pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_oci/__init__.py +59 -0
  2. pulumi_oci/adm/_inputs.py +99 -18
  3. pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
  4. pulumi_oci/adm/get_vulnerability_audit.py +31 -5
  5. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
  6. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
  7. pulumi_oci/adm/get_vulnerability_audits.py +54 -3
  8. pulumi_oci/adm/outputs.py +296 -31
  9. pulumi_oci/adm/remediation_recipe.py +2 -0
  10. pulumi_oci/adm/vulnerability_audit.py +96 -37
  11. pulumi_oci/database/__init__.py +1 -0
  12. pulumi_oci/database/_inputs.py +40 -0
  13. pulumi_oci/database/cloud_vm_cluster.py +22 -1
  14. pulumi_oci/database/get_system_versions.py +173 -0
  15. pulumi_oci/database/outputs.py +88 -0
  16. pulumi_oci/database/vm_cluster.py +22 -1
  17. pulumi_oci/datasafe/__init__.py +22 -0
  18. pulumi_oci/datasafe/_inputs.py +1826 -161
  19. pulumi_oci/datasafe/audit_trail.py +140 -0
  20. pulumi_oci/datasafe/discovery_mod.py +7 -7
  21. pulumi_oci/datasafe/get_audit_trail.py +66 -1
  22. pulumi_oci/datasafe/get_discovery_job.py +1 -1
  23. pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
  24. pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
  25. pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
  26. pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
  27. pulumi_oci/datasafe/get_masking_policy.py +1 -1
  28. pulumi_oci/datasafe/get_report.py +1 -1
  29. pulumi_oci/datasafe/get_security_assessment.py +3 -3
  30. pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
  31. pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
  32. pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
  33. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
  34. pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
  35. pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
  36. pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
  37. pulumi_oci/datasafe/get_security_assessments.py +2 -2
  38. pulumi_oci/datasafe/get_security_policies.py +253 -0
  39. pulumi_oci/datasafe/get_security_policy.py +235 -0
  40. pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
  41. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
  42. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
  43. pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
  44. pulumi_oci/datasafe/get_security_policy_report.py +248 -0
  45. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
  46. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
  47. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
  48. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
  49. pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
  50. pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
  51. pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
  52. pulumi_oci/datasafe/get_target_database.py +27 -4
  53. pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
  54. pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
  55. pulumi_oci/datasafe/get_target_databases.py +1 -1
  56. pulumi_oci/datasafe/get_user_assessment.py +5 -5
  57. pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
  58. pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
  59. pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
  60. pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
  61. pulumi_oci/datasafe/get_user_assessments.py +2 -2
  62. pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
  63. pulumi_oci/datasafe/masking_policy.py +9 -9
  64. pulumi_oci/datasafe/outputs.py +16686 -9777
  65. pulumi_oci/datasafe/report.py +559 -0
  66. pulumi_oci/datasafe/security_assessment.py +12 -12
  67. pulumi_oci/datasafe/sensitive_data_model.py +7 -7
  68. pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
  69. pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
  70. pulumi_oci/datasafe/target_database.py +146 -25
  71. pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
