Interface CreateCustomLogSourceRequest.Builder
- All Superinterfaces:
AwsRequest.Builder,Buildable,CopyableBuilder<CreateCustomLogSourceRequest.Builder,,CreateCustomLogSourceRequest> SdkBuilder<CreateCustomLogSourceRequest.Builder,,CreateCustomLogSourceRequest> SdkPojo,SdkRequest.Builder,SecurityLakeRequest.Builder
- Enclosing class:
CreateCustomLogSourceRequest
-
Method Summary
Modifier and TypeMethodDescriptionconfiguration(Consumer<CustomLogSourceConfiguration.Builder> configuration) The configuration used for the third-party custom source.configuration(CustomLogSourceConfiguration configuration) The configuration used for the third-party custom source.eventClasses(String... eventClasses) The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake.eventClasses(Collection<String> eventClasses) The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake.overrideConfiguration(Consumer<AwsRequestOverrideConfiguration.Builder> builderConsumer) Add an optional request override configuration.overrideConfiguration(AwsRequestOverrideConfiguration overrideConfiguration) Add an optional request override configuration.sourceName(String sourceName) Specify the name for a third-party custom source.sourceVersion(String sourceVersion) Specify the source version for the third-party custom source, to limit log collection to a specific version of custom data source.Methods inherited from interface software.amazon.awssdk.awscore.AwsRequest.Builder
overrideConfigurationMethods inherited from interface software.amazon.awssdk.utils.builder.CopyableBuilder
copyMethods inherited from interface software.amazon.awssdk.utils.builder.SdkBuilder
applyMutation, buildMethods inherited from interface software.amazon.awssdk.core.SdkPojo
equalsBySdkFields, sdkFieldsMethods inherited from interface software.amazon.awssdk.services.securitylake.model.SecurityLakeRequest.Builder
build
-
Method Details
-
configuration
The configuration used for the third-party custom source.
- Parameters:
configuration- The configuration used for the third-party custom source.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
configuration
default CreateCustomLogSourceRequest.Builder configuration(Consumer<CustomLogSourceConfiguration.Builder> configuration) The configuration used for the third-party custom source.
This is a convenience method that creates an instance of theCustomLogSourceConfiguration.Builderavoiding the need to create one manually viaCustomLogSourceConfiguration.builder().When the
Consumercompletes,SdkBuilder.build()is called immediately and its result is passed toconfiguration(CustomLogSourceConfiguration).- Parameters:
configuration- a consumer that will call methods onCustomLogSourceConfiguration.Builder- Returns:
- Returns a reference to this object so that method calls can be chained together.
- See Also:
-
eventClasses
The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake. The supported event classes are:
-
ACCESS_ACTIVITY -
FILE_ACTIVITY -
KERNEL_ACTIVITY -
KERNEL_EXTENSION -
MEMORY_ACTIVITY -
MODULE_ACTIVITY -
PROCESS_ACTIVITY -
REGISTRY_KEY_ACTIVITY -
REGISTRY_VALUE_ACTIVITY -
RESOURCE_ACTIVITY -
SCHEDULED_JOB_ACTIVITY -
SECURITY_FINDING -
ACCOUNT_CHANGE -
AUTHENTICATION -
AUTHORIZATION -
ENTITY_MANAGEMENT_AUDIT -
DHCP_ACTIVITY -
NETWORK_ACTIVITY -
DNS_ACTIVITY -
FTP_ACTIVITY -
HTTP_ACTIVITY -
RDP_ACTIVITY -
SMB_ACTIVITY -
SSH_ACTIVITY -
CONFIG_STATE -
INVENTORY_INFO -
EMAIL_ACTIVITY -
API_ACTIVITY -
CLOUD_API
- Parameters:
eventClasses- The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake. The supported event classes are:-
ACCESS_ACTIVITY -
FILE_ACTIVITY -
KERNEL_ACTIVITY -
KERNEL_EXTENSION -
MEMORY_ACTIVITY -
MODULE_ACTIVITY -
PROCESS_ACTIVITY -
REGISTRY_KEY_ACTIVITY -
REGISTRY_VALUE_ACTIVITY -
RESOURCE_ACTIVITY -
SCHEDULED_JOB_ACTIVITY -
