Aquasec v0.8.29 published on Monday, Jul 22, 2024 by Pulumiverse
aquasec.getEnforcerGroups
Explore with Pulumi AI
The data source aquasec.EnforcerGroups
provides an Enforcer group template that generates a configuration file, which is subsequently used to generate one or more Enforcers using a Docker command.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as aquasec from "@pulumi/aquasec";
const groups = aquasec.getEnforcerGroups({
groupId: "IacGroup",
});
export const groupDetails = groups;
import pulumi
import pulumi_aquasec as aquasec
groups = aquasec.get_enforcer_groups(group_id="IacGroup")
pulumi.export("groupDetails", groups)
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-aquasec/sdk/go/aquasec"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
groups, err := aquasec.LookupEnforcerGroups(ctx, &aquasec.LookupEnforcerGroupsArgs{
GroupId: "IacGroup",
}, nil)
if err != nil {
return err
}
ctx.Export("groupDetails", groups)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aquasec = Pulumi.Aquasec;
return await Deployment.RunAsync(() =>
{
var groups = Aquasec.GetEnforcerGroups.Invoke(new()
{
GroupId = "IacGroup",
});
return new Dictionary<string, object?>
{
["groupDetails"] = groups,
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aquasec.AquasecFunctions;
import com.pulumi.aquasec.inputs.GetEnforcerGroupsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var groups = AquasecFunctions.getEnforcerGroups(GetEnforcerGroupsArgs.builder()
.groupId("IacGroup")
.build());
ctx.export("groupDetails", groups.applyValue(getEnforcerGroupsResult -> getEnforcerGroupsResult));
}
}
variables:
groups:
fn::invoke:
Function: aquasec:getEnforcerGroups
Arguments:
groupId: IacGroup
outputs:
groupDetails: ${groups}
Using getEnforcerGroups
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getEnforcerGroups(args: GetEnforcerGroupsArgs, opts?: InvokeOptions): Promise<GetEnforcerGroupsResult>
function getEnforcerGroupsOutput(args: GetEnforcerGroupsOutputArgs, opts?: InvokeOptions): Output<GetEnforcerGroupsResult>
def get_enforcer_groups(forensics: Optional[bool] = None,
group_id: Optional[str] = None,
host_forensics: Optional[bool] = None,
opts: Optional[InvokeOptions] = None) -> GetEnforcerGroupsResult
def get_enforcer_groups_output(forensics: Optional[pulumi.Input[bool]] = None,
group_id: Optional[pulumi.Input[str]] = None,
host_forensics: Optional[pulumi.Input[bool]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetEnforcerGroupsResult]
func LookupEnforcerGroups(ctx *Context, args *LookupEnforcerGroupsArgs, opts ...InvokeOption) (*LookupEnforcerGroupsResult, error)
func LookupEnforcerGroupsOutput(ctx *Context, args *LookupEnforcerGroupsOutputArgs, opts ...InvokeOption) LookupEnforcerGroupsResultOutput
> Note: This function is named LookupEnforcerGroups
in the Go SDK.
public static class GetEnforcerGroups
{
public static Task<GetEnforcerGroupsResult> InvokeAsync(GetEnforcerGroupsArgs args, InvokeOptions? opts = null)
public static Output<GetEnforcerGroupsResult> Invoke(GetEnforcerGroupsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetEnforcerGroupsResult> getEnforcerGroups(GetEnforcerGroupsArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: aquasec:index/getEnforcerGroups:getEnforcerGroups
arguments:
# arguments dictionary
The following arguments are supported:
- Group
Id string - The ID of the Enforcer group.
- Forensics bool
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- Host
Forensics bool - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- Group
Id string - The ID of the Enforcer group.
- Forensics bool
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- Host
Forensics bool - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- group
Id String - The ID of the Enforcer group.
- forensics Boolean
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host
Forensics Boolean - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- group
Id string - The ID of the Enforcer group.
