@@ -185,7 +185,7 @@ func testAccCheckDatadogSecurityMonitoringDefaultRuleAddTag() resource.TestCheck
185
185
func testAccDatadogSecurityMonitoringDefaultRuleAppsec () string {
186
186
return `
187
187
data "datadog_security_monitoring_rules" "bruteforce" {
188
- tags_filter = ["source:application-security"]
188
+ tags_filter = ["source:application-security", "category:unauthorized_traffic" ]
189
189
default_only_filter = true
190
190
user_only_filter = false
191
191
}
@@ -195,8 +195,9 @@ data "datadog_security_monitoring_rules" "bruteforce" {
195
195
func testAccCheckDatadogSecurityMonitoringAppsec () string {
196
196
return `
197
197
data "datadog_security_monitoring_rules" "bruteforce" {
198
- tags_filter = ["source:application-security"]
199
- default_only_filter = "true"
198
+ tags_filter = ["source:application-security", "category:unauthorized_traffic"]
199
+ default_only_filter = true
200
+ user_only_filter = false
200
201
}
201
202
202
203
resource "datadog_security_monitoring_default_rule" "acceptance_test" {
@@ -209,7 +210,7 @@ func testAccDatadogSecurityMonitoringDefaultRuleUpdateCase() string {
209
210
resource "datadog_security_monitoring_default_rule" "acceptance_test" {
210
211
211
212
case {
212
- status = "low "
213
+ status = "medium "
213
214
notifications = ["[email protected] "]
214
215
action {
215
216
type = "block_ip"
@@ -234,7 +235,7 @@ resource "datadog_security_monitoring_default_rule" "acceptance_test" {
234
235
func testAccCheckDatadogSecurityMonitoringDefaultRuleUpdateCase () resource.TestCheckFunc {
235
236
return resource .ComposeTestCheckFunc (
236
237
resource .TestCheckResourceAttr (
237
- tfSecurityDefaultRuleName , "case.0.status" , "low " ),
238
+ tfSecurityDefaultRuleName , "case.0.status" , "medium " ),
238
239
resource .TestCheckResourceAttr (
239
240
tfSecurityDefaultRuleName ,
"case.0.notifications.0" ,
"[email protected] " ),
240
241
resource .TestCheckResourceAttr (
0 commit comments