SECURITY_FINDING -
ACCOUNT_CHANGE -
AUTHENTICATION -
AUTHORIZATION -
ENTITY_MANAGEMENT_AUDIT -
DHCP_ACTIVITY -
NETWORK_ACTIVITY -
DNS_ACTIVITY -
FTP_ACTIVITY -
HTTP_ACTIVITY -
RDP_ACTIVITY -
SMB_ACTIVITY -
SSH_ACTIVITY -
CONFIG_STATE -
INVENTORY_INFO -
EMAIL_ACTIVITY -
API_ACTIVITY -
CLOUD_API
-
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
-
eventClasses
The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake. The supported event classes are:
-
ACCESS_ACTIVITY -
FILE_ACTIVITY -
KERNEL_ACTIVITY -
KERNEL_EXTENSION -
MEMORY_ACTIVITY -
MODULE_ACTIVITY -
PROCESS_ACTIVITY -
REGISTRY_KEY_ACTIVITY -
REGISTRY_VALUE_ACTIVITY -
RESOURCE_ACTIVITY -
SCHEDULED_JOB_ACTIVITY -
SECURITY_FINDING -
ACCOUNT_CHANGE -
AUTHENTICATION -
AUTHORIZATION -
ENTITY_MANAGEMENT_AUDIT -
DHCP_ACTIVITY -
NETWORK_ACTIVITY -
DNS_ACTIVITY -
FTP_ACTIVITY -
HTTP_ACTIVITY -
RDP_ACTIVITY -
SMB_ACTIVITY -
SSH_ACTIVITY -
CONFIG_STATE -
INVENTORY_INFO -
EMAIL_ACTIVITY -
API_ACTIVITY -
CLOUD_API
- Parameters:
eventClasses- The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake. The supported event classes are:-
ACCESS_ACTIVITY -
FILE_ACTIVITY -
KERNEL_ACTIVITY -
KERNEL_EXTENSION -
MEMORY_ACTIVITY -
MODULE_ACTIVITY -
PROCESS_ACTIVITY -
REGISTRY_KEY_ACTIVITY -
REGISTRY_VALUE_ACTIVITY -
RESOURCE_ACTIVITY -
SCHEDULED_JOB_ACTIVITY -
SECURITY_FINDING -
ACCOUNT_CHANGE -
AUTHENTICATION -
AUTHORIZATION -
ENTITY_MANAGEMENT_AUDIT -
DHCP_ACTIVITY -
NETWORK_ACTIVITY -
DNS_ACTIVITY -
FTP_ACTIVITY -
HTTP_ACTIVITY -
RDP_ACTIVITY -
SMB_ACTIVITY -
SSH_ACTIVITY -
CONFIG_STATE -
INVENTORY_INFO -
EMAIL_ACTIVITY -
API_ACTIVITY -
CLOUD_API
-
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
-
sourceName
Specify the name for a third-party custom source. This must be a Regionally unique value. The
sourceNameyou enter here, is used in theLogProviderRolename which follows the conventionAmazonSecurityLake-Provider-{name of the custom source}-{region}. You must use aCustomLogSourcename that is shorter than or equal to 20 characters. This ensures that theLogProviderRolename is below the 64 character limit.- Parameters:
sourceName- Specify the name for a third-party custom source. This must be a Regionally unique value. ThesourceNameyou enter here, is used in theLogProviderRolename which follows the conventionAmazonSecurityLake-Provider-{name of the custom source}-{region}. You must use aCustomLogSourcename that is shorter than or equal to 20 characters. This ensures that theLogProviderRolename is below the 64 character limit.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
sourceVersion
Specify the source version for the third-party custom source, to limit log collection to a specific version of custom data source.
- Parameters:
sourceVersion- Specify the source version for the third-party custom source, to limit log collection to a specific version of custom data source.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
overrideConfiguration
CreateCustomLogSourceRequest.Builder overrideConfiguration(AwsRequestOverrideConfiguration overrideConfiguration) Description copied from interface:AwsRequest.BuilderAdd an optional request override configuration.- Specified by:
overrideConfigurationin interfaceAwsRequest.Builder- Parameters:
overrideConfiguration- The override configuration.- Returns:
- This object for method chaining.
-
overrideConfiguration
CreateCustomLogSourceRequest.Builder overrideConfiguration(Consumer<AwsRequestOverrideConfiguration.Builder> builderConsumer) Description copied from interface:AwsRequest.BuilderAdd an optional request override configuration.- Specified by:
overrideConfigurationin interfaceAwsRequest.Builder- Parameters:
builderConsumer- AConsumerto which an emptyAwsRequestOverrideConfiguration.Builderwill be given.- Returns:
- This object for method chaining.
-