- forensics boolean
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host
Forensics boolean - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- group_
id str - The ID of the Enforcer group.
- forensics bool
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host_
forensics bool - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- group
Id String - The ID of the Enforcer group.
- forensics Boolean
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host
Forensics Boolean - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
getEnforcerGroups Result
The following output properties are available:
- Admission
Control bool - Selecting this option will allow the KubeEnforcer to block the deployment of container images that have failed any of these Container Runtime Policy controls:
* Block Non-Compliant Images
* Block Non-Compliant Workloads
* Block Unregistered Images
This functionality can work only when the KubeEnforcer is deployed in Enforce mode. - Allow
Kube boolEnforcer Audit - Allow kube enforcer audit.
- Allowed
Applications List<string> - List of application names to allow on the hosts. if provided, only containers of the listed applications will be allowed to run.
- Allowed
Labels List<string> - List of label names to allow on the hosts.
- Allowed
Registries List<string> - List of registry names to allow on the hosts.
- Antivirus
Protection bool - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Host Runtime policies. - Aqua
Version string - Aqua server version
- Audit
All bool - Agent will send extra audit messages to the server for success operations from inside the container (runtime).
- Auto
Copy boolSecrets - This option is applicable only if
Enable Pod Enforcer injection
is selected. Select this option if you want Aqua Enterprise to copy the secrets defined above to the Pod Enforcer namespace and container. Otherwise, you can choose to copy these secrets by other means. - Auto
Discover boolConfigure Registries - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will add previously unknown image registries from the cluster to Aqua. - Auto
Discovery boolEnabled - When this option is selected, the KubeEnforcer will discover workloads on its cluster.
- Auto
Scan boolDiscovered Images Running Containers - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will automatically register images running as workloads (and scan the discovered images for security issues). - Behavioral
Engine bool - If
Enabled
, detects suspicious activity in your containers and displays potential security threats in the Incidents and Audits pages. - Block
Admission boolControl - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - Commands
List<Pulumiverse.
Aquasec. Outputs. Get Enforcer Groups Command> - The installation command.
- Connected
Count int - Number of connected enforcers in the enforcer group.
- Container
Activity boolProtection - When set to
True
applies Container Runtime Policies, Image Profiles, and Firewall Policies to containers. - Container
Antivirus boolProtection - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Container Runtime policies. - Description string
- A description for the Aqua Enforcer group.
- Disconnected
Count int - Number of disconnected enforcers in the enforcer group.
- Enforce bool
- Whether the enforce mode is enabled on the Enforcers.
- Enforcer
Image stringName - The specific Aqua Enforcer product image (with image tag) to be deployed.
- Gateway
Address string - Gateway Address
- Gateway
Name string - Gateway Name
- Gateways List<string>
- List of Aqua gateway IDs for the Enforcers.
- Group
Id string - The ID of the Enforcer group.
- High
Vulns int - Number of high vulnerabilities in the enforcers that in this enforcer group.
- Host
Assurance bool - When set to
True
enables host scanning and respective Host Assurance controls. - Host
Behavioral boolEngine - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- Host
Network boolProtection - When set to
True
applies Firewall Policies to hosts, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information - Host
Os string - The OS type for the host
- Host
Protection bool - When set to
True
enables all Host Runtime Policy controls except forOS Users and Groups Allowed
andOS Users and Groups Blocked
. - Host
User boolProtection - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- Hosts
Count int - Number of enforcers in the enforcer group.
- Id string
- The provider-assigned unique ID for this managed resource.
- Image
Assurance bool - When Set to
True
enables selected controls: Container Runtime Policy (Block Non-Compliant Images
,Block Unregistered Images
, andRegistries Allowed
) and Default Image Assurance Policy (Images Blocked
). - Install
Command string - Enforcer install command
- Kube
Bench stringImage Name - See https://docs.aquasec.com/docs/securing-kubernetes-applications#section-configuration-hardening, The KubeEnforcer can deploy the Aqua Security kube-bench open-source product to perform Kubernetes CIS benchmark testing of nodes. This field specifies the path and file name of the kube-bench product image for the KubeEnforcer to deploy; it will be filled in automatically. You can optionally enter a different value.
