Skip to content

Commit 7017021

Browse files
committed
NSOF-5818 alert: fix documentation
1 parent fd520de commit 7017021

File tree

3 files changed

+33
-33
lines changed

3 files changed

+33
-33
lines changed

docs/data-sources/alert.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ subcategory: "Notifications"
55
description: |-
66
Alerts let you monitor data including network traffic and activities, or various security events like password resets and missing certificates.
77
You can examine and filter any type of event, as well as define alert notifications to be sent to email, webhooks (integrating with SaaS apps), PagerDuty or Slack.
8-
Alerts can configure either spike_condition or threshold_condition
8+
Alerts can be configured using either spike_condition or threshold_condition
99
---
1010

1111
# pfptmeta_alert (Data Source)
1212

1313
Alerts let you monitor data including network traffic and activities, or various security events like password resets and missing certificates.
1414
You can examine and filter any type of event, as well as define alert notifications to be sent to email, webhooks (integrating with SaaS apps), PagerDuty or Slack.
15-
Alerts can configure either `spike_condition` or `threshold_condition`
15+
Alerts can be configured using either `spike_condition` or `threshold_condition`
1616

1717
## Example Usage
1818

@@ -44,16 +44,16 @@ output "alert" {
4444
You can use free text and/or alert field names surrounded with a "${ }". For example, "${hits} have failed to login".
4545
- **query_text** (String)
4646
- **source_type** (String) Logs type. Supported log types:
47-
- **security_audit**- The `security_audit` logs provide the administrator visibility into events which are generated by device and user security-related activity, such as user authenticating into Proofpoint NaaS, users changing their passwords, posture check failures, etc. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#security-logs) for more.
48-
- **api_audit** - The `api_audit` logs captures details of administrator activity: the timestamp and identity of administrators who accessed the Proofpoint NaaS tenant, and configuration changes that were made by the administrator. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#audit-logs) for more.
49-
- **traffic_audit** - The `traffic_audit` logs provide detailed visibility into each element in the system covering network traffic including DNS and other OSI Layer 3 and 4 traffic details. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#traffic-logs) for more.
50-
- **metaproxy_audit** - The `metaproxy_audit` logs provide the administrator visibility into the clientless access from their employees into web applications configured via EasyLink policy. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#metaconnect-web-logs) for more.
51-
- **webfilter_audit** - The `webfilter_audit` logs provide the administrator visibility into the events generated by the Web Security engine. See [here](https://help.metanetworks.com/knowledgebase/logs_ws/) for more
47+
- **security_audit**- The `security_audit` logs provide the administrator visibility into events which are generated by device and user security-related activity, such as user authenticating into Proofpoint NaaS, users changing their passwords, posture check failures, etc. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#security-logs) for details.
48+
- **api_audit** - The `api_audit` logs capture details of administrator activity: the timestamp and identity of administrators who accessed the Proofpoint NaaS tenant, and configuration changes that were made by the administrator. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#audit-logs) for details.
49+
- **traffic_audit** - The `traffic_audit` logs provide detailed visibility into each element in the system covering network traffic including DNS and other OSI Layer 3 and 4 traffic details. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#traffic-logs) for details.
50+
- **metaproxy_audit** - The `metaproxy_audit` logs provide the administrator visibility into the clientless access of their employees to web applications configured via EasyLink policy. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#metaconnect-web-logs) for details.
51+
- **webfilter_audit** - The `webfilter_audit` logs provide the administrator visibility into the events generated by the Web Security engine. See [here](https://help.metanetworks.com/knowledgebase/logs_ws/) for details
5252
.
5353
- **spike_condition** (List of Object) (see [below for nested schema](#nestedatt--spike_condition))
5454
- **threshold_condition** (List of Object) (see [below for nested schema](#nestedatt--threshold_condition))
5555
- **type** (String)
56-
- **window** (Number) The time window of the check (in mins), ENUM: 1, 3, 5, 10, 30, 60, 360, 1440, 2880, 10080.
56+
- **window** (Number) The time window of the check (in mins), ENUM: `1`, `3`, `5`, `10`, `30`, `60`, `360`, `1440`, `2880`, `10080`.
5757

5858
<a id="nestedatt--spike_condition"></a>
5959
### Nested Schema for `spike_condition`

docs/resources/alert.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ subcategory: "Notifications"
55
description: |-
66
Alerts let you monitor data including network traffic and activities, or various security events like password resets and missing certificates.
77
You can examine and filter any type of event, as well as define alert notifications to be sent to email, webhooks (integrating with SaaS apps), PagerDuty or Slack.
8-
Alerts can configure either spike_condition or threshold_condition
8+
Alerts can be configured using either spike_condition or threshold_condition
99
---
1010

