Bewerken

Delen via


kubernetesPodEvidence resource type

Namespace: microsoft.graph.security

Important

APIs under the /beta version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. To determine whether an API is available in v1.0, use the Version selector.

Represents a Kubernetes pod entity.

Inherits from alertEvidence.

Properties

Property Type Description
containers microsoft.graph.security.containerEvidence collection The list of pod containers which are not init or ephemeral containers.
controller microsoft.graph.security.kubernetesControllerEvidence The pod controller.
createdDateTime DateTimeOffset The date and time when the evidence was created and added to the alert. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Inherited from alertEvidence.
ephemeralContainers microsoft.graph.security.containerEvidence collection The list of pod ephemeral containers.
initContainers microsoft.graph.security.containerEvidence collection The list of pod init containers.
labels microsoft.graph.security.dictionary The pod labels.
name String The pod name.
namespace microsoft.graph.security.kubernetesNamespaceEvidence The pod namespace.
podIp microsoft.graph.security.ipEvidence The pod IP.
remediationStatus microsoft.graph.security.evidenceRemediationStatus Status of the remediation action taken. The possible values are: none, remediated, prevented, blocked, notFound, unknownFutureValue. Inherited from alertEvidence.
remediationStatusDetails String Details about the remediation status. Inherited from alertEvidence.
roles microsoft.graph.security.evidenceRole collection One or more roles that an evidence entity represents in an alert. For example, an IP address that is associated with an attacker has the evidence role Attacker. Possible values are: unknown, contextual, scanned, source, destination, created, added, compromised, edited, attacked, attacker, commandAndControl, loaded, suspicious, policyViolator, unknownFutureValue. Inherited from alertEvidence.
serviceAccount microsoft.graph.security.kubernetesServiceAccountEvidence The pod service account.
tags String collection Array of custom tags associated with an evidence instance. For example, to denote a group of devices or high value assets. Inherited from alertEvidence.
verdict microsoft.graph.security.evidenceVerdict The decision reached by automated investigation. The possible values are: unknown, suspicious, malicious, noThreatsFound, unknownFutureValue. Inherited from alertEvidence.

Relationships

None.

JSON representation

The following JSON representation shows the resource type.

{
  "@odata.type": "#microsoft.graph.security.kubernetesPodEvidence",
  "containers": [{
    "@odata.type": "microsoft.graph.security.containerEvidence"
  }],
  "controller": {
    "@odata.type": "microsoft.graph.security.kubernetesControllerEvidence"
  },
  "createdDateTime": "String (timestamp)",
  "ephemeralContainers": [{
    "@odata.type": "microsoft.graph.security.containerEvidence"
  }],
  "initContainers": [{
    "@odata.type": "microsoft.graph.security.containerEvidence"
  }],
  "labels": {
    "@odata.type": "microsoft.graph.security.dictionary"
  },
  "name": "String",
  "namespace": {
    "@odata.type": "microsoft.graph.security.kubernetesNamespaceEvidence"
  },
  "podIp": {
    "@odata.type": "microsoft.graph.security.ipEvidence"
  },
  "remediationStatus": "String",
  "remediationStatusDetails": "String",
  "roles": ["String"],
  "serviceAccount": {
    "@odata.type": "microsoft.graph.security.kubernetesServiceAccountEvidence"
  },
  "tags": ["String"],
  "verdict": "String"
}