- Last
Update int - The last date and time the batch token was updated in UNIX time.
- Logical
Name string - Name for the batch install record.
- Low
Vulns int - Number of low vulnerabilities in the enforcers that in this enforcer group.
- Med
Vulns int - Number of medium vulnerabilities in the enforcers that in this enforcer group.
- Micro
Enforcer stringCerts Secrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - Micro
Enforcer stringImage Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. This field specifies the path and file name of the KubeEnforcer product image to be deployed; it will be filled in automatically. You can optionally enter a different value. - Micro
Enforcer boolInjection - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - Micro
Enforcer stringSecrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - Neg
Vulns int - Number of negligible vulnerabilities in the enforcers that in this enforcer group.
- Network
Protection bool - When set to
True
applies Firewall Policies to containers, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information. - Orchestrators
List<Pulumiverse.
Aquasec. Outputs. Get Enforcer Groups Orchestrator> - The orchestrator for which you are creating the Enforcer group.
- Pas
Deployment stringLink - pas deployment link
- Permission string
- Permission Action
- Risk
Explorer boolAuto Discovery - When set to
True
allows Enforcers to be discovered in the Risk Explorer. - Runtime
Policy stringName - Function Runtime Policy that will applay on the nano enforcer.
- Runtime
Type string - The container runtime environment.
- Sync
Host boolImages - When set to
True
configures Enforcers to discover local host images. Discovered images will be listed under Images > Host Images, as well as under Infrastructure (in the Images tab for applicable hosts). - Syscall
Enabled bool - When set to
True
allows profiling and monitoring system calls made by running containers. - Token string
- The batch install token.
- Type string
- Enforcer Type.
- User
Access boolControl - When set to
True
applies User Access Control Policies to containers. Note that Aqua Enforcers must be deployed with the AQUARUNCINTERCEPTION environment variable set to 0 in order to use User Access Control Policies. - Forensics bool
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- Host
Forensics bool - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- Admission
Control bool - Selecting this option will allow the KubeEnforcer to block the deployment of container images that have failed any of these Container Runtime Policy controls:
* Block Non-Compliant Images
* Block Non-Compliant Workloads
* Block Unregistered Images
This functionality can work only when the KubeEnforcer is deployed in Enforce mode. - Allow
Kube boolEnforcer Audit - Allow kube enforcer audit.
- Allowed
Applications []string - List of application names to allow on the hosts. if provided, only containers of the listed applications will be allowed to run.
- Allowed
Labels []string - List of label names to allow on the hosts.
- Allowed
Registries []string - List of registry names to allow on the hosts.
- Antivirus
Protection bool - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Host Runtime policies. - Aqua
Version string - Aqua server version
- Audit
All bool - Agent will send extra audit messages to the server for success operations from inside the container (runtime).
- Auto
Copy boolSecrets - This option is applicable only if
Enable Pod Enforcer injection
is selected. Select this option if you want Aqua Enterprise to copy the secrets defined above to the Pod Enforcer namespace and container. Otherwise, you can choose to copy these secrets by other means. - Auto
Discover boolConfigure Registries - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will add previously unknown image registries from the cluster to Aqua. - Auto
Discovery boolEnabled - When this option is selected, the KubeEnforcer will discover workloads on its cluster.
- Auto
Scan boolDiscovered Images Running Containers - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will automatically register images running as workloads (and scan the discovered images for security issues). - Behavioral
Engine bool - If
Enabled
, detects suspicious activity in your containers and displays potential security threats in the Incidents and Audits pages. - Block
Admission boolControl - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - Commands
[]Get
Enforcer Groups Command - The installation command.
- Connected
Count int - Number of connected enforcers in the enforcer group.
