Skip to content

Latest commit

 

History

History
66 lines (55 loc) · 3.56 KB

File metadata and controls

66 lines (55 loc) · 3.56 KB
title kubernetesControllerEvidence resource type
description Represents a base entity type for a Kubernetes controller.
author MSRonBorysowski
ms.localizationpriority medium
ms.subservice security
doc_type resourcePageType
ms.date 07/22/2024

kubernetesControllerEvidence resource type

Namespace: microsoft.graph.security

[!INCLUDE beta-disclaimer]

Represents a base entity type for a Kubernetes controller.

Inherits from alertEvidence.

Properties

Property Type Description
createdDateTime DateTimeOffset The date and time when the evidence was created and added to the alert. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Inherited from alertEvidence.
name String The controller name.
namespace microsoft.graph.security.kubernetesNamespaceEvidence The service account namespace.
labels microsoft.graph.security.dictionary The labels for the Kubernetes pod.
remediationStatus microsoft.graph.security.evidenceRemediationStatus Status of the remediation action taken. The possible values are: none, remediated, prevented, blocked, notFound, unknownFutureValue. Inherited from alertEvidence.
remediationStatusDetails String Details about the remediation status. Inherited from alertEvidence.
roles microsoft.graph.security.evidenceRole collection One or more roles that an evidence entity represents in an alert. For example, an IP address that is associated with an attacker has the evidence role Attacker. The possible values are: unknown, contextual, scanned, source, destination, created, added, compromised, edited, attacked, attacker, commandAndControl, loaded, suspicious, policyViolator, unknownFutureValue. Inherited from alertEvidence.
tags String collection Array of custom tags associated with an evidence instance. For example, to denote a group of devices or high value assets. Inherited from alertEvidence.
type String The controller type.
verdict microsoft.graph.security.evidenceVerdict The decision reached by automated investigation. The possible values are: unknown, suspicious, malicious, noThreatsFound, unknownFutureValue. Inherited from alertEvidence.

Relationships

None.

JSON representation

The following JSON representation shows the resource type.

{
  "@odata.type": "#microsoft.graph.security.kubernetesControllerEvidence",
  "createdDateTime": "String (timestamp)",
  "labels": {
    "@odata.type": "microsoft.graph.security.dictionary"
  },
  "name": "String",
  "namespace": {
    "@odata.type": "microsoft.graph.security.kubernetesNamespaceEvidence"
  },
  "remediationStatus": "String",
  "remediationStatusDetails": "String",
  "roles": ["String"],
  "tags": ["String"],
  "type": "String",
  "verdict": "String"
}