1111
# pfptmeta_alert (Resource)
1212

1313
Alerts let you monitor data including network traffic and activities, or various security events like password resets and missing certificates.
1414
You can examine and filter any type of event, as well as define alert notifications to be sent to email, webhooks (integrating with SaaS apps), PagerDuty or Slack.
15-
Alerts can configure either `spike_condition` or `threshold_condition`
15+
Alerts can be configured using either `spike_condition` or `threshold_condition`
1616

1717
## Example Usage
1818

@@ -66,13 +66,13 @@ resource "pfptmeta_alert" "threshold_condition_alert" {
6666
- **name** (String)
6767
- **query_text** (String)
6868
- **source_type** (String) Logs type. Supported log types:
69-
- **security_audit**- The `security_audit` logs provide the administrator visibility into events which are generated by device and user security-related activity, such as user authenticating into Proofpoint NaaS, users changing their passwords, posture check failures, etc. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#security-logs) for more.
70-
- **api_audit** - The `api_audit` logs captures details of administrator activity: the timestamp and identity of administrators who accessed the Proofpoint NaaS tenant, and configuration changes that were made by the administrator. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#audit-logs) for more.
71-
- **traffic_audit** - The `traffic_audit` logs provide detailed visibility into each element in the system covering network traffic including DNS and other OSI Layer 3 and 4 traffic details. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#traffic-logs) for more.
72-
- **metaproxy_audit** - The `metaproxy_audit` logs provide the administrator visibility into the clientless access from their employees into web applications configured via EasyLink policy. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#metaconnect-web-logs) for more.
73-
- **webfilter_audit** - The `webfilter_audit` logs provide the administrator visibility into the events generated by the Web Security engine. See [here](https://help.metanetworks.com/knowledgebase/logs_ws/) for more
69+
- **security_audit**- The `security_audit` logs provide the administrator visibility into events which are generated by device and user security-related activity, such as user authenticating into Proofpoint NaaS, users changing their passwords, posture check failures, etc. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#security-logs) for details.
70+
- **api_audit** - The `api_audit` logs capture details of administrator activity: the timestamp and identity of administrators who accessed the Proofpoint NaaS tenant, and configuration changes that were made by the administrator. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#audit-logs) for details.
71+
- **traffic_audit** - The `traffic_audit` logs provide detailed visibility into each element in the system covering network traffic including DNS and other OSI Layer 3 and 4 traffic details. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#traffic-logs) for details.
72+
- **metaproxy_audit** - The `metaproxy_audit` logs provide the administrator visibility into the clientless access of their employees to web applications configured via EasyLink policy. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#metaconnect-web-logs) for details.
73+
- **webfilter_audit** - The `webfilter_audit` logs provide the administrator visibility into the events generated by the Web Security engine. See [here](https://help.metanetworks.com/knowledgebase/logs_ws/) for details
7474
.
75-
- **window** (Number) The time window of the check (in mins), ENUM: 1, 3, 5, 10, 30, 60, 360, 1440, 2880, 10080.
75+
- **window** (Number) The time window of the check (in mins), ENUM: `1`, `3`, `5`, `10`, `30`, `60`, `360`, `1440`, `2880`, `10080`.
7676

7777
### Optional
7878

@@ -94,9 +94,9 @@ resource "pfptmeta_alert" "threshold_condition_alert" {
9494

9595
Required:
9696

97-
- **spike_ratio** (Number) The diff between hits that triggers alert (in percents)
98-
- **spike_type** (String) Spike type, ENUM: "up", "down", "both".
99-
- **time_diff** (Number) Time difference in minutes between current and reference window, Enum: 1, 3, 5, 60, 1440, 10080.
97+
- **spike_ratio** (Number) The difference between hits that triggers alert (in percents).
98+
- **spike_type** (String) Spike type, ENUM: `up`, `down`, `both`.
99+
- **time_diff** (Number) Time difference in minutes between current and reference window, Enum: `1`, `3`, `5`, `60`, `1440`, `10080`.
100100

101101
Optional:
102102

@@ -108,9 +108,9 @@ Optional:
108108

109109
Required:
110110

111-
- **op** (String) Operator used to compare to the threshold, ENUM: "greater", "greaterequals", "less", "lessequals", "equals".
111+
- **op** (String) Operator used to compare to the threshold, ENUM: `greater`, `greaterequals`, `less`, `lessequals`, `equals`.
112112
- **threshold** (Number) The threshold to compare result of the formula.
113113

114114
Optional:
115115

116-
- **formula** (String) Mathematical formula to run on the events, ENUM: "count".
116+
- **formula** (String) Mathematical formula to run on the events, ENUM: `count`.