- Container
Activity boolProtection - When set to
True
applies Container Runtime Policies, Image Profiles, and Firewall Policies to containers. - Container
Antivirus boolProtection - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Container Runtime policies. - Description string
- A description for the Aqua Enforcer group.
- Disconnected
Count int - Number of disconnected enforcers in the enforcer group.
- Enforce bool
- Whether the enforce mode is enabled on the Enforcers.
- Enforcer
Image stringName - The specific Aqua Enforcer product image (with image tag) to be deployed.
- Gateway
Address string - Gateway Address
- Gateway
Name string - Gateway Name
- Gateways []string
- List of Aqua gateway IDs for the Enforcers.
- Group
Id string - The ID of the Enforcer group.
- High
Vulns int - Number of high vulnerabilities in the enforcers that in this enforcer group.
- Host
Assurance bool - When set to
True
enables host scanning and respective Host Assurance controls. - Host
Behavioral boolEngine - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- Host
Network boolProtection - When set to
True
applies Firewall Policies to hosts, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information - Host
Os string - The OS type for the host
- Host
Protection bool - When set to
True
enables all Host Runtime Policy controls except forOS Users and Groups Allowed
andOS Users and Groups Blocked
. - Host
User boolProtection - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- Hosts
Count int - Number of enforcers in the enforcer group.
- Id string
- The provider-assigned unique ID for this managed resource.
- Image
Assurance bool - When Set to
True
enables selected controls: Container Runtime Policy (Block Non-Compliant Images
,Block Unregistered Images
, andRegistries Allowed
) and Default Image Assurance Policy (Images Blocked
). - Install
Command string - Enforcer install command
- Kube
Bench stringImage Name - See https://docs.aquasec.com/docs/securing-kubernetes-applications#section-configuration-hardening, The KubeEnforcer can deploy the Aqua Security kube-bench open-source product to perform Kubernetes CIS benchmark testing of nodes. This field specifies the path and file name of the kube-bench product image for the KubeEnforcer to deploy; it will be filled in automatically. You can optionally enter a different value.
- Last
Update int - The last date and time the batch token was updated in UNIX time.
- Logical
Name string - Name for the batch install record.
- Low
Vulns int - Number of low vulnerabilities in the enforcers that in this enforcer group.
- Med
Vulns int - Number of medium vulnerabilities in the enforcers that in this enforcer group.
- Micro
Enforcer stringCerts Secrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - Micro
Enforcer stringImage Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. This field specifies the path and file name of the KubeEnforcer product image to be deployed; it will be filled in automatically. You can optionally enter a different value. - Micro
Enforcer boolInjection - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - Micro
Enforcer stringSecrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - Neg
Vulns int - Number of negligible vulnerabilities in the enforcers that in this enforcer group.
- Network
Protection bool - When set to
True
applies Firewall Policies to containers, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information. - Orchestrators
[]Get
Enforcer Groups Orchestrator - The orchestrator for which you are creating the Enforcer group.
- Pas
Deployment stringLink - pas deployment link
- Permission string
- Permission Action
- Risk
Explorer boolAuto Discovery - When set to
True
allows Enforcers to be discovered in the Risk Explorer. - Runtime
Policy stringName - Function Runtime Policy that will applay on the nano enforcer.
- Runtime
Type string - The container runtime environment.
- Sync
Host boolImages - When set to
True
configures Enforcers to discover local host images. Discovered images will be listed under Images > Host Images, as well as under Infrastructure (in the Images tab for applicable hosts). - Syscall
Enabled bool - When set to
True
allows profiling and monitoring system calls made by running containers. - Token string
- The batch install token.
- Type string
- Enforcer Type.
- User
Access boolControl - When set to
True
applies User Access Control Policies to containers. Note that Aqua Enforcers must be deployed with the AQUARUNCINTERCEPTION environment variable set to 0 in order to use User Access Control Policies. - Forensics bool
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- Host
Forensics bool - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- admission
Control Boolean - Selecting this option will allow the KubeEnforcer to block the deployment of container images that have failed any of these Container Runtime Policy controls:
* Block Non-Compliant Images
* Block Non-Compliant Workloads
* Block Unregistered Images
This functionality can work only when the KubeEnforcer is deployed in Enforce mode. - allow
Kube BooleanEnforcer Audit - Allow kube enforcer audit.
- allowed
Applications List<String> - List of application names to allow on the hosts. if provided, only containers of the listed applications will be allowed to run.
- allowed
Labels List<String> - List of label names to allow on the hosts.
- allowed
Registries List<String> - List of registry names to allow on the hosts.
- antivirus
Protection Boolean - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Host Runtime policies. - aqua
Version String - Aqua server version
- audit
All Boolean - Agent will send extra audit messages to the server for success operations from inside the container (runtime).
- auto
Copy BooleanSecrets - This option is applicable only if
Enable Pod Enforcer injection
is selected. Select this option if you want Aqua Enterprise to copy the secrets defined above to the Pod Enforcer namespace and container. Otherwise, you can choose to copy these secrets by other means. - auto
Discover BooleanConfigure Registries - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will add previously unknown image registries from the cluster to Aqua. - auto
Discovery BooleanEnabled - When this option is selected, the KubeEnforcer will discover workloads on its cluster.
- auto
Scan BooleanDiscovered Images Running Containers - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will automatically register images running as workloads (and scan the discovered images for security issues). - behavioral
Engine Boolean - If
Enabled
, detects suspicious activity in your containers and displays potential security threats in the Incidents and Audits pages. - block
Admission BooleanControl - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - commands
List<Get
Enforcer Groups Command> - The installation command.
- connected
Count Integer - Number of connected enforcers in the enforcer group.
- container
Activity BooleanProtection - When set to
True
applies Container Runtime Policies, Image Profiles, and Firewall Policies to containers. - container
Antivirus BooleanProtection - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Container Runtime policies. - description String
- A description for the Aqua Enforcer group.
- disconnected
Count Integer - Number of disconnected enforcers in the enforcer group.
- enforce Boolean
- Whether the enforce mode is enabled on the Enforcers.
- enforcer
Image StringName - The specific Aqua Enforcer product image (with image tag) to be deployed.
- gateway
Address String - Gateway Address
- gateway
Name String - Gateway Name
- gateways List<String>
- List of Aqua gateway IDs for the Enforcers.
- group
Id String - The ID of the Enforcer group.
- high
Vulns Integer - Number of high vulnerabilities in the enforcers that in this enforcer group.
- host
Assurance Boolean - When set to
True
enables host scanning and respective Host Assurance controls. - host
Behavioral BooleanEngine - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- host
Network BooleanProtection - When set to
True
applies Firewall Policies to hosts, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information - host
Os String - The OS type for the host
- host
Protection Boolean - When set to
True
enables all Host Runtime Policy controls except forOS Users and Groups Allowed
andOS Users and Groups Blocked
. - host
User BooleanProtection - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- hosts
Count Integer - Number of enforcers in the enforcer group.
- id String
- The provider-assigned unique ID for this managed resource.
- image
Assurance Boolean - When Set to
True
enables selected controls: Container Runtime Policy (Block Non-Compliant Images
,Block Unregistered Images
, andRegistries Allowed
) and Default Image Assurance Policy (Images Blocked
). - install
Command String - Enforcer install command
- kube
Bench StringImage Name - See https://docs.aquasec.com/docs/securing-kubernetes-applications#section-configuration-hardening, The KubeEnforcer can deploy the Aqua Security kube-bench open-source product to perform Kubernetes CIS benchmark testing of nodes. This field specifies the path and file name of the kube-bench product image for the KubeEnforcer to deploy; it will be filled in automatically. You can optionally enter a different value.
- last
Update Integer - The last date and time the batch token was updated in UNIX time.
- logical
Name String - Name for the batch install record.
- low
Vulns Integer - Number of low vulnerabilities in the enforcers that in this enforcer group.
- med
Vulns Integer - Number of medium vulnerabilities in the enforcers that in this enforcer group.
- micro
Enforcer StringCerts Secrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - micro
Enforcer StringImage Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. This field specifies the path and file name of the KubeEnforcer product image to be deployed; it will be filled in automatically. You can optionally enter a different value. - micro
Enforcer BooleanInjection - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - micro
Enforcer StringSecrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - neg
Vulns Integer - Number of negligible vulnerabilities in the enforcers that in this enforcer group.
- network
Protection Boolean - When set to
True
applies Firewall Policies to containers, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information. - orchestrators
List<Get
Enforcer Groups Orchestrator> - The orchestrator for which you are creating the Enforcer group.
- pas
Deployment StringLink - pas deployment link
- permission String
- Permission Action
- risk
Explorer BooleanAuto Discovery - When set to
True
allows Enforcers to be discovered in the Risk Explorer. - runtime
Policy StringName - Function Runtime Policy that will applay on the nano enforcer.
- runtime
Type String - The container runtime environment.
- sync
Host BooleanImages - When set to
True
configures Enforcers to discover local host images. Discovered images will be listed under Images > Host Images, as well as under Infrastructure (in the Images tab for applicable hosts). - syscall
Enabled Boolean - When set to
True
allows profiling and monitoring system calls made by running containers. - token String
- The batch install token.
- type String
- Enforcer Type.
- user
Access BooleanControl - When set to
True
applies User Access Control Policies to containers. Note that Aqua Enforcers must be deployed with the AQUARUNCINTERCEPTION environment variable set to 0 in order to use User Access Control Policies. - forensics Boolean
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host
Forensics Boolean - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- admission
Control boolean - Selecting this option will allow the KubeEnforcer to block the deployment of container images that have failed any of these Container Runtime Policy controls:
* Block Non-Compliant Images
* Block Non-Compliant Workloads
* Block Unregistered Images
This functionality can work only when the KubeEnforcer is deployed in Enforce mode. - allow
Kube booleanEnforcer Audit - Allow kube enforcer audit.
- allowed
Applications string[] - List of application names to allow on the hosts. if provided, only containers of the listed applications will be allowed to run.
- allowed
Labels string[] - List of label names to allow on the hosts.
- allowed
Registries string[] - List of registry names to allow on the hosts.
- antivirus
Protection boolean - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Host Runtime policies. - aqua
Version string - Aqua server version
- audit
All boolean - Agent will send extra audit messages to the server for success operations from inside the container (runtime).
- auto
Copy booleanSecrets - This option is applicable only if
Enable Pod Enforcer injection
is selected. Select this option if you want Aqua Enterprise to copy the secrets defined above to the Pod Enforcer namespace and container. Otherwise, you can choose to copy these secrets by other means. - auto
Discover booleanConfigure Registries - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will add previously unknown image registries from the cluster to Aqua. - auto
Discovery booleanEnabled - When this option is selected, the KubeEnforcer will discover workloads on its cluster.
- auto
Scan booleanDiscovered Images Running Containers - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will automatically register images running as workloads (and scan the discovered images for security issues). - behavioral
Engine boolean - If
Enabled
, detects suspicious activity in your containers and displays potential security threats in the Incidents and Audits pages. - block
Admission booleanControl - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - commands
Get
Enforcer Groups Command[] - The installation command.
- connected
Count number - Number of connected enforcers in the enforcer group.
- container
Activity booleanProtection - When set to
True
applies Container Runtime Policies, Image Profiles, and Firewall Policies to containers. - container
Antivirus booleanProtection - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Container Runtime policies. - description string
- A description for the Aqua Enforcer group.
- disconnected
Count number - Number of disconnected enforcers in the enforcer group.
- enforce boolean
- Whether the enforce mode is enabled on the Enforcers.
- enforcer
Image stringName - The specific Aqua Enforcer product image (with image tag) to be deployed.
- gateway
Address string - Gateway Address
- gateway
Name string - Gateway Name
- gateways string[]
- List of Aqua gateway IDs for the Enforcers.
- group
Id string - The ID of the Enforcer group.
- high
Vulns number - Number of high vulnerabilities in the enforcers that in this enforcer group.
- host
Assurance boolean - When set to
True
enables host scanning and respective Host Assurance controls. - host
Behavioral booleanEngine - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- host
Network booleanProtection - When set to
True
applies Firewall Policies to hosts, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information - host
Os string - The OS type for the host
- host
Protection boolean - When set to
True
enables all Host Runtime Policy controls except forOS Users and Groups Allowed
andOS Users and Groups Blocked
. - host
User booleanProtection - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- hosts
Count number - Number of enforcers in the enforcer group.
- id string
- The provider-assigned unique ID for this managed resource.
- image
Assurance boolean - When Set to
True
enables selected controls: Container Runtime Policy (Block Non-Compliant Images
,Block Unregistered Images
, andRegistries Allowed
) and Default Image Assurance Policy (Images Blocked
). - install
Command string - Enforcer install command
- kube
Bench stringImage Name - See https://docs.aquasec.com/docs/securing-kubernetes-applications#section-configuration-hardening, The KubeEnforcer can deploy the Aqua Security kube-bench open-source product to perform Kubernetes CIS benchmark testing of nodes. This field specifies the path and file name of the kube-bench product image for the KubeEnforcer to deploy; it will be filled in automatically. You can optionally enter a different value.
- last
Update number - The last date and time the batch token was updated in UNIX time.
- logical
Name string - Name for the batch install record.
- low
Vulns number - Number of low vulnerabilities in the enforcers that in this enforcer group.
- med
Vulns number - Number of medium vulnerabilities in the enforcers that in this enforcer group.
- micro
Enforcer stringCerts Secrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - micro
Enforcer stringImage Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. This field specifies the path and file name of the KubeEnforcer product image to be deployed; it will be filled in automatically. You can optionally enter a different value. - micro
Enforcer booleanInjection - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - micro
Enforcer stringSecrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - neg
Vulns number - Number of negligible vulnerabilities in the enforcers that in this enforcer group.
- network
Protection boolean - When set to
True
applies Firewall Policies to containers, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information. - orchestrators
Get
Enforcer Groups Orchestrator[] - The orchestrator for which you are creating the Enforcer group.
- pas
Deployment stringLink - pas deployment link
- permission string
- Permission Action
- risk
Explorer booleanAuto Discovery - When set to
True
allows Enforcers to be discovered in the Risk Explorer. - runtime
Policy stringName - Function Runtime Policy that will applay on the nano enforcer.
- runtime
Type string - The container runtime environment.
- sync
Host booleanImages - When set to
True
configures Enforcers to discover local host images. Discovered images will be listed under Images > Host Images, as well as under Infrastructure (in the Images tab for applicable hosts). - syscall
Enabled boolean - When set to
True
allows profiling and monitoring system calls made by running containers. - token string
- The batch install token.
- type string
- Enforcer Type.
- user
Access booleanControl - When set to
True
applies User Access Control Policies to containers. Note that Aqua Enforcers must be deployed with the AQUARUNCINTERCEPTION environment variable set to 0 in order to use User Access Control Policies. - forensics boolean
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host
Forensics boolean - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- admission_
control bool - Selecting this option will allow the KubeEnforcer to block the deployment of container images that have failed any of these Container Runtime Policy controls:
* Block Non-Compliant Images
* Block Non-Compliant Workloads
* Block Unregistered Images
This functionality can work only when the KubeEnforcer is deployed in Enforce mode. - allow_
kube_ boolenforcer_ audit - