pulumi-oci 2.12.0a1728593306__py3-none-any.whl → 2.13.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (220) hide show
  1. pulumi_oci/__init__.py +169 -19
  2. pulumi_oci/analytics/analytics_instance.py +54 -5
  3. pulumi_oci/analytics/get_analytics_instance.py +18 -4
  4. pulumi_oci/analytics/outputs.py +12 -1
  5. pulumi_oci/containerengine/_inputs.py +341 -0
  6. pulumi_oci/containerengine/cluster.py +64 -0
  7. pulumi_oci/containerengine/get_cluster.py +12 -1
  8. pulumi_oci/containerengine/outputs.py +582 -0
  9. pulumi_oci/core/_inputs.py +947 -196
  10. pulumi_oci/core/boot_volume.py +90 -5
  11. pulumi_oci/core/cluster_network.py +7 -7
  12. pulumi_oci/core/get_block_volume_replica.py +15 -1
  13. pulumi_oci/core/get_boot_volume.py +15 -4
  14. pulumi_oci/core/get_boot_volume_replica.py +15 -1
  15. pulumi_oci/core/get_instance.py +29 -1
  16. pulumi_oci/core/get_vcn.py +15 -1
  17. pulumi_oci/core/get_vnic.py +15 -1
  18. pulumi_oci/core/get_volume.py +18 -4
  19. pulumi_oci/core/instance.py +87 -0
  20. pulumi_oci/core/instance_configuration.py +16 -0
  21. pulumi_oci/core/ipsec.py +183 -23
  22. pulumi_oci/core/network_security_group_security_rule.py +2 -2
  23. pulumi_oci/core/outputs.py +1282 -153
  24. pulumi_oci/core/service_gateway.py +13 -7
  25. pulumi_oci/core/vcn.py +65 -23
  26. pulumi_oci/core/virtual_network.py +35 -1
  27. pulumi_oci/core/vnic_attachment.py +2 -0
  28. pulumi_oci/core/volume.py +110 -12
  29. pulumi_oci/core/volume_backup_policy_assignment.py +68 -19
  30. pulumi_oci/core/volume_group.py +56 -5
  31. pulumi_oci/database/_inputs.py +905 -27
  32. pulumi_oci/database/autonomous_database.py +48 -28
  33. pulumi_oci/database/autonomous_database_backup.py +12 -12
  34. pulumi_oci/database/autonomous_exadata_infrastructure.py +2 -0
  35. pulumi_oci/database/autonomous_vm_cluster.py +2 -0
  36. pulumi_oci/database/backup.py +12 -12
  37. pulumi_oci/database/cloud_autonomous_vm_cluster.py +2 -0
  38. pulumi_oci/database/cloud_exadata_infrastructure.py +2 -0
  39. pulumi_oci/database/cloud_vm_cluster.py +71 -0
  40. pulumi_oci/database/database.py +15 -15
  41. pulumi_oci/database/database_upgrade.py +12 -12
  42. pulumi_oci/database/db_system.py +9 -9
  43. pulumi_oci/database/exadata_infrastructure.py +2 -0
  44. pulumi_oci/database/get_autonomous_container_database.py +1 -1
  45. pulumi_oci/database/get_autonomous_database.py +18 -4
  46. pulumi_oci/database/get_autonomous_database_backup.py +3 -3
  47. pulumi_oci/database/get_autonomous_databases.py +88 -5
  48. pulumi_oci/database/get_cloud_vm_cluster.py +15 -1
  49. pulumi_oci/database/get_database.py +3 -3
  50. pulumi_oci/database/get_pluggable_database.py +12 -1
  51. pulumi_oci/database/get_vm_cluster.py +15 -1
  52. pulumi_oci/database/outputs.py +1431 -74
  53. pulumi_oci/database/pluggable_database.py +34 -0
  54. pulumi_oci/database/vm_cluster.py +71 -0
  55. pulumi_oci/database/vm_cluster_add_virtual_network.py +28 -0
  56. pulumi_oci/database/vm_cluster_remove_virtual_machine.py +28 -0
  57. pulumi_oci/datasafe/__init__.py +13 -0
  58. pulumi_oci/datasafe/_inputs.py +441 -0
  59. pulumi_oci/datasafe/generate_on_prem_connector_configuration.py +271 -0
  60. pulumi_oci/datasafe/get_reports.py +23 -1
  61. pulumi_oci/datasafe/get_sql_collection.py +392 -0
  62. pulumi_oci/datasafe/get_sql_collection_analytics.py +309 -0
  63. pulumi_oci/datasafe/get_sql_collection_log_insights.py +207 -0
  64. pulumi_oci/datasafe/get_sql_collections.py +364 -0
  65. pulumi_oci/datasafe/get_sql_firewall_allowed_sql.py +337 -0
  66. pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +250 -0
  67. pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +234 -0
  68. pulumi_oci/datasafe/get_sql_firewall_policies.py +386 -0
  69. pulumi_oci/datasafe/get_sql_firewall_policy.py +393 -0
  70. pulumi_oci/datasafe/get_sql_firewall_policy_analytics.py +305 -0
  71. pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +306 -0
  72. pulumi_oci/datasafe/get_sql_firewall_violations.py +208 -0
  73. pulumi_oci/datasafe/outputs.py +1808 -2
  74. pulumi_oci/desktops/_inputs.py +395 -17
  75. pulumi_oci/desktops/desktop_pool.py +253 -21
  76. pulumi_oci/desktops/get_desktop_pool.py +62 -5
  77. pulumi_oci/desktops/outputs.py +807 -25
  78. pulumi_oci/dns/__init__.py +2 -0
  79. pulumi_oci/dns/_inputs.py +1157 -12
