pulumi-oci 2.12.0a1728593306__py3-none-any.whl → 2.13.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +169 -19
- pulumi_oci/analytics/analytics_instance.py +54 -5
- pulumi_oci/analytics/get_analytics_instance.py +18 -4
- pulumi_oci/analytics/outputs.py +12 -1
- pulumi_oci/containerengine/_inputs.py +341 -0
- pulumi_oci/containerengine/cluster.py +64 -0
- pulumi_oci/containerengine/get_cluster.py +12 -1
- pulumi_oci/containerengine/outputs.py +582 -0
- pulumi_oci/core/_inputs.py +947 -196
- pulumi_oci/core/boot_volume.py +90 -5
- pulumi_oci/core/cluster_network.py +7 -7
- pulumi_oci/core/get_block_volume_replica.py +15 -1
- pulumi_oci/core/get_boot_volume.py +15 -4
- pulumi_oci/core/get_boot_volume_replica.py +15 -1
- pulumi_oci/core/get_instance.py +29 -1
- pulumi_oci/core/get_vcn.py +15 -1
- pulumi_oci/core/get_vnic.py +15 -1
- pulumi_oci/core/get_volume.py +18 -4
- pulumi_oci/core/instance.py +87 -0
- pulumi_oci/core/instance_configuration.py +16 -0
- pulumi_oci/core/ipsec.py +183 -23
- pulumi_oci/core/network_security_group_security_rule.py +2 -2
- pulumi_oci/core/outputs.py +1282 -153
- pulumi_oci/core/service_gateway.py +13 -7
- pulumi_oci/core/vcn.py +65 -23
- pulumi_oci/core/virtual_network.py +35 -1
- pulumi_oci/core/vnic_attachment.py +2 -0
- pulumi_oci/core/volume.py +110 -12
- pulumi_oci/core/volume_backup_policy_assignment.py +68 -19
- pulumi_oci/core/volume_group.py +56 -5
- pulumi_oci/database/_inputs.py +905 -27
- pulumi_oci/database/autonomous_database.py +48 -28
- pulumi_oci/database/autonomous_database_backup.py +12 -12
- pulumi_oci/database/autonomous_exadata_infrastructure.py +2 -0
- pulumi_oci/database/autonomous_vm_cluster.py +2 -0
- pulumi_oci/database/backup.py +12 -12
- pulumi_oci/database/cloud_autonomous_vm_cluster.py +2 -0
- pulumi_oci/database/cloud_exadata_infrastructure.py +2 -0
- pulumi_oci/database/cloud_vm_cluster.py +71 -0
- pulumi_oci/database/database.py +15 -15
- pulumi_oci/database/database_upgrade.py +12 -12
- pulumi_oci/database/db_system.py +9 -9
- pulumi_oci/database/exadata_infrastructure.py +2 -0
- pulumi_oci/database/get_autonomous_container_database.py +1 -1
- pulumi_oci/database/get_autonomous_database.py +18 -4
- pulumi_oci/database/get_autonomous_database_backup.py +3 -3
- pulumi_oci/database/get_autonomous_databases.py +88 -5
- pulumi_oci/database/get_cloud_vm_cluster.py +15 -1
- pulumi_oci/database/get_database.py +3 -3
- pulumi_oci/database/get_pluggable_database.py +12 -1
- pulumi_oci/database/get_vm_cluster.py +15 -1
- pulumi_oci/database/outputs.py +1431 -74
- pulumi_oci/database/pluggable_database.py +34 -0
- pulumi_oci/database/vm_cluster.py +71 -0
- pulumi_oci/database/vm_cluster_add_virtual_network.py +28 -0
- pulumi_oci/database/vm_cluster_remove_virtual_machine.py +28 -0
- pulumi_oci/datasafe/__init__.py +13 -0
- pulumi_oci/datasafe/_inputs.py +441 -0
- pulumi_oci/datasafe/generate_on_prem_connector_configuration.py +271 -0
- pulumi_oci/datasafe/get_reports.py +23 -1
- pulumi_oci/datasafe/get_sql_collection.py +392 -0
- pulumi_oci/datasafe/get_sql_collection_analytics.py +309 -0
- pulumi_oci/datasafe/get_sql_collection_log_insights.py +207 -0
- pulumi_oci/datasafe/get_sql_collections.py +364 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sql.py +337 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +250 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +234 -0
- pulumi_oci/datasafe/get_sql_firewall_policies.py +386 -0
- pulumi_oci/datasafe/get_sql_firewall_policy.py +393 -0
- pulumi_oci/datasafe/get_sql_firewall_policy_analytics.py +305 -0
- pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +306 -0
- pulumi_oci/datasafe/get_sql_firewall_violations.py +208 -0
- pulumi_oci/datasafe/outputs.py +1808 -2
- pulumi_oci/desktops/_inputs.py +395 -17
- pulumi_oci/desktops/desktop_pool.py +253 -21
- pulumi_oci/desktops/get_desktop_pool.py +62 -5
- pulumi_oci/desktops/outputs.py +807 -25
- pulumi_oci/dns/__init__.py +2 -0
- pulumi_oci/dns/_inputs.py +1157 -12
- pulumi_oci/dns/action_create_zone_from_zone_file.py +42 -2
- pulumi_oci/dns/get_records.py +45 -13
- pulumi_oci/dns/get_resolver.py +8 -6
- pulumi_oci/dns/get_resolver_endpoint.py +8 -6
- pulumi_oci/dns/get_resolver_endpoints.py +2 -2
- pulumi_oci/dns/get_resolvers.py +12 -12
- pulumi_oci/dns/get_rrset.py +16 -16
- pulumi_oci/dns/get_rrsets.py +12 -10
- pulumi_oci/dns/get_view.py +8 -4
- pulumi_oci/dns/get_views.py +12 -12
- pulumi_oci/dns/get_zones.py +33 -13
- pulumi_oci/dns/outputs.py +1388 -79
- pulumi_oci/dns/record.py +12 -12
- pulumi_oci/dns/resolver.py +7 -7
- pulumi_oci/dns/resolver_endpoint.py +2 -2
- pulumi_oci/dns/rrset.py +50 -41
- pulumi_oci/dns/zone.py +176 -17
- pulumi_oci/dns/zone_promote_dnssec_key_version.py +328 -0
- pulumi_oci/dns/zone_stage_dnssec_key_version.py +318 -0
- pulumi_oci/fleetappsmanagement/__init__.py +43 -0
- pulumi_oci/fleetappsmanagement/_inputs.py +2057 -0
- pulumi_oci/fleetappsmanagement/fleet.py +955 -0
- pulumi_oci/fleetappsmanagement/fleet_credential.py +615 -0
- pulumi_oci/fleetappsmanagement/fleet_property.py +585 -0
- pulumi_oci/fleetappsmanagement/fleet_resource.py +851 -0
- pulumi_oci/fleetappsmanagement/get_announcements.py +166 -0