  72. pulumi_oci/datasafe/user_assessment.py +20 -20
  73. pulumi_oci/generativeai/__init__.py +18 -0
  74. pulumi_oci/generativeai/_inputs.py +534 -0
  75. pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
  76. pulumi_oci/generativeai/endpoint.py +717 -0
  77. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
  78. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
  79. pulumi_oci/generativeai/get_endpoint.py +275 -0
  80. pulumi_oci/generativeai/get_endpoints.py +183 -0
  81. pulumi_oci/generativeai/get_model.py +353 -0
  82. pulumi_oci/generativeai/get_models.py +220 -0
  83. pulumi_oci/generativeai/model.py +858 -0
  84. pulumi_oci/generativeai/outputs.py +1721 -0
  85. pulumi_oci/marketplace/get_publication.py +14 -1
  86. pulumi_oci/marketplace/outputs.py +11 -0
  87. pulumi_oci/marketplace/publication.py +28 -0
  88. pulumi_oci/monitoring/__init__.py +3 -0
  89. pulumi_oci/monitoring/_inputs.py +82 -4
  90. pulumi_oci/monitoring/alarm.py +15 -15
  91. pulumi_oci/monitoring/alarm_suppression.py +745 -0
  92. pulumi_oci/monitoring/get_alarm.py +5 -5
  93. pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
  94. pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
  95. pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
  96. pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
  97. pulumi_oci/monitoring/get_metric_data.py +12 -8
  98. pulumi_oci/monitoring/get_metrics.py +2 -2
  99. pulumi_oci/monitoring/outputs.py +355 -50
  100. pulumi_oci/networkfirewall/_inputs.py +25 -20
  101. pulumi_oci/networkfirewall/outputs.py +40 -30
  102. pulumi_oci/stackmonitoring/__init__.py +3 -0
  103. pulumi_oci/stackmonitoring/_inputs.py +143 -0
  104. pulumi_oci/stackmonitoring/get_process_set.py +236 -0
  105. pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
  106. pulumi_oci/stackmonitoring/outputs.py +422 -0
  107. pulumi_oci/stackmonitoring/process_set.py +548 -0
  108. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
  109. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
  110. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
  111. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,309 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetSecurityAssessmentFindingsChangeAuditLogsResult',
16
+ 'AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult',
17
+ 'get_security_assessment_findings_change_audit_logs',
18
+ 'get_security_assessment_findings_change_audit_logs_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetSecurityAssessmentFindingsChangeAuditLogsResult:
23
+ """
24
+ A collection of values returned by getSecurityAssessmentFindingsChangeAuditLogs.
25
+ """
26
+ def __init__(__self__, filters=None, finding_key=None, finding_title=None, findings_change_audit_log_collections=None, id=None, is_risk_deferred=None, modified_by=None, security_assessment_id=None, severity=None, time_updated_greater_than_or_equal_to=None, time_updated_less_than=None, time_valid_until_greater_than_or_equal_to=None, time_valid_until_less_than=None):
27
+ if filters and not isinstance(filters, list):
28
+ raise TypeError("Expected argument 'filters' to be a list")
29
+ pulumi.set(__self__, "filters", filters)
30
+ if finding_key and not isinstance(finding_key, str):
31
+ raise TypeError("Expected argument 'finding_key' to be a str")
32
+ pulumi.set(__self__, "finding_key", finding_key)
33
+ if finding_title and not isinstance(finding_title, str):
34
+ raise TypeError("Expected argument 'finding_title' to be a str")
35
+ pulumi.set(__self__, "finding_title", finding_title)
36
+ if findings_change_audit_log_collections and not isinstance(findings_change_audit_log_collections, list):
37
+ raise TypeError("Expected argument 'findings_change_audit_log_collections' to be a list")
38
+ pulumi.set(__self__, "findings_change_audit_log_collections", findings_change_audit_log_collections)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if is_risk_deferred and not isinstance(is_risk_deferred, bool):
43
+ raise TypeError("Expected argument 'is_risk_deferred' to be a bool")
44
+ pulumi.set(__self__, "is_risk_deferred", is_risk_deferred)
45
+ if modified_by and not isinstance(modified_by, str):
46
+ raise TypeError("Expected argument 'modified_by' to be a str")
47
+ pulumi.set(__self__, "modified_by", modified_by)
48
+ if security_assessment_id and not isinstance(security_assessment_id, str):
49
+ raise TypeError("Expected argument 'security_assessment_id' to be a str")
50
+ pulumi.set(__self__, "security_assessment_id", security_assessment_id)
51
+ if severity and not isinstance(severity, str):
52
+ raise TypeError("Expected argument 'severity' to be a str")
53
+ pulumi.set(__self__, "severity", severity)
54
+ if time_updated_greater_than_or_equal_to and not isinstance(time_updated_greater_than_or_equal_to, str):
55
+ raise TypeError("Expected argument 'time_updated_greater_than_or_equal_to' to be a str")
56
+ pulumi.set(__self__, "time_updated_greater_than_or_equal_to", time_updated_greater_than_or_equal_to)
57
+ if time_updated_less_than and not isinstance(time_updated_less_than, str):
58
+ raise TypeError("Expected argument 'time_updated_less_than' to be a str")
59
+ pulumi.set(__self__, "time_updated_less_than", time_updated_less_than)
60
+ if time_valid_until_greater_than_or_equal_to and not isinstance(time_valid_until_greater_than_or_equal_to, str):
61
+ raise TypeError("Expected argument 'time_valid_until_greater_than_or_equal_to' to be a str")
62
+ pulumi.set(__self__, "time_valid_until_greater_than_or_equal_to", time_valid_until_greater_than_or_equal_to)
63
+ if time_valid_until_less_than and not isinstance(time_valid_until_less_than, str):
64
+ raise TypeError("Expected argument 'time_valid_until_less_than' to be a str")
65
+ pulumi.set(__self__, "time_valid_until_less_than", time_valid_until_less_than)
66
+
67
+ @property
68
+ @pulumi.getter
69
+ def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentFindingsChangeAuditLogsFilterResult']]:
70
+ return pulumi.get(self, "filters")
71
+
72
+ @property
73
+ @pulumi.getter(name="findingKey")
74
+ def finding_key(self) -> Optional[str]:
75
+ """
76
+ The unique key that identifies the finding.
77
+ """
78
+ return pulumi.get(self, "finding_key")
79
+
80
+ @property
81
+ @pulumi.getter(name="findingTitle")
82
+ def finding_title(self) -> Optional[str]:
83
+ """
84
+ The short title for the finding whose risk is being modified.
85
+ """
86
+ return pulumi.get(self, "finding_title")
87
+
88
+ @property
89
+ @pulumi.getter(name="findingsChangeAuditLogCollections")
90
+ def findings_change_audit_log_collections(self) -> Sequence['outputs.GetSecurityAssessmentFindingsChangeAuditLogsFindingsChangeAuditLogCollectionResult']:
91
+ """
92
+ The list of findings_change_audit_log_collection.
93
+ """
94
+ return pulumi.get(self, "findings_change_audit_log_collections")
95
+
96
+ @property
97
+ @pulumi.getter
98
+ def id(self) -> str:
99
+ """
100
+ The provider-assigned unique ID for this managed resource.
101
+ """
102
+ return pulumi.get(self, "id")
103
+
104
+ @property
105
+ @pulumi.getter(name="isRiskDeferred")
106
+ def is_risk_deferred(self) -> Optional[bool]:
107
+ """
108
+ Determines if the user has deferred the risk level of this finding when he is ok with it and does not plan to do anything about it.
109
+ """
110
+ return pulumi.get(self, "is_risk_deferred")
111
+
112
+ @property
113
+ @pulumi.getter(name="modifiedBy")
114
+ def modified_by(self) -> Optional[str]:
115
+ """
116
+ The user who initiated change of risk level of the finding
117
+ """
118
+ return pulumi.get(self, "modified_by")
119
+
120
+ @property
121
+ @pulumi.getter(name="securityAssessmentId")
122
+ def security_assessment_id(self) -> str:
123
+ return pulumi.get(self, "security_assessment_id")
124
+
125
+ @property
126
+ @pulumi.getter
127
+ def severity(self) -> Optional[str]:
128
+ """
129
+ The original severity / risk level of the finding as determined by security assessment.