internal/provider/alert/common.go

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,25 +11,25 @@ import (
1111
const (
1212
description = "Alerts let you monitor data including network traffic and activities, or various security events like password resets and missing certificates.\n" +
1313
"You can examine and filter any type of event, as well as define alert notifications to be sent to email, webhooks (integrating with SaaS apps), PagerDuty or Slack.\n" +
14-
"Alerts can configure either `spike_condition` or `threshold_condition`"
14+
"Alerts can be configured using either `spike_condition` or `threshold_condition`"
1515
channelsDesc = "List of notification channel IDs."
1616
groupByDesc = "The group by field name."
1717
notifyMessageDesc = "Creates a custom message that will be sent to your notification channels.\n" +
1818
" You can use free text and/or alert field names surrounded with a \"${ }\". For example, \"${hits} have failed to login\"."
1919
sourceTypeDesc = "Logs type. Supported log types:\n" +
20-
" - **security_audit**- The `security_audit` logs provide the administrator visibility into events which are generated by device and user security-related activity, such as user authenticating into Proofpoint NaaS, users changing their passwords, posture check failures, etc. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#security-logs) for more.\n" +
21-
" - **api_audit** - The `api_audit` logs captures details of administrator activity: the timestamp and identity of administrators who accessed the Proofpoint NaaS tenant, and configuration changes that were made by the administrator. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#audit-logs) for more.\n" +
22-
" - **traffic_audit** - The `traffic_audit` logs provide detailed visibility into each element in the system covering network traffic including DNS and other OSI Layer 3 and 4 traffic details. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#traffic-logs) for more.\n" +
23-
" - **metaproxy_audit** - The `metaproxy_audit` logs provide the administrator visibility into the clientless access from their employees into web applications configured via EasyLink policy. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#metaconnect-web-logs) for more.\n" +
24-
" - **webfilter_audit** - The `webfilter_audit` logs provide the administrator visibility into the events generated by the Web Security engine. See [here](https://help.metanetworks.com/knowledgebase/logs_ws/) for more\n."
20+
" - **security_audit**- The `security_audit` logs provide the administrator visibility into events which are generated by device and user security-related activity, such as user authenticating into Proofpoint NaaS, users changing their passwords, posture check failures, etc. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#security-logs) for details.\n" +
21+
" - **api_audit** - The `api_audit` logs capture details of administrator activity: the timestamp and identity of administrators who accessed the Proofpoint NaaS tenant, and configuration changes that were made by the administrator. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#audit-logs) for details.\n" +
22+
" - **traffic_audit** - The `traffic_audit` logs provide detailed visibility into each element in the system covering network traffic including DNS and other OSI Layer 3 and 4 traffic details. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#traffic-logs) for details.\n" +
23+
" - **metaproxy_audit** - The `metaproxy_audit` logs provide the administrator visibility into the clientless access of their employees to web applications configured via EasyLink policy. See [here](https://help.metanetworks.com/knowledgebase/admin_console_logs/#metaconnect-web-logs) for details.\n" +
24+
" - **webfilter_audit** - The `webfilter_audit` logs provide the administrator visibility into the events generated by the Web Security engine. See [here](https://help.metanetworks.com/knowledgebase/logs_ws/) for details\n."
2525
minHitsDesc = "Minimum number of hits in current window to check the spike."
26-
spikeRatioDesc = "The diff between hits that triggers alert (in percents)"
27-
spikeTypeDesc = "Spike type, ENUM: \"up\", \"down\", \"both\"."
28-
timeDiffDesc = "Time difference in minutes between current and reference window, Enum: 1, 3, 5, 60, 1440, 10080."
29-
formulaDesc = "Mathematical formula to run on the events, ENUM: \"count\"."
30-
opDesc = "Operator used to compare to the threshold, ENUM: \"greater\", \"greaterequals\", \"less\", \"lessequals\", \"equals\"."
26+
spikeRatioDesc = "The difference between hits that triggers alert (in percents)."
27+
spikeTypeDesc = "Spike type, ENUM: `up`, `down`, `both`."
28+
timeDiffDesc = "Time difference in minutes between current and reference window, Enum: `1`, `3`, `5`, `60`, `1440`, `10080`."
29+
formulaDesc = "Mathematical formula to run on the events, ENUM: `count`."
30+
opDesc = "Operator used to compare to the threshold, ENUM: `greater`, `greaterequals`, `less`, `lessequals`, `equals`."
3131
thresholdDesc = "The threshold to compare result of the formula."
32-
windowDesc = "The time window of the check (in mins), ENUM: 1, 3, 5, 10, 30, 60, 360, 1440, 2880, 10080."
32+
windowDesc = "The time window of the check (in mins), ENUM: `1`, `3`, `5`, `10`, `30`, `60`, `360`, `1440`, `2880`, `10080`."
3333
)
3434

3535
var excludedKeys = []string{"id", "spike_condition", "threshold_condition"}

0 commit comments

Comments
 (0)