- pulumi_oci/fleetappsmanagement/get_fleet.py +394 -0
- pulumi_oci/fleetappsmanagement/get_fleet_compliance_report.py +164 -0
- pulumi_oci/fleetappsmanagement/get_fleet_credential.py +273 -0
- pulumi_oci/fleetappsmanagement/get_fleet_credentials.py +240 -0
- pulumi_oci/fleetappsmanagement/get_fleet_products.py +232 -0
- pulumi_oci/fleetappsmanagement/get_fleet_properties.py +218 -0
- pulumi_oci/fleetappsmanagement/get_fleet_property.py +286 -0
- pulumi_oci/fleetappsmanagement/get_fleet_resource.py +398 -0
- pulumi_oci/fleetappsmanagement/get_fleet_resources.py +237 -0
- pulumi_oci/fleetappsmanagement/get_fleet_targets.py +232 -0
- pulumi_oci/fleetappsmanagement/get_fleets.py +284 -0
- pulumi_oci/fleetappsmanagement/get_inventory_resources.py +311 -0
- pulumi_oci/fleetappsmanagement/get_maintenance_window.py +365 -0
- pulumi_oci/fleetappsmanagement/get_maintenance_windows.py +199 -0
- pulumi_oci/fleetappsmanagement/get_onboarding_policies.py +123 -0
- pulumi_oci/fleetappsmanagement/get_onboardings.py +177 -0
- pulumi_oci/fleetappsmanagement/get_properties.py +221 -0
- pulumi_oci/fleetappsmanagement/get_property.py +323 -0
- pulumi_oci/fleetappsmanagement/get_runbook.py +377 -0
- pulumi_oci/fleetappsmanagement/get_runbooks.py +284 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definition.py +436 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definition_scheduled_fleets.py +185 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definitions.py +262 -0
- pulumi_oci/fleetappsmanagement/get_task_record.py +307 -0
- pulumi_oci/fleetappsmanagement/get_task_records.py +240 -0
- pulumi_oci/fleetappsmanagement/maintenance_window.py +935 -0
- pulumi_oci/fleetappsmanagement/onboarding.py +477 -0
- pulumi_oci/fleetappsmanagement/outputs.py +8128 -0
- pulumi_oci/fleetappsmanagement/property.py +697 -0
- pulumi_oci/fleetappsmanagement/scheduler_definition.py +1035 -0
- pulumi_oci/functions/get_fusion_environment_refresh_activity.py +15 -1
- pulumi_oci/functions/outputs.py +11 -0
- pulumi_oci/fusionapps/_inputs.py +21 -20
- pulumi_oci/fusionapps/fusion_environment.py +2 -2
- pulumi_oci/fusionapps/fusion_environment_admin_user.py +21 -22
- pulumi_oci/fusionapps/fusion_environment_refresh_activity.py +48 -51
- pulumi_oci/fusionapps/outputs.py +11 -10
- pulumi_oci/goldengate/__init__.py +1 -0
- pulumi_oci/goldengate/_inputs.py +165 -0
- pulumi_oci/goldengate/connection.py +49 -35
- pulumi_oci/goldengate/database_registration.py +7 -7
- pulumi_oci/goldengate/deployment.py +79 -4
- pulumi_oci/goldengate/get_deployment.py +30 -2
- pulumi_oci/goldengate/get_deployment_environments.py +144 -0
- pulumi_oci/goldengate/outputs.py +409 -2
- pulumi_oci/integration/__init__.py +1 -0
- pulumi_oci/integration/_inputs.py +289 -2
- pulumi_oci/integration/get_integration_instance.py +65 -1
- pulumi_oci/integration/integration_instance.py +172 -0
- pulumi_oci/integration/oracle_managed_custom_endpoint.py +307 -0
- pulumi_oci/integration/outputs.py +587 -19
- pulumi_oci/loadbalancer/_inputs.py +20 -0
- pulumi_oci/loadbalancer/listener.py +4 -2
- pulumi_oci/loadbalancer/outputs.py +16 -2
- pulumi_oci/monitoring/_inputs.py +137 -16
- pulumi_oci/monitoring/alarm_suppression.py +164 -35
- pulumi_oci/monitoring/get_alarm_statuses.py +5 -3
- pulumi_oci/monitoring/get_alarm_suppression.py +33 -3
- pulumi_oci/monitoring/get_alarm_suppressions.py +137 -14
- pulumi_oci/monitoring/outputs.py +291 -18
- pulumi_oci/mysql/mysql_db_system.py +7 -7
- pulumi_oci/objectstorage/__init__.py +3 -0
- pulumi_oci/objectstorage/_inputs.py +97 -0
- pulumi_oci/objectstorage/get_object_versions.py +6 -6
- pulumi_oci/objectstorage/get_objects.py +6 -6
- pulumi_oci/objectstorage/get_private_endpoint.py +263 -0
- pulumi_oci/objectstorage/get_private_endpoint_summaries.py +128 -0
- pulumi_oci/objectstorage/outputs.py +258 -0
- pulumi_oci/objectstorage/private_endpoint.py +630 -0
- pulumi_oci/objectstorage/storage_object.py +7 -7
- pulumi_oci/opsi/_inputs.py +268 -114
- pulumi_oci/opsi/database_insight.py +162 -21
- pulumi_oci/opsi/exadata_insight.py +44 -0
- pulumi_oci/opsi/get_database_insight.py +40 -1
- pulumi_oci/opsi/get_host_insights.py +2 -2
- pulumi_oci/opsi/host_insight.py +0 -48
- pulumi_oci/opsi/outputs.py +405 -109
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/securityattribute/__init__.py +15 -0
- pulumi_oci/securityattribute/_inputs.py +209 -0
- pulumi_oci/securityattribute/get_security_attribute.py +262 -0
- pulumi_oci/securityattribute/get_security_attribute_namespace.py +253 -0
- pulumi_oci/securityattribute/get_security_attribute_namespaces.py +210 -0
- pulumi_oci/securityattribute/get_security_attributes.py +169 -0
- pulumi_oci/securityattribute/outputs.py +466 -0
- pulumi_oci/securityattribute/security_attribute.py +588 -0
- pulumi_oci/securityattribute/security_attribute_namespace.py +609 -0
- pulumi_oci/stackmonitoring/__init__.py +5 -0
- pulumi_oci/stackmonitoring/_inputs.py +330 -0
- pulumi_oci/stackmonitoring/get_maintenance_window.py +254 -0
- pulumi_oci/stackmonitoring/get_maintenance_windows.py +210 -0
- pulumi_oci/stackmonitoring/maintenance_window.py +551 -0
- pulumi_oci/stackmonitoring/maintenance_windows_retry_failed_operation.py +217 -0
