Okta logs to track system access and unusual activity
106271+ url: https://www.datadoghq.com/blog/monitor-activity-with-okta/
106272+ id: bxy-o8v-i1a
106273+ type: recommended_blog_posts
106274+ schema:
106275+ $ref: "#/components/schemas/SecurityMonitoringSignalSuggestedActionsResponse"
106276+ description: OK
106277+ "403":
106278+ $ref: "#/components/responses/NotAuthorizedResponse"
106279+ "404":
106280+ $ref: "#/components/responses/NotFoundResponse"
106281+ "429":
106282+ $ref: "#/components/responses/TooManyRequestsResponse"
106283+ security:
106284+ - apiKeyAuth: []
106285+ appKeyAuth: []
106286+ - AuthZ:
106287+ - security_monitoring_rules_read
106288+ - security_monitoring_signals_read
106289+ summary: Get suggested actions for a signal
106290+ tags: ["Security Monitoring"]
106291+ x-menu-order: 88
106292+ x-permission:
106293+ operator: AND
106294+ permissions:
106295+ - security_monitoring_rules_read
106296+ - security_monitoring_signals_read
106108106297 /api/v2/sensitive-data-scanner/config:
106109106298 get:
106110106299 description: List all the Scanning groups in your organization.
@@ -114679,7 +114868,7 @@ tags:
114679114868 - description: |-
114680114869 Data Access Controls in Datadog is a feature that allows administrators and access managers to regulate
114681114870 access to sensitive data. By defining Restricted Datasets, you can ensure that only specific teams or roles can
114682- view certain types of telemetry (for example, logs, traces, custom metrics, and RUM data).
114871+ view certain types of telemetry (for example, logs, traces, metrics, and RUM data).
114683114872 name: Datasets
114684114873 - description: |-
114685114874 Manage Deployment Gates using this API to reduce the likelihood and impact of incidents caused by deployments. See the [Deployment Gates documentation](https://docs.datadoghq.com/deployment_gates/) for more information.
0 commit comments