  80. pulumi_oci/dns/action_create_zone_from_zone_file.py +42 -2
  81. pulumi_oci/dns/get_records.py +45 -13
  82. pulumi_oci/dns/get_resolver.py +8 -6
  83. pulumi_oci/dns/get_resolver_endpoint.py +8 -6
  84. pulumi_oci/dns/get_resolver_endpoints.py +2 -2
  85. pulumi_oci/dns/get_resolvers.py +12 -12
  86. pulumi_oci/dns/get_rrset.py +16 -16
  87. pulumi_oci/dns/get_rrsets.py +12 -10
  88. pulumi_oci/dns/get_view.py +8 -4
  89. pulumi_oci/dns/get_views.py +12 -12
  90. pulumi_oci/dns/get_zones.py +33 -13
  91. pulumi_oci/dns/outputs.py +1388 -79
  92. pulumi_oci/dns/record.py +12 -12
  93. pulumi_oci/dns/resolver.py +7 -7
  94. pulumi_oci/dns/resolver_endpoint.py +2 -2
  95. pulumi_oci/dns/rrset.py +50 -41
  96. pulumi_oci/dns/zone.py +176 -17
  97. pulumi_oci/dns/zone_promote_dnssec_key_version.py +328 -0
  98. pulumi_oci/dns/zone_stage_dnssec_key_version.py +318 -0
  99. pulumi_oci/fleetappsmanagement/__init__.py +43 -0
  100. pulumi_oci/fleetappsmanagement/_inputs.py +2057 -0
  101. pulumi_oci/fleetappsmanagement/fleet.py +955 -0
  102. pulumi_oci/fleetappsmanagement/fleet_credential.py +615 -0
  103. pulumi_oci/fleetappsmanagement/fleet_property.py +585 -0
  104. pulumi_oci/fleetappsmanagement/fleet_resource.py +851 -0
  105. pulumi_oci/fleetappsmanagement/get_announcements.py +166 -0
  106. pulumi_oci/fleetappsmanagement/get_fleet.py +394 -0
  107. pulumi_oci/fleetappsmanagement/get_fleet_compliance_report.py +164 -0
  108. pulumi_oci/fleetappsmanagement/get_fleet_credential.py +273 -0
  109. pulumi_oci/fleetappsmanagement/get_fleet_credentials.py +240 -0
  110. pulumi_oci/fleetappsmanagement/get_fleet_products.py +232 -0
  111. pulumi_oci/fleetappsmanagement/get_fleet_properties.py +218 -0
  112. pulumi_oci/fleetappsmanagement/get_fleet_property.py +286 -0
  113. pulumi_oci/fleetappsmanagement/get_fleet_resource.py +398 -0
  114. pulumi_oci/fleetappsmanagement/get_fleet_resources.py +237 -0
  115. pulumi_oci/fleetappsmanagement/get_fleet_targets.py +232 -0
  116. pulumi_oci/fleetappsmanagement/get_fleets.py +284 -0
  117. pulumi_oci/fleetappsmanagement/get_inventory_resources.py +311 -0
  118. pulumi_oci/fleetappsmanagement/get_maintenance_window.py +365 -0
  119. pulumi_oci/fleetappsmanagement/get_maintenance_windows.py +199 -0
  120. pulumi_oci/fleetappsmanagement/get_onboarding_policies.py +123 -0
  121. pulumi_oci/fleetappsmanagement/get_onboardings.py +177 -0
  122. pulumi_oci/fleetappsmanagement/get_properties.py +221 -0
  123. pulumi_oci/fleetappsmanagement/get_property.py +323 -0
  124. pulumi_oci/fleetappsmanagement/get_runbook.py +377 -0
  125. pulumi_oci/fleetappsmanagement/get_runbooks.py +284 -0
  126. pulumi_oci/fleetappsmanagement/get_scheduler_definition.py +436 -0
  127. pulumi_oci/fleetappsmanagement/get_scheduler_definition_scheduled_fleets.py +185 -0
  128. pulumi_oci/fleetappsmanagement/get_scheduler_definitions.py +262 -0
  129. pulumi_oci/fleetappsmanagement/get_task_record.py +307 -0
  130. pulumi_oci/fleetappsmanagement/get_task_records.py +240 -0
  131. pulumi_oci/fleetappsmanagement/maintenance_window.py +935 -0
  132. pulumi_oci/fleetappsmanagement/onboarding.py +477 -0
  133. pulumi_oci/fleetappsmanagement/outputs.py +8128 -0
  134. pulumi_oci/fleetappsmanagement/property.py +697 -0
  135. pulumi_oci/fleetappsmanagement/scheduler_definition.py +1035 -0
  136. pulumi_oci/functions/get_fusion_environment_refresh_activity.py +15 -1
  137. pulumi_oci/functions/outputs.py +11 -0
  138. pulumi_oci/fusionapps/_inputs.py +21 -20
  139. pulumi_oci/fusionapps/fusion_environment.py +2 -2
  140. pulumi_oci/fusionapps/fusion_environment_admin_user.py +21 -22
  141. pulumi_oci/fusionapps/fusion_environment_refresh_activity.py +48 -51
  142. pulumi_oci/fusionapps/outputs.py +11 -10
  143. pulumi_oci/goldengate/__init__.py +1 -0
  144. pulumi_oci/goldengate/_inputs.py +165 -0
  145. pulumi_oci/goldengate/connection.py +49 -35
  146. pulumi_oci/goldengate/database_registration.py +7 -7
  147. pulumi_oci/goldengate/deployment.py +79 -4
  148. pulumi_oci/goldengate/get_deployment.py +30 -2
  149. pulumi_oci/goldengate/get_deployment_environments.py +144 -0
  150. pulumi_oci/goldengate/outputs.py +409 -2
  151. pulumi_oci/integration/__init__.py +1 -0
  152. pulumi_oci/integration/_inputs.py +289 -2
  153. pulumi_oci/integration/get_integration_instance.py +65 -1
  154. pulumi_oci/integration/integration_instance.py +172 -0