- pulumi_oci/stackmonitoring/maintenance_windows_stop.py +217 -0
- pulumi_oci/stackmonitoring/outputs.py +603 -0
- pulumi_oci/{globallydistributeddatabase → zpr}/__init__.py +5 -6
- pulumi_oci/zpr/_inputs.py +79 -0
- pulumi_oci/zpr/configuration.py +516 -0
- pulumi_oci/zpr/get_configuration.py +230 -0
- pulumi_oci/zpr/get_zpr_policies.py +191 -0
- pulumi_oci/zpr/get_zpr_policy.py +264 -0
- pulumi_oci/zpr/outputs.py +203 -0
- pulumi_oci/zpr/zpr_policy.py +614 -0
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/METADATA +1 -1
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/RECORD +212 -142
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/WHEEL +1 -1
- pulumi_oci/globallydistributeddatabase/_inputs.py +0 -1289
- pulumi_oci/globallydistributeddatabase/get_private_endpoint.py +0 -323
- pulumi_oci/globallydistributeddatabase/get_private_endpoints.py +0 -191
- pulumi_oci/globallydistributeddatabase/get_sharded_database.py +0 -660
- pulumi_oci/globallydistributeddatabase/get_sharded_databases.py +0 -191
- pulumi_oci/globallydistributeddatabase/outputs.py +0 -2063
- pulumi_oci/globallydistributeddatabase/private_endpoint.py +0 -747
- pulumi_oci/globallydistributeddatabase/sharded_database.py +0 -1821
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,305 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
from ._inputs import *
|
18
|
+
|
19
|
+
__all__ = [
|
20
|
+
'GetSqlFirewallPolicyAnalyticsResult',
|
21
|
+
'AwaitableGetSqlFirewallPolicyAnalyticsResult',
|
22
|
+
'get_sql_firewall_policy_analytics',
|
23
|
+
'get_sql_firewall_policy_analytics_output',
|
24
|
+
]
|
25
|
+
|
26
|
+
@pulumi.output_type
|
27
|
+
class GetSqlFirewallPolicyAnalyticsResult:
|
28
|
+
"""
|
29
|
+
A collection of values returned by getSqlFirewallPolicyAnalytics.
|
30
|
+
"""
|
31
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, group_bies=None, id=None, security_policy_id=None, sql_firewall_policy_analytics_collections=None, state=None, time_ended=None, time_started=None):
|
32
|
+
if access_level and not isinstance(access_level, str):
|
33
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
34
|
+
pulumi.set(__self__, "access_level", access_level)
|
35
|
+
if compartment_id and not isinstance(compartment_id, str):
|
36
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
37
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
38
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
39
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
40
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
41
|
+
if filters and not isinstance(filters, list):
|
42
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
43
|
+
pulumi.set(__self__, "filters", filters)
|
44
|
+
if group_bies and not isinstance(group_bies, list):
|
45
|
+
raise TypeError("Expected argument 'group_bies' to be a list")
|
46
|
+
pulumi.set(__self__, "group_bies", group_bies)
|
47
|
+
if id and not isinstance(id, str):
|
48
|
+
raise TypeError("Expected argument 'id' to be a str")
|
49
|
+
pulumi.set(__self__, "id", id)
|
50
|
+
if security_policy_id and not isinstance(security_policy_id, str):
|
51
|
+
raise TypeError("Expected argument 'security_policy_id' to be a str")
|
52
|
+
pulumi.set(__self__, "security_policy_id", security_policy_id)
|
53
|
+
if sql_firewall_policy_analytics_collections and not isinstance(sql_firewall_policy_analytics_collections, list):
|
54
|
+
raise TypeError("Expected argument 'sql_firewall_policy_analytics_collections' to be a list")
|
55
|
+
pulumi.set(__self__, "sql_firewall_policy_analytics_collections", sql_firewall_policy_analytics_collections)
|
56
|
+
if state and not isinstance(state, str):
|
57
|
+
raise TypeError("Expected argument 'state' to be a str")
|
58
|
+
pulumi.set(__self__, "state", state)
|
59
|
+
if time_ended and not isinstance(time_ended, str):
|
60
|
+
raise TypeError("Expected argument 'time_ended' to be a str")
|
61
|
+
pulumi.set(__self__, "time_ended", time_ended)
|
62
|
+
if time_started and not isinstance(time_started, str):
|
63
|
+
raise TypeError("Expected argument 'time_started' to be a str")
|
64
|
+
pulumi.set(__self__, "time_started", time_started)
|
65
|
+
|
66
|
+
@property
|
67
|
+
@pulumi.getter(name="accessLevel")
|
68
|
+
def access_level(self) -> Optional[str]:
|
69
|
+
return pulumi.get(self, "access_level")
|
70
|
+
|
71
|
+
@property
|
72
|
+
@pulumi.getter(name="compartmentId")
|
73
|
+
def compartment_id(self) -> str:
|
74
|
+
return pulumi.get(self, "compartment_id")
|
75
|
+
|
76
|
+
@property
|
77
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
78
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
79
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
80
|
+
|
81
|
+
@property
|
82
|
+
@pulumi.getter
|
83
|
+
def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallPolicyAnalyticsFilterResult']]:
|
84
|
+
return pulumi.get(self, "filters")
|
85
|
+
|
86
|
+
@property
|
87
|
+
@pulumi.getter(name="groupBies")
|
88
|
+
def group_bies(self) -> Optional[Sequence[str]]:
|
89
|
+
return pulumi.get(self, "group_bies")
|
90
|
+
|
91
|
+
@property
|
92
|
+
@pulumi.getter
|
93
|
+
def id(self) -> str:
|
94
|
+
"""
|
95
|
+
The provider-assigned unique ID for this managed resource.