130
+ """
131
+ return pulumi.get(self, "severity")
132
+
133
+ @property
134
+ @pulumi.getter(name="timeUpdatedGreaterThanOrEqualTo")
135
+ def time_updated_greater_than_or_equal_to(self) -> Optional[str]:
136
+ return pulumi.get(self, "time_updated_greater_than_or_equal_to")
137
+
138
+ @property
139
+ @pulumi.getter(name="timeUpdatedLessThan")
140
+ def time_updated_less_than(self) -> Optional[str]:
141
+ return pulumi.get(self, "time_updated_less_than")
142
+
143
+ @property
144
+ @pulumi.getter(name="timeValidUntilGreaterThanOrEqualTo")
145
+ def time_valid_until_greater_than_or_equal_to(self) -> Optional[str]:
146
+ return pulumi.get(self, "time_valid_until_greater_than_or_equal_to")
147
+
148
+ @property
149
+ @pulumi.getter(name="timeValidUntilLessThan")
150
+ def time_valid_until_less_than(self) -> Optional[str]:
151
+ return pulumi.get(self, "time_valid_until_less_than")
152
+
153
+
154
+ class AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult(GetSecurityAssessmentFindingsChangeAuditLogsResult):
155
+ # pylint: disable=using-constant-test
156
+ def __await__(self):
157
+ if False:
158
+ yield self
159
+ return GetSecurityAssessmentFindingsChangeAuditLogsResult(
160
+ filters=self.filters,
161
+ finding_key=self.finding_key,
162
+ finding_title=self.finding_title,
163
+ findings_change_audit_log_collections=self.findings_change_audit_log_collections,
164
+ id=self.id,
165
+ is_risk_deferred=self.is_risk_deferred,
166
+ modified_by=self.modified_by,
167
+ security_assessment_id=self.security_assessment_id,
168
+ severity=self.severity,
169
+ time_updated_greater_than_or_equal_to=self.time_updated_greater_than_or_equal_to,
170
+ time_updated_less_than=self.time_updated_less_than,
171
+ time_valid_until_greater_than_or_equal_to=self.time_valid_until_greater_than_or_equal_to,
172
+ time_valid_until_less_than=self.time_valid_until_less_than)
173
+
174
+
175
+ def get_security_assessment_findings_change_audit_logs(filters: Optional[Sequence[pulumi.InputType['GetSecurityAssessmentFindingsChangeAuditLogsFilterArgs']]] = None,
176
+ finding_key: Optional[str] = None,
177
+ finding_title: Optional[str] = None,
178
+ is_risk_deferred: Optional[bool] = None,
179
+ modified_by: Optional[str] = None,
180
+ security_assessment_id: Optional[str] = None,
181
+ severity: Optional[str] = None,
182
+ time_updated_greater_than_or_equal_to: Optional[str] = None,
183
+ time_updated_less_than: Optional[str] = None,
184
+ time_valid_until_greater_than_or_equal_to: Optional[str] = None,
185
+ time_valid_until_less_than: Optional[str] = None,
186
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult:
187
+ """
188
+ This data source provides the list of Security Assessment Findings Change Audit Logs in Oracle Cloud Infrastructure Data Safe service.
189
+
190
+ List all changes made by user to risk level of findings of the specified assessment.
191
+
192
+ ## Example Usage
193
+
194
+ ```python
195
+ import pulumi
196
+ import pulumi_oci as oci
197
+
198
+ test_security_assessment_findings_change_audit_logs = oci.DataSafe.get_security_assessment_findings_change_audit_logs(security_assessment_id=oci_data_safe_security_assessment["test_security_assessment"]["id"],
199
+ finding_key=var["security_assessment_findings_change_audit_log_finding_key"],
200
+ finding_title=var["security_assessment_findings_change_audit_log_finding_title"],
201
+ is_risk_deferred=var["security_assessment_findings_change_audit_log_is_risk_deferred"],
202
+ modified_by=var["security_assessment_findings_change_audit_log_modified_by"],
203
+ severity=var["security_assessment_findings_change_audit_log_severity"],
204
+ time_updated_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_updated_greater_than_or_equal_to"],
205
+ time_updated_less_than=var["security_assessment_findings_change_audit_log_time_updated_less_than"],
206
+ time_valid_until_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_valid_until_greater_than_or_equal_to"],
207
+ time_valid_until_less_than=var["security_assessment_findings_change_audit_log_time_valid_until_less_than"])
208
+ ```
209
+
210
+
211
+ :param str finding_key: The unique key that identifies the finding. It is a string and unique within a security assessment.
212
+ :param str finding_title: The unique title that identifies the finding. It is a string and unique within a security assessment.
213
+ :param bool is_risk_deferred: A filter to check findings whose risks were deferred by the user.
214
+ :param str modified_by: A filter to check which user modified the risk level of the finding.
215
+ :param str security_assessment_id: The OCID of the security assessment.
216
+ :param str severity: A filter to return only findings of a particular risk level.
217
+ :param str time_updated_greater_than_or_equal_to: Search for resources that were updated after a specific date. Specifying this parameter corresponding `timeUpdatedGreaterThanOrEqualTo` parameter will retrieve all resources updated after the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
218
+ :param str time_updated_less_than: Search for resources that were updated before a specific date. Specifying this parameter corresponding `timeUpdatedLessThan` parameter will retrieve all resources updated before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
219
+ :param str time_valid_until_greater_than_or_equal_to: Specifying `TimeValidUntilGreaterThanOrEqualToQueryParam` parameter will retrieve all items for which the risk level modification by user will no longer be valid greater than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
220
+
221
+ **Example:** 2016-12-19T00:00:00.000Z
222
+ :param str time_valid_until_less_than: Specifying `TimeValidUntilLessThanQueryParam` parameter will retrieve all items for which the risk level modification by user will be valid until less than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
223
+
224
+ **Example:** 2016-12-19T00:00:00.000Z
225
+ """
226
+ __args__ = dict()
227
+ __args__['filters'] = filters
228
+ __args__['findingKey'] = finding_key
229
+ __args__['findingTitle'] = finding_title
230
+ __args__['isRiskDeferred'] = is_risk_deferred
231
+ __args__['modifiedBy'] = modified_by
232
+ __args__['securityAssessmentId'] = security_assessment_id
233
+ __args__['severity'] = severity
234
+ __args__['timeUpdatedGreaterThanOrEqualTo'] = time_updated_greater_than_or_equal_to
235
+ __args__['timeUpdatedLessThan'] = time_updated_less_than
236
+ __args__['timeValidUntilGreaterThanOrEqualTo'] = time_valid_until_greater_than_or_equal_to
237
+ __args__['timeValidUntilLessThan'] = time_valid_until_less_than
238
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentFindingsChangeAuditLogs:getSecurityAssessmentFindingsChangeAuditLogs', __args__, opts=opts, typ=GetSecurityAssessmentFindingsChangeAuditLogsResult).value
240
+
241
+ return AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult(
242
+ filters=pulumi.get(__ret__, 'filters'),
243
+ finding_key=pulumi.get(__ret__, 'finding_key'),
244
+ finding_title=pulumi.get(__ret__, 'finding_title'),
245
+ findings_change_audit_log_collections=pulumi.get(__ret__, 'findings_change_audit_log_collections'),
246
+ id=pulumi.get(__ret__, 'id'),
247
+ is_risk_deferred=pulumi.get(__ret__, 'is_risk_deferred'),
248
+ modified_by=pulumi.get(__ret__, 'modified_by'),
249
+ security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
250
+ severity=pulumi.get(__ret__, 'severity'),
251
+ time_updated_greater_than_or_equal_to=pulumi.get(__ret__, 'time_updated_greater_than_or_equal_to'),
252
+ time_updated_less_than=pulumi.get(__ret__, 'time_updated_less_than'),
253
+ time_valid_until_greater_than_or_equal_to=pulumi.get(__ret__, 'time_valid_until_greater_than_or_equal_to'),
254
+ time_valid_until_less_than=pulumi.get(__ret__, 'time_valid_until_less_than'))
255
+
256
+
257
+ @_utilities.lift_output_func(get_security_assessment_findings_change_audit_logs)
258
+ def get_security_assessment_findings_change_audit_logs_output(filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityAssessmentFindingsChangeAuditLogsFilterArgs']]]]] = None,
259
+ finding_key: Optional[pulumi.Input[Optional[str]]] = None,
260
+ finding_title: Optional[pulumi.Input[Optional[str]]] = None,
261
+ is_risk_deferred: Optional[pulumi.Input[Optional[bool]]] = None,
262
+ modified_by: Optional[pulumi.Input[Optional[str]]] = None,
263
+ security_assessment_id: Optional[pulumi.Input[str]] = None,
264
+ severity: Optional[pulumi.Input[Optional[str]]] = None,
265
+ time_updated_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
266
+ time_updated_less_than: Optional[pulumi.Input[Optional[str]]] = None,
267
+ time_valid_until_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
268
+ time_valid_until_less_than: Optional[pulumi.Input[Optional[str]]] = None,
269
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityAssessmentFindingsChangeAuditLogsResult]:
270
+ """
271
+ This data source provides the list of Security Assessment Findings Change Audit Logs in Oracle Cloud Infrastructure Data Safe service.
272
+
273
+ List all changes made by user to risk level of findings of the specified assessment.
274
+
275
+ ## Example Usage
276
+
277
+ ```python
278
+ import pulumi
279
+ import pulumi_oci as oci
280
+
281
+ test_security_assessment_findings_change_audit_logs = oci.DataSafe.get_security_assessment_findings_change_audit_logs(security_assessment_id=oci_data_safe_security_assessment["test_security_assessment"]["id"],
282
+ finding_key=var["security_assessment_findings_change_audit_log_finding_key"],
283
+ finding_title=var["security_assessment_findings_change_audit_log_finding_title"],
284
+ is_risk_deferred=var["security_assessment_findings_change_audit_log_is_risk_deferred"],
285
+ modified_by=var["security_assessment_findings_change_audit_log_modified_by"],
286
+ severity=var["security_assessment_findings_change_audit_log_severity"],
287
+ time_updated_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_updated_greater_than_or_equal_to"],
288
+ time_updated_less_than=var["security_assessment_findings_change_audit_log_time_updated_less_than"],
289
+ time_valid_until_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_valid_until_greater_than_or_equal_to"],
290
+ time_valid_until_less_than=var["security_assessment_findings_change_audit_log_time_valid_until_less_than"])
291
+ ```
292
+
293
+
294
+ :param str finding_key: The unique key that identifies the finding. It is a string and unique within a security assessment.
295
+ :param str finding_title: The unique title that identifies the finding. It is a string and unique within a security assessment.
296
+ :param bool is_risk_deferred: A filter to check findings whose risks were deferred by the user.
297
+ :param str modified_by: A filter to check which user modified the risk level of the finding.
298
+ :param str security_assessment_id: The OCID of the security assessment.
299
+ :param str severity: A filter to return only findings of a particular risk level.
300
+ :param str time_updated_greater_than_or_equal_to: Search for resources that were updated after a specific date. Specifying this parameter corresponding `timeUpdatedGreaterThanOrEqualTo` parameter will retrieve all resources updated after the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
301
+ :param str time_updated_less_than: Search for resources that were updated before a specific date. Specifying this parameter corresponding `timeUpdatedLessThan` parameter will retrieve all resources updated before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
302
+ :param str time_valid_until_greater_than_or_equal_to: Specifying `TimeValidUntilGreaterThanOrEqualToQueryParam` parameter will retrieve all items for which the risk level modification by user will no longer be valid greater than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
303
+
304
+ **Example:** 2016-12-19T00:00:00.000Z
305
+ :param str time_valid_until_less_than: Specifying `TimeValidUntilLessThanQueryParam` parameter will retrieve all items for which the risk level modification by user will be valid until less than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
306
+
307
+ **Example:** 2016-12-19T00:00:00.000Z
308
+ """
309
+ ...
@@ -0,0 +1,198 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetSecurityAssessmentSecurityFeatureAnalyticsResult',
16
+ 'AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult',
17
+ 'get_security_assessment_security_feature_analytics',
18
+ 'get_security_assessment_security_feature_analytics_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetSecurityAssessmentSecurityFeatureAnalyticsResult:
23
+ """
24
+ A collection of values returned by getSecurityAssessmentSecurityFeatureAnalytics.
25
+ """
26
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, id=None, security_feature_analytics_collections=None, target_id=None):
27
+ if access_level and not isinstance(access_level, str):
28
+ raise TypeError("Expected argument 'access_level' to be a str")
29
+ pulumi.set(__self__, "access_level", access_level)
30
+ if compartment_id and not isinstance(compartment_id, str):
31
+ raise TypeError("Expected argument 'compartment_id' to be a str")
32
+ pulumi.set(__self__, "compartment_id", compartment_id)
33
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
34
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
35
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
36
+ if filters and not isinstance(filters, list):
37
+ raise TypeError("Expected argument 'filters' to be a list")
38
+ pulumi.set(__self__, "filters", filters)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if security_feature_analytics_collections and not isinstance(security_feature_analytics_collections, list):
43
+ raise TypeError("Expected argument 'security_feature_analytics_collections' to be a list")
44
+ pulumi.set(__self__, "security_feature_analytics_collections", security_feature_analytics_collections)
45
+ if target_id and not isinstance(target_id, str):
46
+ raise TypeError("Expected argument 'target_id' to be a str")
47
+ pulumi.set(__self__, "target_id", target_id)
48
+
49
+ @property
50
+ @pulumi.getter(name="accessLevel")
51
+ def access_level(self) -> Optional[str]:
52
+ return pulumi.get(self, "access_level")
53
+
54
+ @property
55
+ @pulumi.getter(name="compartmentId")
56
+ def compartment_id(self) -> str:
57
+ return pulumi.get(self, "compartment_id")
58
+
59
+ @property
60
+ @pulumi.getter(name="compartmentIdInSubtree")
61
+ def compartment_id_in_subtree(self) -> Optional[bool]:
62
+ return pulumi.get(self, "compartment_id_in_subtree")
63
+
64
+ @property
65
+ @pulumi.getter
66
+ def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentSecurityFeatureAnalyticsFilterResult']]:
67
+ return pulumi.get(self, "filters")
68
+
69
+ @property
70
+ @pulumi.getter
71
+ def id(self) -> str:
72
+ """
73
+ The provider-assigned unique ID for this managed resource.
74
+ """
75
+ return pulumi.get(self, "id")
76
+
77
+ @property
78
+ @pulumi.getter(name="securityFeatureAnalyticsCollections")
79
+ def security_feature_analytics_collections(self) -> Sequence['outputs.GetSecurityAssessmentSecurityFeatureAnalyticsSecurityFeatureAnalyticsCollectionResult']:
80
+ """
81
+ The list of security_feature_analytics_collection.
82
+ """
83
+ return pulumi.get(self, "security_feature_analytics_collections")
84
+
85
+ @property
86
+ @pulumi.getter(name="targetId")
87
+ def target_id(self) -> Optional[str]:
88
+ return pulumi.get(self, "target_id")
89
+
90
+
91
+ class AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult(GetSecurityAssessmentSecurityFeatureAnalyticsResult):
92
+ # pylint: disable=using-constant-test
93
+ def __await__(self):
94
+ if False:
95
+ yield self
96
+ return GetSecurityAssessmentSecurityFeatureAnalyticsResult(
97
+ access_level=self.access_level,
98
+ compartment_id=self.compartment_id,
99
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
100
+ filters=self.filters,
101
+ id=self.id,
102
+ security_feature_analytics_collections=self.security_feature_analytics_collections,
103
+ target_id=self.target_id)
104
+
105
+
106
+ def get_security_assessment_security_feature_analytics(access_level: Optional[str] = None,
107
+ compartment_id: Optional[str] = None,
108
+ compartment_id_in_subtree: Optional[bool] = None,
109
+ filters: Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeatureAnalyticsFilterArgs']]] = None,
110
+ target_id: Optional[str] = None,
111
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult:
112
+ """
113
+ This data source provides the list of Security Assessment Security Feature Analytics in Oracle Cloud Infrastructure Data Safe service.
114
+
115
+ Gets a list of Database security feature usage aggregated details in the specified compartment. This provides information about the
116
+ overall security controls, by returning the counting number of the target databases using the security features.
117
+
118
+ When you perform the ListSecurityFeatureAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
119
+ parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
120
+ permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
121
+ root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
122
+ compartmentId, then "Not Authorized" is returned.
123
+
124
+ ## Example Usage
125
+
126
+ ```python
127
+ import pulumi
128
+ import pulumi_oci as oci
129
+
130
+ test_security_assessment_security_feature_analytics = oci.DataSafe.get_security_assessment_security_feature_analytics(compartment_id=var["compartment_id"],
131
+ access_level=var["security_assessment_security_feature_analytic_access_level"],
132
+ compartment_id_in_subtree=var["security_assessment_security_feature_analytic_compartment_id_in_subtree"],
133
+ target_id=oci_cloud_guard_target["test_target"]["id"])
134
+ ```
135
+
136
+
137
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
138
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
139
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
140
+ :param str target_id: A filter to return only items related to a specific target OCID.
141
+ """
142
+ __args__ = dict()
143
+ __args__['accessLevel'] = access_level
144
+ __args__['compartmentId'] = compartment_id
145
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
146
+ __args__['filters'] = filters
147
+ __args__['targetId'] = target_id
148
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
149
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentSecurityFeatureAnalytics:getSecurityAssessmentSecurityFeatureAnalytics', __args__, opts=opts, typ=GetSecurityAssessmentSecurityFeatureAnalyticsResult).value
150
+
151
+ return AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult(
152
+ access_level=pulumi.get(__ret__, 'access_level'),
153
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
154
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
155
+ filters=pulumi.get(__ret__, 'filters'),
156
+ id=pulumi.get(__ret__, 'id'),
157
+ security_feature_analytics_collections=pulumi.get(__ret__, 'security_feature_analytics_collections'),
158
+ target_id=pulumi.get(__ret__, 'target_id'))
159
+
160
+
161
+ @_utilities.lift_output_func(get_security_assessment_security_feature_analytics)
162
+ def get_security_assessment_security_feature_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
163
+ compartment_id: Optional[pulumi.Input[str]] = None,
164
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
165
+ filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeatureAnalyticsFilterArgs']]]]] = None,
166
+ target_id: Optional[pulumi.Input[Optional[str]]] = None,
167
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityAssessmentSecurityFeatureAnalyticsResult]:
168
+ """
169
+ This data source provides the list of Security Assessment Security Feature Analytics in Oracle Cloud Infrastructure Data Safe service.
170
+
171
+ Gets a list of Database security feature usage aggregated details in the specified compartment. This provides information about the
172
+ overall security controls, by returning the counting number of the target databases using the security features.
173
+
174
+ When you perform the ListSecurityFeatureAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
175
+ parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
176
+ permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
177
+ root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
178
+ compartmentId, then "Not Authorized" is returned.
179
+
180
+ ## Example Usage
181
+
182
+ ```python
183
+ import pulumi
184
+ import pulumi_oci as oci
185
+
186
+ test_security_assessment_security_feature_analytics = oci.DataSafe.get_security_assessment_security_feature_analytics(compartment_id=var["compartment_id"],
187
+ access_level=var["security_assessment_security_feature_analytic_access_level"],
188
+ compartment_id_in_subtree=var["security_assessment_security_feature_analytic_compartment_id_in_subtree"],
189
+ target_id=oci_cloud_guard_target["test_target"]["id"])
190
+ ```
191
+
192
+
193
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
194
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
195
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
196
+ :param str target_id: A filter to return only items related to a specific target OCID.
197
+ """
198
+ ...