  155. pulumi_oci/integration/oracle_managed_custom_endpoint.py +307 -0
  156. pulumi_oci/integration/outputs.py +587 -19
  157. pulumi_oci/loadbalancer/_inputs.py +20 -0
  158. pulumi_oci/loadbalancer/listener.py +4 -2
  159. pulumi_oci/loadbalancer/outputs.py +16 -2
  160. pulumi_oci/monitoring/_inputs.py +137 -16
  161. pulumi_oci/monitoring/alarm_suppression.py +164 -35
  162. pulumi_oci/monitoring/get_alarm_statuses.py +5 -3
  163. pulumi_oci/monitoring/get_alarm_suppression.py +33 -3
  164. pulumi_oci/monitoring/get_alarm_suppressions.py +137 -14
  165. pulumi_oci/monitoring/outputs.py +291 -18
  166. pulumi_oci/mysql/mysql_db_system.py +7 -7
  167. pulumi_oci/objectstorage/__init__.py +3 -0
  168. pulumi_oci/objectstorage/_inputs.py +97 -0
  169. pulumi_oci/objectstorage/get_object_versions.py +6 -6
  170. pulumi_oci/objectstorage/get_objects.py +6 -6
  171. pulumi_oci/objectstorage/get_private_endpoint.py +263 -0
  172. pulumi_oci/objectstorage/get_private_endpoint_summaries.py +128 -0
  173. pulumi_oci/objectstorage/outputs.py +258 -0
  174. pulumi_oci/objectstorage/private_endpoint.py +630 -0
  175. pulumi_oci/objectstorage/storage_object.py +7 -7
  176. pulumi_oci/opsi/_inputs.py +268 -114
  177. pulumi_oci/opsi/database_insight.py +162 -21
  178. pulumi_oci/opsi/exadata_insight.py +44 -0
  179. pulumi_oci/opsi/get_database_insight.py +40 -1
  180. pulumi_oci/opsi/get_host_insights.py +2 -2
  181. pulumi_oci/opsi/host_insight.py +0 -48
  182. pulumi_oci/opsi/outputs.py +405 -109
  183. pulumi_oci/pulumi-plugin.json +1 -1
  184. pulumi_oci/securityattribute/__init__.py +15 -0
  185. pulumi_oci/securityattribute/_inputs.py +209 -0
  186. pulumi_oci/securityattribute/get_security_attribute.py +262 -0
  187. pulumi_oci/securityattribute/get_security_attribute_namespace.py +253 -0
  188. pulumi_oci/securityattribute/get_security_attribute_namespaces.py +210 -0
  189. pulumi_oci/securityattribute/get_security_attributes.py +169 -0
  190. pulumi_oci/securityattribute/outputs.py +466 -0
  191. pulumi_oci/securityattribute/security_attribute.py +588 -0
  192. pulumi_oci/securityattribute/security_attribute_namespace.py +609 -0
  193. pulumi_oci/stackmonitoring/__init__.py +5 -0
  194. pulumi_oci/stackmonitoring/_inputs.py +330 -0
  195. pulumi_oci/stackmonitoring/get_maintenance_window.py +254 -0
  196. pulumi_oci/stackmonitoring/get_maintenance_windows.py +210 -0
  197. pulumi_oci/stackmonitoring/maintenance_window.py +551 -0
  198. pulumi_oci/stackmonitoring/maintenance_windows_retry_failed_operation.py +217 -0
  199. pulumi_oci/stackmonitoring/maintenance_windows_stop.py +217 -0
  200. pulumi_oci/stackmonitoring/outputs.py +603 -0
  201. pulumi_oci/{globallydistributeddatabase → zpr}/__init__.py +5 -6
  202. pulumi_oci/zpr/_inputs.py +79 -0
  203. pulumi_oci/zpr/configuration.py +516 -0
  204. pulumi_oci/zpr/get_configuration.py +230 -0
  205. pulumi_oci/zpr/get_zpr_policies.py +191 -0
  206. pulumi_oci/zpr/get_zpr_policy.py +264 -0
  207. pulumi_oci/zpr/outputs.py +203 -0
  208. pulumi_oci/zpr/zpr_policy.py +614 -0
  209. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/METADATA +1 -1
  210. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/RECORD +212 -142
  211. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/WHEEL +1 -1
  212. pulumi_oci/globallydistributeddatabase/_inputs.py +0 -1289
  213. pulumi_oci/globallydistributeddatabase/get_private_endpoint.py +0 -323
  214. pulumi_oci/globallydistributeddatabase/get_private_endpoints.py +0 -191
  215. pulumi_oci/globallydistributeddatabase/get_sharded_database.py +0 -660
  216. pulumi_oci/globallydistributeddatabase/get_sharded_databases.py +0 -191
  217. pulumi_oci/globallydistributeddatabase/outputs.py +0 -2063
  218. pulumi_oci/globallydistributeddatabase/private_endpoint.py +0 -747
  219. pulumi_oci/globallydistributeddatabase/sharded_database.py +0 -1821
  220. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,305 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = [
20
+ 'GetSqlFirewallPolicyAnalyticsResult',
21
+ 'AwaitableGetSqlFirewallPolicyAnalyticsResult',
22
+ 'get_sql_firewall_policy_analytics',
23
+ 'get_sql_firewall_policy_analytics_output',
24
+ ]
25
+
26
+ @pulumi.output_type
27
+ class GetSqlFirewallPolicyAnalyticsResult:
28
+ """
29
+ A collection of values returned by getSqlFirewallPolicyAnalytics.
30
+ """
31
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, group_bies=None, id=None, security_policy_id=None, sql_firewall_policy_analytics_collections=None, state=None, time_ended=None, time_started=None):
32
+ if access_level and not isinstance(access_level, str):
33
+ raise TypeError("Expected argument 'access_level' to be a str")
34
+ pulumi.set(__self__, "access_level", access_level)
35
+ if compartment_id and not isinstance(compartment_id, str):
36
+ raise TypeError("Expected argument 'compartment_id' to be a str")
37
+ pulumi.set(__self__, "compartment_id", compartment_id)
38
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
39
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
40
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if filters and not isinstance(filters, list):
42
+ raise TypeError("Expected argument 'filters' to be a list")
43
+ pulumi.set(__self__, "filters", filters)
44
+ if group_bies and not isinstance(group_bies, list):
45
+ raise TypeError("Expected argument 'group_bies' to be a list")
46
+ pulumi.set(__self__, "group_bies", group_bies)
47
+ if id and not isinstance(id, str):
48
+ raise TypeError("Expected argument 'id' to be a str")
49
+ pulumi.set(__self__, "id", id)
50
+ if security_policy_id and not isinstance(security_policy_id, str):
51
+ raise TypeError("Expected argument 'security_policy_id' to be a str")
52
+ pulumi.set(__self__, "security_policy_id", security_policy_id)
53
+ if sql_firewall_policy_analytics_collections and not isinstance(sql_firewall_policy_analytics_collections, list):
54
+ raise TypeError("Expected argument 'sql_firewall_policy_analytics_collections' to be a list")
55
+ pulumi.set(__self__, "sql_firewall_policy_analytics_collections", sql_firewall_policy_analytics_collections)
56
+ if state and not isinstance(state, str):
57
+ raise TypeError("Expected argument 'state' to be a str")
58
+ pulumi.set(__self__, "state", state)
59
+ if time_ended and not isinstance(time_ended, str):
60
+ raise TypeError("Expected argument 'time_ended' to be a str")
61
+ pulumi.set(__self__, "time_ended", time_ended)
62
+ if time_started and not isinstance(time_started, str):
63
+ raise TypeError("Expected argument 'time_started' to be a str")
64
+ pulumi.set(__self__, "time_started", time_started)
65
+
66
+ @property
67
+ @pulumi.getter(name="accessLevel")
68
+ def access_level(self) -> Optional[str]:
69
+ return pulumi.get(self, "access_level")
70
+
71
+ @property
72
+ @pulumi.getter(name="compartmentId")
73
+ def compartment_id(self) -> str:
74
+ return pulumi.get(self, "compartment_id")
75
+
76
+ @property
77
+ @pulumi.getter(name="compartmentIdInSubtree")
78
+ def compartment_id_in_subtree(self) -> Optional[bool]:
79
+ return pulumi.get(self, "compartment_id_in_subtree")
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallPolicyAnalyticsFilterResult']]:
84
+ return pulumi.get(self, "filters")
85
+
86
+ @property
87
+ @pulumi.getter(name="groupBies")
88
+ def group_bies(self) -> Optional[Sequence[str]]:
89
+ return pulumi.get(self, "group_bies")
90
+
91
+ @property
92
+ @pulumi.getter
93
+ def id(self) -> str:
94
+ """
95
+ The provider-assigned unique ID for this managed resource.
96
+ """
97
+ return pulumi.get(self, "id")
98
+
99
+ @property
100
+ @pulumi.getter(name="securityPolicyId")
101
+ def security_policy_id(self) -> Optional[str]:
102
+ """
103
+ The OCID of the security policy corresponding to the SQL Firewall policy.
104
+ """
105
+ return pulumi.get(self, "security_policy_id")
106
+
107
+ @property
108
+ @pulumi.getter(name="sqlFirewallPolicyAnalyticsCollections")
109
+ def sql_firewall_policy_analytics_collections(self) -> Sequence['outputs.GetSqlFirewallPolicyAnalyticsSqlFirewallPolicyAnalyticsCollectionResult']:
110
+ """
111
+ The list of sql_firewall_policy_analytics_collection.
112
+ """
113
+ return pulumi.get(self, "sql_firewall_policy_analytics_collections")
114
+
115
+ @property
116
+ @pulumi.getter
117
+ def state(self) -> Optional[str]:
118
+ """
119
+ The current state of the SQL Firewall policy.