|
96
|
+
"""
|
97
|
+
return pulumi.get(self, "id")
|
98
|
+
|
99
|
+
@property
|
100
|
+
@pulumi.getter(name="securityPolicyId")
|
101
|
+
def security_policy_id(self) -> Optional[str]:
|
102
|
+
"""
|
103
|
+
The OCID of the security policy corresponding to the SQL Firewall policy.
|
104
|
+
"""
|
105
|
+
return pulumi.get(self, "security_policy_id")
|
106
|
+
|
107
|
+
@property
|
108
|
+
@pulumi.getter(name="sqlFirewallPolicyAnalyticsCollections")
|
109
|
+
def sql_firewall_policy_analytics_collections(self) -> Sequence['outputs.GetSqlFirewallPolicyAnalyticsSqlFirewallPolicyAnalyticsCollectionResult']:
|
110
|
+
"""
|
111
|
+
The list of sql_firewall_policy_analytics_collection.
|
112
|
+
"""
|
113
|
+
return pulumi.get(self, "sql_firewall_policy_analytics_collections")
|
114
|
+
|
115
|
+
@property
|
116
|
+
@pulumi.getter
|
117
|
+
def state(self) -> Optional[str]:
|
118
|
+
"""
|
119
|
+
The current state of the SQL Firewall policy.
|
120
|
+
"""
|
121
|
+
return pulumi.get(self, "state")
|
122
|
+
|
123
|
+
@property
|
124
|
+
@pulumi.getter(name="timeEnded")
|
125
|
+
def time_ended(self) -> Optional[str]:
|
126
|
+
return pulumi.get(self, "time_ended")
|
127
|
+
|
128
|
+
@property
|
129
|
+
@pulumi.getter(name="timeStarted")
|
130
|
+
def time_started(self) -> Optional[str]:
|
131
|
+
return pulumi.get(self, "time_started")
|
132
|
+
|
133
|
+
|
134
|
+
class AwaitableGetSqlFirewallPolicyAnalyticsResult(GetSqlFirewallPolicyAnalyticsResult):
|
135
|
+
# pylint: disable=using-constant-test
|
136
|
+
def __await__(self):
|
137
|
+
if False:
|
138
|
+
yield self
|
139
|
+
return GetSqlFirewallPolicyAnalyticsResult(
|
140
|
+
access_level=self.access_level,
|
141
|
+
compartment_id=self.compartment_id,
|
142
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
143
|
+
filters=self.filters,
|
144
|
+
group_bies=self.group_bies,
|
145
|
+
id=self.id,
|
146
|
+
security_policy_id=self.security_policy_id,
|
147
|
+
sql_firewall_policy_analytics_collections=self.sql_firewall_policy_analytics_collections,
|
148
|
+
state=self.state,
|
149
|
+
time_ended=self.time_ended,
|
150
|
+
time_started=self.time_started)
|
151
|
+
|
152
|
+
|
153
|
+
def get_sql_firewall_policy_analytics(access_level: Optional[str] = None,
|
154
|
+
compartment_id: Optional[str] = None,
|
155
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
156
|
+
filters: Optional[Sequence[Union['GetSqlFirewallPolicyAnalyticsFilterArgs', 'GetSqlFirewallPolicyAnalyticsFilterArgsDict']]] = None,
|
157
|
+
group_bies: Optional[Sequence[str]] = None,
|
158
|
+
security_policy_id: Optional[str] = None,
|
159
|
+
state: Optional[str] = None,
|
160
|
+
time_ended: Optional[str] = None,
|
161
|
+
time_started: Optional[str] = None,
|
162
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallPolicyAnalyticsResult:
|
163
|
+
"""
|
164
|
+
This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
|
165
|
+
|
166
|
+
Gets a list of aggregated SQL Firewall policy details.
|
167
|
+
|
168
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
169
|
+
requestor has INSPECT permissions on at least one resource directly
|
170
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
171
|
+
principal doesn't have access to even one of the child compartments. This is valid only when
|
172
|
+
`compartmentIdInSubtree` is set to `true`.
|
173
|
+
|
174
|
+
The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
|
175
|
+
`compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
|
176
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
177
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
178
|
+
|
179
|
+
## Example Usage
|
180
|
+
|
181
|
+
```python
|
182
|
+
import pulumi
|
183
|
+
import pulumi_oci as oci
|
184
|
+
|
185
|
+
test_sql_firewall_policy_analytics = oci.DataSafe.get_sql_firewall_policy_analytics(compartment_id=compartment_id,
|
186
|
+
access_level=sql_firewall_policy_analytic_access_level,
|
187
|
+
compartment_id_in_subtree=sql_firewall_policy_analytic_compartment_id_in_subtree,
|
188
|
+
group_bies=sql_firewall_policy_analytic_group_by,
|
189
|
+
security_policy_id=test_security_policy["id"],
|
190
|
+
state=sql_firewall_policy_analytic_state,
|
191
|
+
time_ended=sql_firewall_policy_analytic_time_ended,
|
192
|
+
time_started=sql_firewall_policy_analytic_time_started)
|
193
|
+
```
|
194
|
+
|
195
|
+
|
196
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
197
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
198
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
199
|
+
:param Sequence[str] group_bies: The group by parameter to summarize SQL Firewall policy aggregation.
|
200
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
201
|
+
:param str state: The current state of the SQL Firewall policy.
|
202
|
+
:param str time_ended: An optional filter to return the summary of the SQL Firewall policies created before the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
203
|
+
:param str time_started: An optional filter to return the summary of the SQL Firewall policies created after the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
204
|
+
"""
|
205
|
+
__args__ = dict()
|
206
|
+
__args__['accessLevel'] = access_level
|
207
|
+
__args__['compartmentId'] = compartment_id
|
208
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
209
|
+
__args__['filters'] = filters
|
210
|
+
__args__['groupBies'] = group_bies
|
211
|
+
__args__['securityPolicyId'] = security_policy_id
|
212
|
+
__args__['state'] = state
|
213
|
+
__args__['timeEnded'] = time_ended
|
214
|
+
__args__['timeStarted'] = time_started
|
215
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
216
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallPolicyAnalytics:getSqlFirewallPolicyAnalytics', __args__, opts=opts, typ=GetSqlFirewallPolicyAnalyticsResult).value
|
217
|
+
|
218
|
+
return AwaitableGetSqlFirewallPolicyAnalyticsResult(
|
219
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
220
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
221
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
222
|
+
filters=pulumi.get(__ret__, 'filters'),
|
223
|
+
group_bies=pulumi.get(__ret__, 'group_bies'),
|
224
|
+
id=pulumi.get(__ret__, 'id'),
|
225
|
+
security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
|
226
|
+
sql_firewall_policy_analytics_collections=pulumi.get(__ret__, 'sql_firewall_policy_analytics_collections'),
|
227
|
+
state=pulumi.get(__ret__, 'state'),
|
228
|
+
time_ended=pulumi.get(__ret__, 'time_ended'),
|
229
|
+
time_started=pulumi.get(__ret__, 'time_started'))
|
230
|
+
def get_sql_firewall_policy_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
231
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
232
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
233
|
+
filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallPolicyAnalyticsFilterArgs', 'GetSqlFirewallPolicyAnalyticsFilterArgsDict']]]]] = None,
|
234
|
+
group_bies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
235
|
+
security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
|
236
|
+
state: Optional[pulumi.Input[Optional[str]]] = None,
|
237
|
+
time_ended: Optional[pulumi.Input[Optional[str]]] = None,
|
238
|
+
time_started: Optional[pulumi.Input[Optional[str]]] = None,
|
239
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallPolicyAnalyticsResult]:
|
240
|
+
"""
|
241
|
+
This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
|
242
|
+
|
243
|
+
Gets a list of aggregated SQL Firewall policy details.
|
244
|
+
|
245
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
246
|
+
requestor has INSPECT permissions on at least one resource directly
|
247
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
248
|
+
principal doesn't have access to even one of the child compartments. This is valid only when
|
249
|
+
`compartmentIdInSubtree` is set to `true`.
|
250
|
+
|
251
|
+
The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
|
252
|
+
`compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
|
253
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
254
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
255
|
+
|
256
|
+
## Example Usage
|
257
|
+
|
258
|
+
```python
|
259
|
+
import pulumi
|
260
|
+
import pulumi_oci as oci
|
261
|
+
|
262
|
+
test_sql_firewall_policy_analytics = oci.DataSafe.get_sql_firewall_policy_analytics(compartment_id=compartment_id,
|
263
|
+
access_level=sql_firewall_policy_analytic_access_level,
|
264
|
+
compartment_id_in_subtree=sql_firewall_policy_analytic_compartment_id_in_subtree,
|
265
|
+
group_bies=sql_firewall_policy_analytic_group_by,
|
266
|
+
security_policy_id=test_security_policy["id"],
|
267
|
+
state=sql_firewall_policy_analytic_state,
|
268
|
+
time_ended=sql_firewall_policy_analytic_time_ended,
|
269
|
+
time_started=sql_firewall_policy_analytic_time_started)
|
270
|
+
```
|
271
|
+
|
272
|
+
|
273
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
274
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
275
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
276
|
+
:param Sequence[str] group_bies: The group by parameter to summarize SQL Firewall policy aggregation.
|
277
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
278
|
+
:param str state: The current state of the SQL Firewall policy.
|
279
|
+
:param str time_ended: An optional filter to return the summary of the SQL Firewall policies created before the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
280
|
+
:param str time_started: An optional filter to return the summary of the SQL Firewall policies created after the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
281
|
+
"""
|
282
|
+
__args__ = dict()
|
283
|
+
__args__['accessLevel'] = access_level
|
284
|
+
__args__['compartmentId'] = compartment_id
|
285
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
286
|
+
__args__['filters'] = filters
|
287
|
+
__args__['groupBies'] = group_bies
|
288
|
+
__args__['securityPolicyId'] = security_policy_id
|
289
|
+
__args__['state'] = state
|
290
|
+
__args__['timeEnded'] = time_ended
|
291
|
+
__args__['timeStarted'] = time_started
|
292
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
293
|
+
__ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallPolicyAnalytics:getSqlFirewallPolicyAnalytics', __args__, opts=opts, typ=GetSqlFirewallPolicyAnalyticsResult)
|
294
|
+
return __ret__.apply(lambda __response__: GetSqlFirewallPolicyAnalyticsResult(
|
295
|
+
access_level=pulumi.get(__response__, 'access_level'),
|
296
|
+
compartment_id=pulumi.get(__response__, 'compartment_id'),
|
297
|
+
compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
|
298
|
+
filters=pulumi.get(__response__, 'filters'),
|
299
|
+
group_bies=pulumi.get(__response__, 'group_bies'),
|
300
|
+
id=pulumi.get(__response__, 'id'),
|
301
|
+
security_policy_id=pulumi.get(__response__, 'security_policy_id'),
|
302
|
+
sql_firewall_policy_analytics_collections=pulumi.get(__response__, 'sql_firewall_policy_analytics_collections'),
|
303
|
+
state=pulumi.get(__response__, 'state'),
|
304
|
+
time_ended=pulumi.get(__response__, 'time_ended'),
|
305
|
+
time_started=pulumi.get(__response__, 'time_started')))
|
@@ -0,0 +1,306 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
from ._inputs import *
|
18
|
+
|
19
|
+
__all__ = [
|
20
|
+
'GetSqlFirewallViolationAnalyticsResult',
|
21
|
+
'AwaitableGetSqlFirewallViolationAnalyticsResult',
|
22
|
+
'get_sql_firewall_violation_analytics',
|
23
|
+
'get_sql_firewall_violation_analytics_output',
|
24
|
+
]
|
25
|
+
|
26
|
+
@pulumi.output_type
|
27
|
+
class GetSqlFirewallViolationAnalyticsResult:
|
28
|
+
"""
|
29
|
+
A collection of values returned by getSqlFirewallViolationAnalytics.
|
30
|
+
"""
|
31
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, group_bies=None, id=None, query_time_zone=None, scim_query=None, sql_firewall_violation_analytics_collections=None, summary_fields=None, time_ended=None, time_started=None):
|
32
|
+
if access_level and not isinstance(access_level, str):
|
33
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
34
|
+
pulumi.set(__self__, "access_level", access_level)
|
35
|
+
if compartment_id and not isinstance(compartment_id, str):
|
36
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
37
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
38
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
39
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
40
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
41
|
+
if filters and not isinstance(filters, list):
|
42
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
43
|
+
pulumi.set(__self__, "filters", filters)
|
44
|
+
if group_bies and not isinstance(group_bies, list):
|
45
|
+
raise TypeError("Expected argument 'group_bies' to be a list")
|
46
|
+
pulumi.set(__self__, "group_bies", group_bies)
|
47
|
+
if id and not isinstance(id, str):
|
48
|
+
raise TypeError("Expected argument 'id' to be a str")
|
49
|
+
pulumi.set(__self__, "id", id)
|
50
|
+
if query_time_zone and not isinstance(query_time_zone, str):
|
51
|
+
raise TypeError("Expected argument 'query_time_zone' to be a str")
|
52
|
+
pulumi.set(__self__, "query_time_zone", query_time_zone)
|
53
|
+
if scim_query and not isinstance(scim_query, str):
|
54
|
+
raise TypeError("Expected argument 'scim_query' to be a str")
|
55
|
+
pulumi.set(__self__, "scim_query", scim_query)
|
56
|
+
if sql_firewall_violation_analytics_collections and not isinstance(sql_firewall_violation_analytics_collections, list):
|
57
|
+
raise TypeError("Expected argument 'sql_firewall_violation_analytics_collections' to be a list")
|
58
|
+
pulumi.set(__self__, "sql_firewall_violation_analytics_collections", sql_firewall_violation_analytics_collections)
|
59
|
+
if summary_fields and not isinstance(summary_fields, list):
|
60
|
+
raise TypeError("Expected argument 'summary_fields' to be a list")
|
61
|
+
pulumi.set(__self__, "summary_fields", summary_fields)
|
62
|
+
if time_ended and not isinstance(time_ended, str):
|
63
|
+
raise TypeError("Expected argument 'time_ended' to be a str")
|
64
|
+
pulumi.set(__self__, "time_ended", time_ended)
|
65
|
+
if time_started and not isinstance(time_started, str):
|
66
|
+
raise TypeError("Expected argument 'time_started' to be a str")
|
67
|
+
pulumi.set(__self__, "time_started", time_started)
|
68
|
+
|
69
|
+
@property
|
70
|
+
@pulumi.getter(name="accessLevel")
|
71
|
+
def access_level(self) -> Optional[str]:
|
72
|
+
return pulumi.get(self, "access_level")
|
73
|
+
|
74
|
+
@property
|
75
|
+
@pulumi.getter(name="compartmentId")
|
76
|
+
def compartment_id(self) -> str:
|
77
|
+
return pulumi.get(self, "compartment_id")
|
78
|
+
|
79
|
+
@property
|
80
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
81
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
82
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
83
|
+
|
84
|
+
@property
|
85
|
+
@pulumi.getter
|
86
|
+
def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallViolationAnalyticsFilterResult']]:
|
87
|
+
return pulumi.get(self, "filters")
|
88
|
+
|
89
|
+
@property
|
90
|
+
@pulumi.getter(name="groupBies")
|
91
|
+
def group_bies(self) -> Optional[Sequence[str]]:
|
92
|
+
return pulumi.get(self, "group_bies")
|
93
|
+
|
94
|
+
@property
|
95
|
+
@pulumi.getter
|
96
|
+
def id(self) -> str:
|
97
|
+
"""
|
98
|
+
The provider-assigned unique ID for this managed resource.
|
99
|
+
"""
|
100
|
+
return pulumi.get(self, "id")
|
101
|
+
|
102
|
+
@property
|
103
|
+
@pulumi.getter(name="queryTimeZone")
|
104
|
+
def query_time_zone(self) -> Optional[str]:
|
105
|
+
return pulumi.get(self, "query_time_zone")
|
106
|
+
|
107
|
+
@property
|
108
|
+
@pulumi.getter(name="scimQuery")
|
109
|
+
def scim_query(self) -> Optional[str]:
|
110
|
+
return pulumi.get(self, "scim_query")
|
111
|
+
|
112
|
+
@property
|
113
|
+
@pulumi.getter(name="sqlFirewallViolationAnalyticsCollections")
|
114
|
+
def sql_firewall_violation_analytics_collections(self) -> Sequence['outputs.GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollectionResult']:
|
115
|
+
"""
|
116
|
+
The list of sql_firewall_violation_analytics_collection.
|
117
|
+
"""
|
118
|
+
return pulumi.get(self, "sql_firewall_violation_analytics_collections")
|
119
|
+
|
120
|
+
@property
|
121
|
+
@pulumi.getter(name="summaryFields")
|
122
|
+
def summary_fields(self) -> Optional[Sequence[str]]:
|
123
|
+
return pulumi.get(self, "summary_fields")
|
124
|
+
|
125
|
+
@property
|
126
|
+
@pulumi.getter(name="timeEnded")
|
127
|
+
def time_ended(self) -> Optional[str]:
|
128
|
+
"""
|
129
|
+
The time at which the aggregation ended.
|
130
|
+
"""
|
131
|
+
return pulumi.get(self, "time_ended")
|
132
|
+
|
133
|
+
@property
|
134
|
+
@pulumi.getter(name="timeStarted")
|
135
|
+
def time_started(self) -> Optional[str]:
|
136
|
+
"""
|
137
|
+
The time at which the aggregation started.
|
138
|
+
"""
|
139
|
+
return pulumi.get(self, "time_started")
|
140
|
+
|
141
|
+
|
142
|
+
class AwaitableGetSqlFirewallViolationAnalyticsResult(GetSqlFirewallViolationAnalyticsResult):
|
143
|
+
# pylint: disable=using-constant-test
|
144
|
+
def __await__(self):
|
145
|
+
if False:
|
146
|
+
yield self
|
147
|
+
return GetSqlFirewallViolationAnalyticsResult(
|
148
|
+
access_level=self.access_level,
|
149
|
+
compartment_id=self.compartment_id,
|
150
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
151
|
+
filters=self.filters,
|
152
|
+
group_bies=self.group_bies,
|
153
|
+
id=self.id,
|
154
|
+
query_time_zone=self.query_time_zone,
|
155
|
+
scim_query=self.scim_query,
|
156
|
+
sql_firewall_violation_analytics_collections=self.sql_firewall_violation_analytics_collections,
|
157
|
+
summary_fields=self.summary_fields,
|
158
|
+
time_ended=self.time_ended,
|
159
|
+
time_started=self.time_started)
|
160
|
+
|
161
|
+
|
162
|
+
def get_sql_firewall_violation_analytics(access_level: Optional[str] = None,
|
163
|
+
compartment_id: Optional[str] = None,
|
164
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
165
|
+
filters: Optional[Sequence[Union['GetSqlFirewallViolationAnalyticsFilterArgs', 'GetSqlFirewallViolationAnalyticsFilterArgsDict']]] = None,
|
166
|
+
group_bies: Optional[Sequence[str]] = None,
|
167
|
+
query_time_zone: Optional[str] = None,
|
168
|
+
scim_query: Optional[str] = None,
|
169
|
+
summary_fields: Optional[Sequence[str]] = None,
|
170
|
+
time_ended: Optional[str] = None,
|
171
|
+
time_started: Optional[str] = None,
|
172
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallViolationAnalyticsResult:
|
173
|
+
"""
|
174
|
+
This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
|
175
|
+
|
176
|
+
Returns the aggregation details of the SQL Firewall violations.
|
177
|
+
|
178
|
+
## Example Usage
|
179
|
+
|
180
|
+
```python
|
181
|
+
import pulumi
|
182
|
+
import pulumi_oci as oci
|
183
|
+
|
184
|
+
test_sql_firewall_violation_analytics = oci.DataSafe.get_sql_firewall_violation_analytics(compartment_id=compartment_id,
|
185
|
+
access_level=sql_firewall_violation_analytic_access_level,
|
186
|
+
compartment_id_in_subtree=sql_firewall_violation_analytic_compartment_id_in_subtree,
|
187
|
+
group_bies=sql_firewall_violation_analytic_group_by,
|
188
|
+
query_time_zone=sql_firewall_violation_analytic_query_time_zone,
|
189
|
+
scim_query=sql_firewall_violation_analytic_scim_query,
|
190
|
+
summary_fields=sql_firewall_violation_analytic_summary_field,
|
191
|
+
time_ended=sql_firewall_violation_analytic_time_ended,
|
192
|
+
time_started=sql_firewall_violation_analytic_time_started)
|
193
|
+
```
|
194
|
+
|
195
|
+
|
196
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
197
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
198
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
199
|
+
:param Sequence[str] group_bies: A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
|
200
|
+
:param str query_time_zone: Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
|
201
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
202
|
+
|
203
|
+
**Example:** query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
|
204
|
+
:param Sequence[str] summary_fields: Specifies a subset of summarized fields to be returned in the response.
|
205
|
+
:param str time_ended: An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
206
|
+
:param str time_started: An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
207
|
+
"""
|
208
|
+
__args__ = dict()
|
209
|
+
__args__['accessLevel'] = access_level
|
210
|
+
__args__['compartmentId'] = compartment_id
|
211
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
212
|
+
__args__['filters'] = filters
|
213
|
+
__args__['groupBies'] = group_bies
|
214
|
+
__args__['queryTimeZone'] = query_time_zone
|
215
|
+
__args__['scimQuery'] = scim_query
|
216
|
+
__args__['summaryFields'] = summary_fields
|
217
|
+
__args__['timeEnded'] = time_ended
|
218
|
+
__args__['timeStarted'] = time_started
|
219
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
220
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallViolationAnalytics:getSqlFirewallViolationAnalytics', __args__, opts=opts, typ=GetSqlFirewallViolationAnalyticsResult).value
|
221
|
+
|
222
|
+
return AwaitableGetSqlFirewallViolationAnalyticsResult(
|
223
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
224
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
225
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
226
|
+
filters=pulumi.get(__ret__, 'filters'),
|
227
|
+
group_bies=pulumi.get(__ret__, 'group_bies'),
|
228
|
+
id=pulumi.get(__ret__, 'id'),
|
229
|
+
query_time_zone=pulumi.get(__ret__, 'query_time_zone'),
|
230
|
+
scim_query=pulumi.get(__ret__, 'scim_query'),
|
231
|
+
sql_firewall_violation_analytics_collections=pulumi.get(__ret__, 'sql_firewall_violation_analytics_collections'),
|
232
|
+
summary_fields=pulumi.get(__ret__, 'summary_fields'),
|
233
|
+
time_ended=pulumi.get(__ret__, 'time_ended'),
|
234
|
+
time_started=pulumi.get(__ret__, 'time_started'))
|
235
|
+
def get_sql_firewall_violation_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
236
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
237
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
238
|
+
filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallViolationAnalyticsFilterArgs', 'GetSqlFirewallViolationAnalyticsFilterArgsDict']]]]] = None,
|
239
|
+
group_bies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
240
|
+
query_time_zone: Optional[pulumi.Input[Optional[str]]] = None,
|
241
|
+
scim_query: Optional[pulumi.Input[Optional[str]]] = None,
|
242
|
+
summary_fields: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
243
|
+
time_ended: Optional[pulumi.Input[Optional[str]]] = None,
|
244
|
+
time_started: Optional[pulumi.Input[Optional[str]]] = None,
|
245
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallViolationAnalyticsResult]:
|
246
|
+
"""
|
247
|
+
This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
|
248
|
+
|
249
|
+
Returns the aggregation details of the SQL Firewall violations.
|
250
|
+
|
251
|
+
## Example Usage
|
252
|
+
|
253
|
+
```python
|
254
|
+
import pulumi
|
255
|
+
import pulumi_oci as oci
|
256
|
+
|
257
|
+
test_sql_firewall_violation_analytics = oci.DataSafe.get_sql_firewall_violation_analytics(compartment_id=compartment_id,
|
258
|
+
access_level=sql_firewall_violation_analytic_access_level,
|
259
|
+
compartment_id_in_subtree=sql_firewall_violation_analytic_compartment_id_in_subtree,
|
260
|
+
group_bies=sql_firewall_violation_analytic_group_by,
|
261
|
+
query_time_zone=sql_firewall_violation_analytic_query_time_zone,
|
262
|
+
scim_query=sql_firewall_violation_analytic_scim_query,
|
263
|
+
summary_fields=sql_firewall_violation_analytic_summary_field,
|
264
|
+
time_ended=sql_firewall_violation_analytic_time_ended,
|
265
|
+
time_started=sql_firewall_violation_analytic_time_started)
|
266
|
+
```
|
267
|
+
|
268
|
+
|
269
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
270
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
271
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
272
|
+
:param Sequence[str] group_bies: A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
|
273
|
+
:param str query_time_zone: Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
|
274
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
275
|
+
|
276
|
+
**Example:** query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
|
277
|
+
:param Sequence[str] summary_fields: Specifies a subset of summarized fields to be returned in the response.
|
278
|
+
:param str time_ended: An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
279
|
+
:param str time_started: An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
280
|
+
"""
|
281
|
+
__args__ = dict()
|
282
|
+
__args__['accessLevel'] = access_level
|
283
|
+
__args__['compartmentId'] = compartment_id
|
284
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
285
|
+
__args__['filters'] = filters
|
286
|
+
__args__['groupBies'] = group_bies
|
287
|
+
__args__['queryTimeZone'] = query_time_zone
|
288
|
+
__args__['scimQuery'] = scim_query
|
289
|
+
__args__['summaryFields'] = summary_fields
|
290
|
+
__args__['timeEnded'] = time_ended
|
291
|
+
__args__['timeStarted'] = time_started
|
292
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
293
|
+
__ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallViolationAnalytics:getSqlFirewallViolationAnalytics', __args__, opts=opts, typ=GetSqlFirewallViolationAnalyticsResult)
|
294
|
+
return __ret__.apply(lambda __response__: GetSqlFirewallViolationAnalyticsResult(
|
295
|
+
access_level=pulumi.get(__response__, 'access_level'),
|
296
|
+
compartment_id=pulumi.get(__response__, 'compartment_id'),
|
297
|
+
compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
|
298
|
+
filters=pulumi.get(__response__, 'filters'),
|
299
|
+
group_bies=pulumi.get(__response__, 'group_bies'),
|
300
|
+
id=pulumi.get(__response__, 'id'),
|
301
|
+
query_time_zone=pulumi.get(__response__, 'query_time_zone'),
|
302
|
+
scim_query=pulumi.get(__response__, 'scim_query'),
|
303
|
+
sql_firewall_violation_analytics_collections=pulumi.get(__response__, 'sql_firewall_violation_analytics_collections'),
|
304
|
+
summary_fields=pulumi.get(__response__, 'summary_fields'),
|
305
|
+
time_ended=pulumi.get(__response__, 'time_ended'),
|
306
|
+
time_started=pulumi.get(__response__, 'time_started')))
|