120
+ """
121
+ return pulumi.get(self, "state")
122
+
123
+ @property
124
+ @pulumi.getter(name="timeEnded")
125
+ def time_ended(self) -> Optional[str]:
126
+ return pulumi.get(self, "time_ended")
127
+
128
+ @property
129
+ @pulumi.getter(name="timeStarted")
130
+ def time_started(self) -> Optional[str]:
131
+ return pulumi.get(self, "time_started")
132
+
133
+
134
+ class AwaitableGetSqlFirewallPolicyAnalyticsResult(GetSqlFirewallPolicyAnalyticsResult):
135
+ # pylint: disable=using-constant-test
136
+ def __await__(self):
137
+ if False:
138
+ yield self
139
+ return GetSqlFirewallPolicyAnalyticsResult(
140
+ access_level=self.access_level,
141
+ compartment_id=self.compartment_id,
142
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
143
+ filters=self.filters,
144
+ group_bies=self.group_bies,
145
+ id=self.id,
146
+ security_policy_id=self.security_policy_id,
147
+ sql_firewall_policy_analytics_collections=self.sql_firewall_policy_analytics_collections,
148
+ state=self.state,
149
+ time_ended=self.time_ended,
150
+ time_started=self.time_started)
151
+
152
+
153
+ def get_sql_firewall_policy_analytics(access_level: Optional[str] = None,
154
+ compartment_id: Optional[str] = None,
155
+ compartment_id_in_subtree: Optional[bool] = None,
156
+ filters: Optional[Sequence[Union['GetSqlFirewallPolicyAnalyticsFilterArgs', 'GetSqlFirewallPolicyAnalyticsFilterArgsDict']]] = None,
157
+ group_bies: Optional[Sequence[str]] = None,
158
+ security_policy_id: Optional[str] = None,
159
+ state: Optional[str] = None,
160
+ time_ended: Optional[str] = None,
161
+ time_started: Optional[str] = None,
162
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallPolicyAnalyticsResult:
163
+ """
164
+ This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
165
+
166
+ Gets a list of aggregated SQL Firewall policy details.
167
+
168
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
169
+ requestor has INSPECT permissions on at least one resource directly
170
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
171
+ principal doesn't have access to even one of the child compartments. This is valid only when
172
+ `compartmentIdInSubtree` is set to `true`.
173
+
174
+ The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
175
+ `compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
176
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
177
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
178
+
179
+ ## Example Usage
180
+
181
+ ```python
182
+ import pulumi
183
+ import pulumi_oci as oci
184
+
185
+ test_sql_firewall_policy_analytics = oci.DataSafe.get_sql_firewall_policy_analytics(compartment_id=compartment_id,
186
+ access_level=sql_firewall_policy_analytic_access_level,
187
+ compartment_id_in_subtree=sql_firewall_policy_analytic_compartment_id_in_subtree,
188
+ group_bies=sql_firewall_policy_analytic_group_by,
189
+ security_policy_id=test_security_policy["id"],
190
+ state=sql_firewall_policy_analytic_state,
191
+ time_ended=sql_firewall_policy_analytic_time_ended,
192
+ time_started=sql_firewall_policy_analytic_time_started)
193
+ ```
194
+
195
+
196
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
197
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
198
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
199
+ :param Sequence[str] group_bies: The group by parameter to summarize SQL Firewall policy aggregation.
200
+ :param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
201
+ :param str state: The current state of the SQL Firewall policy.
202
+ :param str time_ended: An optional filter to return the summary of the SQL Firewall policies created before the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
203
+ :param str time_started: An optional filter to return the summary of the SQL Firewall policies created after the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
204
+ """
205
+ __args__ = dict()
206
+ __args__['accessLevel'] = access_level
207
+ __args__['compartmentId'] = compartment_id
208
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
209
+ __args__['filters'] = filters
210
+ __args__['groupBies'] = group_bies
211
+ __args__['securityPolicyId'] = security_policy_id
212
+ __args__['state'] = state
213
+ __args__['timeEnded'] = time_ended
214
+ __args__['timeStarted'] = time_started
215
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
216
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallPolicyAnalytics:getSqlFirewallPolicyAnalytics', __args__, opts=opts, typ=GetSqlFirewallPolicyAnalyticsResult).value
217
+
218
+ return AwaitableGetSqlFirewallPolicyAnalyticsResult(
219
+ access_level=pulumi.get(__ret__, 'access_level'),
220
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
221
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
222
+ filters=pulumi.get(__ret__, 'filters'),
223
+ group_bies=pulumi.get(__ret__, 'group_bies'),
224
+ id=pulumi.get(__ret__, 'id'),
225
+ security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
226
+ sql_firewall_policy_analytics_collections=pulumi.get(__ret__, 'sql_firewall_policy_analytics_collections'),
227
+ state=pulumi.get(__ret__, 'state'),
228
+ time_ended=pulumi.get(__ret__, 'time_ended'),
229
+ time_started=pulumi.get(__ret__, 'time_started'))
230
+ def get_sql_firewall_policy_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
231
+ compartment_id: Optional[pulumi.Input[str]] = None,
232
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
233
+ filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallPolicyAnalyticsFilterArgs', 'GetSqlFirewallPolicyAnalyticsFilterArgsDict']]]]] = None,
234
+ group_bies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
235
+ security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
236
+ state: Optional[pulumi.Input[Optional[str]]] = None,
237
+ time_ended: Optional[pulumi.Input[Optional[str]]] = None,
238
+ time_started: Optional[pulumi.Input[Optional[str]]] = None,
239
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallPolicyAnalyticsResult]:
240
+ """
241
+ This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
242
+
243
+ Gets a list of aggregated SQL Firewall policy details.
244
+
245
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
246
+ requestor has INSPECT permissions on at least one resource directly
247
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
248
+ principal doesn't have access to even one of the child compartments. This is valid only when
249
+ `compartmentIdInSubtree` is set to `true`.
250
+
251
+ The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
252
+ `compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
253
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
254
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
255
+
256
+ ## Example Usage
257
+
258
+ ```python
259
+ import pulumi
260
+ import pulumi_oci as oci
261
+
262
+ test_sql_firewall_policy_analytics = oci.DataSafe.get_sql_firewall_policy_analytics(compartment_id=compartment_id,
263
+ access_level=sql_firewall_policy_analytic_access_level,
264
+ compartment_id_in_subtree=sql_firewall_policy_analytic_compartment_id_in_subtree,
265
+ group_bies=sql_firewall_policy_analytic_group_by,
266
+ security_policy_id=test_security_policy["id"],
267
+ state=sql_firewall_policy_analytic_state,
268
+ time_ended=sql_firewall_policy_analytic_time_ended,
269
+ time_started=sql_firewall_policy_analytic_time_started)
270
+ ```
271
+
272
+
273
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
274
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
275
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
276
+ :param Sequence[str] group_bies: The group by parameter to summarize SQL Firewall policy aggregation.
277
+ :param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
278
+ :param str state: The current state of the SQL Firewall policy.
279
+ :param str time_ended: An optional filter to return the summary of the SQL Firewall policies created before the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
280
+ :param str time_started: An optional filter to return the summary of the SQL Firewall policies created after the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
281
+ """
282
+ __args__ = dict()
283
+ __args__['accessLevel'] = access_level
284
+ __args__['compartmentId'] = compartment_id
285
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
286
+ __args__['filters'] = filters
287
+ __args__['groupBies'] = group_bies
288
+ __args__['securityPolicyId'] = security_policy_id
289
+ __args__['state'] = state
290
+ __args__['timeEnded'] = time_ended
291
+ __args__['timeStarted'] = time_started
292
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
293
+ __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallPolicyAnalytics:getSqlFirewallPolicyAnalytics', __args__, opts=opts, typ=GetSqlFirewallPolicyAnalyticsResult)
294
+ return __ret__.apply(lambda __response__: GetSqlFirewallPolicyAnalyticsResult(
295
+ access_level=pulumi.get(__response__, 'access_level'),
296
+ compartment_id=pulumi.get(__response__, 'compartment_id'),
297
+ compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
298
+ filters=pulumi.get(__response__, 'filters'),
299
+ group_bies=pulumi.get(__response__, 'group_bies'),
300
+ id=pulumi.get(__response__, 'id'),
301
+ security_policy_id=pulumi.get(__response__, 'security_policy_id'),
302
+ sql_firewall_policy_analytics_collections=pulumi.get(__response__, 'sql_firewall_policy_analytics_collections'),
303
+ state=pulumi.get(__response__, 'state'),
304
+ time_ended=pulumi.get(__response__, 'time_ended'),
305
+ time_started=pulumi.get(__response__, 'time_started')))
@@ -0,0 +1,306 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = [
20
+ 'GetSqlFirewallViolationAnalyticsResult',
21
+ 'AwaitableGetSqlFirewallViolationAnalyticsResult',
22
+ 'get_sql_firewall_violation_analytics',
23
+ 'get_sql_firewall_violation_analytics_output',
24
+ ]
25
+
26
+ @pulumi.output_type
27
+ class GetSqlFirewallViolationAnalyticsResult:
28
+ """
29
+ A collection of values returned by getSqlFirewallViolationAnalytics.
30
+ """
31
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, group_bies=None, id=None, query_time_zone=None, scim_query=None, sql_firewall_violation_analytics_collections=None, summary_fields=None, time_ended=None, time_started=None):
32
+ if access_level and not isinstance(access_level, str):
33
+ raise TypeError("Expected argument 'access_level' to be a str")
34
+ pulumi.set(__self__, "access_level", access_level)
35
+ if compartment_id and not isinstance(compartment_id, str):
36
+ raise TypeError("Expected argument 'compartment_id' to be a str")
37
+ pulumi.set(__self__, "compartment_id", compartment_id)
38
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
39
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
40
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if filters and not isinstance(filters, list):
42
+ raise TypeError("Expected argument 'filters' to be a list")
43
+ pulumi.set(__self__, "filters", filters)
44
+ if group_bies and not isinstance(group_bies, list):
45
+ raise TypeError("Expected argument 'group_bies' to be a list")
46
+ pulumi.set(__self__, "group_bies", group_bies)
47
+ if id and not isinstance(id, str):
48
+ raise TypeError("Expected argument 'id' to be a str")
49
+ pulumi.set(__self__, "id", id)
50
+ if query_time_zone and not isinstance(query_time_zone, str):
51
+ raise TypeError("Expected argument 'query_time_zone' to be a str")
52
+ pulumi.set(__self__, "query_time_zone", query_time_zone)
53
+ if scim_query and not isinstance(scim_query, str):
54
+ raise TypeError("Expected argument 'scim_query' to be a str")
55
+ pulumi.set(__self__, "scim_query", scim_query)
56
+ if sql_firewall_violation_analytics_collections and not isinstance(sql_firewall_violation_analytics_collections, list):
57
+ raise TypeError("Expected argument 'sql_firewall_violation_analytics_collections' to be a list")
58
+ pulumi.set(__self__, "sql_firewall_violation_analytics_collections", sql_firewall_violation_analytics_collections)
59
+ if summary_fields and not isinstance(summary_fields, list):
60
+ raise TypeError("Expected argument 'summary_fields' to be a list")
61
+ pulumi.set(__self__, "summary_fields", summary_fields)
62
+ if time_ended and not isinstance(time_ended, str):
63
+ raise TypeError("Expected argument 'time_ended' to be a str")
64
+ pulumi.set(__self__, "time_ended", time_ended)
65
+ if time_started and not isinstance(time_started, str):
66
+ raise TypeError("Expected argument 'time_started' to be a str")
67
+ pulumi.set(__self__, "time_started", time_started)
68
+
69
+ @property
70
+ @pulumi.getter(name="accessLevel")
71
+ def access_level(self) -> Optional[str]:
72
+ return pulumi.get(self, "access_level")
73
+
74
+ @property
75
+ @pulumi.getter(name="compartmentId")
76
+ def compartment_id(self) -> str:
77
+ return pulumi.get(self, "compartment_id")
78
+
79
+ @property
80
+ @pulumi.getter(name="compartmentIdInSubtree")
81
+ def compartment_id_in_subtree(self) -> Optional[bool]:
82
+ return pulumi.get(self, "compartment_id_in_subtree")
83
+
84
+ @property
85
+ @pulumi.getter
86
+ def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallViolationAnalyticsFilterResult']]:
87
+ return pulumi.get(self, "filters")
88
+
89
+ @property
90
+ @pulumi.getter(name="groupBies")
91
+ def group_bies(self) -> Optional[Sequence[str]]:
92
+ return pulumi.get(self, "group_bies")
93
+
94
+ @property
95
+ @pulumi.getter
96
+ def id(self) -> str:
97
+ """
98
+ The provider-assigned unique ID for this managed resource.
99
+ """
100
+ return pulumi.get(self, "id")
101
+
102
+ @property
103
+ @pulumi.getter(name="queryTimeZone")
104
+ def query_time_zone(self) -> Optional[str]:
105
+ return pulumi.get(self, "query_time_zone")
106
+
107
+ @property
108
+ @pulumi.getter(name="scimQuery")
109
+ def scim_query(self) -> Optional[str]:
110
+ return pulumi.get(self, "scim_query")
111
+
112
+ @property
113
+ @pulumi.getter(name="sqlFirewallViolationAnalyticsCollections")
114
+ def sql_firewall_violation_analytics_collections(self) -> Sequence['outputs.GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollectionResult']:
115
+ """
116
+ The list of sql_firewall_violation_analytics_collection.
117
+ """
118
+ return pulumi.get(self, "sql_firewall_violation_analytics_collections")
119
+
120
+ @property
121
+ @pulumi.getter(name="summaryFields")
122
+ def summary_fields(self) -> Optional[Sequence[str]]:
123
+ return pulumi.get(self, "summary_fields")
124
+
125
+ @property
126
+ @pulumi.getter(name="timeEnded")
127
+ def time_ended(self) -> Optional[str]:
128
+ """
129
+ The time at which the aggregation ended.
130
+ """
131
+ return pulumi.get(self, "time_ended")
132
+
133
+ @property
134
+ @pulumi.getter(name="timeStarted")
135
+ def time_started(self) -> Optional[str]:
136
+ """
137
+ The time at which the aggregation started.
138
+ """
139
+ return pulumi.get(self, "time_started")
140
+
141
+
142
+ class AwaitableGetSqlFirewallViolationAnalyticsResult(GetSqlFirewallViolationAnalyticsResult):
143
+ # pylint: disable=using-constant-test
144
+ def __await__(self):
145
+ if False:
146
+ yield self
147
+ return GetSqlFirewallViolationAnalyticsResult(
148
+ access_level=self.access_level,
149
+ compartment_id=self.compartment_id,
150
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
151
+ filters=self.filters,
152
+ group_bies=self.group_bies,
153
+ id=self.id,
154
+ query_time_zone=self.query_time_zone,
155
+ scim_query=self.scim_query,
156
+ sql_firewall_violation_analytics_collections=self.sql_firewall_violation_analytics_collections,
157
+ summary_fields=self.summary_fields,
158
+ time_ended=self.time_ended,
159
+ time_started=self.time_started)
160
+
161
+
162
+ def get_sql_firewall_violation_analytics(access_level: Optional[str] = None,
163
+ compartment_id: Optional[str] = None,
164
+ compartment_id_in_subtree: Optional[bool] = None,
165
+ filters: Optional[Sequence[Union['GetSqlFirewallViolationAnalyticsFilterArgs', 'GetSqlFirewallViolationAnalyticsFilterArgsDict']]] = None,
166
+ group_bies: Optional[Sequence[str]] = None,
167
+ query_time_zone: Optional[str] = None,
168
+ scim_query: Optional[str] = None,
169
+ summary_fields: Optional[Sequence[str]] = None,
170
+ time_ended: Optional[str] = None,
171
+ time_started: Optional[str] = None,
172
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallViolationAnalyticsResult:
173
+ """
174
+ This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
175
+
176
+ Returns the aggregation details of the SQL Firewall violations.
177
+
178
+ ## Example Usage
179
+
180
+ ```python
181
+ import pulumi
182
+ import pulumi_oci as oci
183
+
184
+ test_sql_firewall_violation_analytics = oci.DataSafe.get_sql_firewall_violation_analytics(compartment_id=compartment_id,
185
+ access_level=sql_firewall_violation_analytic_access_level,
186
+ compartment_id_in_subtree=sql_firewall_violation_analytic_compartment_id_in_subtree,
187
+ group_bies=sql_firewall_violation_analytic_group_by,
188
+ query_time_zone=sql_firewall_violation_analytic_query_time_zone,
189
+ scim_query=sql_firewall_violation_analytic_scim_query,
190
+ summary_fields=sql_firewall_violation_analytic_summary_field,
191
+ time_ended=sql_firewall_violation_analytic_time_ended,
192
+ time_started=sql_firewall_violation_analytic_time_started)
193
+ ```
194
+
195
+
196
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
197
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
198
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
199
+ :param Sequence[str] group_bies: A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
200
+ :param str query_time_zone: Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
201
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
202
+
203
+ **Example:** query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
204
+ :param Sequence[str] summary_fields: Specifies a subset of summarized fields to be returned in the response.
205
+ :param str time_ended: An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
206
+ :param str time_started: An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
207
+ """
208
+ __args__ = dict()
209
+ __args__['accessLevel'] = access_level
210
+ __args__['compartmentId'] = compartment_id
211
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
212
+ __args__['filters'] = filters
213
+ __args__['groupBies'] = group_bies
214
+ __args__['queryTimeZone'] = query_time_zone
215
+ __args__['scimQuery'] = scim_query
216
+ __args__['summaryFields'] = summary_fields
217
+ __args__['timeEnded'] = time_ended
218
+ __args__['timeStarted'] = time_started
219
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
220
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallViolationAnalytics:getSqlFirewallViolationAnalytics', __args__, opts=opts, typ=GetSqlFirewallViolationAnalyticsResult).value
221
+
222
+ return AwaitableGetSqlFirewallViolationAnalyticsResult(
223
+ access_level=pulumi.get(__ret__, 'access_level'),
224
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
225
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
226
+ filters=pulumi.get(__ret__, 'filters'),
227
+ group_bies=pulumi.get(__ret__, 'group_bies'),
228
+ id=pulumi.get(__ret__, 'id'),
229
+ query_time_zone=pulumi.get(__ret__, 'query_time_zone'),
230
+ scim_query=pulumi.get(__ret__, 'scim_query'),
231
+ sql_firewall_violation_analytics_collections=pulumi.get(__ret__, 'sql_firewall_violation_analytics_collections'),
232
+ summary_fields=pulumi.get(__ret__, 'summary_fields'),
233
+ time_ended=pulumi.get(__ret__, 'time_ended'),
234
+ time_started=pulumi.get(__ret__, 'time_started'))
235
+ def get_sql_firewall_violation_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
236
+ compartment_id: Optional[pulumi.Input[str]] = None,
237
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
238
+ filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallViolationAnalyticsFilterArgs', 'GetSqlFirewallViolationAnalyticsFilterArgsDict']]]]] = None,
239
+ group_bies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
240
+ query_time_zone: Optional[pulumi.Input[Optional[str]]] = None,
241
+ scim_query: Optional[pulumi.Input[Optional[str]]] = None,
242
+ summary_fields: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
243
+ time_ended: Optional[pulumi.Input[Optional[str]]] = None,
244
+ time_started: Optional[pulumi.Input[Optional[str]]] = None,
245
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallViolationAnalyticsResult]:
246
+ """
247
+ This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
248
+
249
+ Returns the aggregation details of the SQL Firewall violations.
250
+
251
+ ## Example Usage
252
+
253
+ ```python
254
+ import pulumi
255
+ import pulumi_oci as oci
256
+
257
+ test_sql_firewall_violation_analytics = oci.DataSafe.get_sql_firewall_violation_analytics(compartment_id=compartment_id,
258
+ access_level=sql_firewall_violation_analytic_access_level,
259
+ compartment_id_in_subtree=sql_firewall_violation_analytic_compartment_id_in_subtree,
260
+ group_bies=sql_firewall_violation_analytic_group_by,
261
+ query_time_zone=sql_firewall_violation_analytic_query_time_zone,
262
+ scim_query=sql_firewall_violation_analytic_scim_query,
263
+ summary_fields=sql_firewall_violation_analytic_summary_field,
264
+ time_ended=sql_firewall_violation_analytic_time_ended,
265
+ time_started=sql_firewall_violation_analytic_time_started)
266
+ ```
267
+
268
+
269
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
270
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
271
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
272
+ :param Sequence[str] group_bies: A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
273
+ :param str query_time_zone: Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
274
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
275
+
276
+ **Example:** query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
277
+ :param Sequence[str] summary_fields: Specifies a subset of summarized fields to be returned in the response.
278
+ :param str time_ended: An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
279
+ :param str time_started: An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
280
+ """
281
+ __args__ = dict()
282
+ __args__['accessLevel'] = access_level
283
+ __args__['compartmentId'] = compartment_id
284
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
285
+ __args__['filters'] = filters
286
+ __args__['groupBies'] = group_bies
287
+ __args__['queryTimeZone'] = query_time_zone
288
+ __args__['scimQuery'] = scim_query
289
+ __args__['summaryFields'] = summary_fields
290
+ __args__['timeEnded'] = time_ended
291
+ __args__['timeStarted'] = time_started
292
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
293
+ __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallViolationAnalytics:getSqlFirewallViolationAnalytics', __args__, opts=opts, typ=GetSqlFirewallViolationAnalyticsResult)
294
+ return __ret__.apply(lambda __response__: GetSqlFirewallViolationAnalyticsResult(
295
+ access_level=pulumi.get(__response__, 'access_level'),
296
+ compartment_id=pulumi.get(__response__, 'compartment_id'),
297
+ compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
298
+ filters=pulumi.get(__response__, 'filters'),
299
+ group_bies=pulumi.get(__response__, 'group_bies'),
300
+ id=pulumi.get(__response__, 'id'),
301
+ query_time_zone=pulumi.get(__response__, 'query_time_zone'),
302
+ scim_query=pulumi.get(__response__, 'scim_query'),
303
+ sql_firewall_violation_analytics_collections=pulumi.get(__response__, 'sql_firewall_violation_analytics_collections'),
304
+ summary_fields=pulumi.get(__response__, 'summary_fields'),
305
+ time_ended=pulumi.get(__response__, 'time_ended'),
306
+ time_started=pulumi.get(__response__, 'time_started')))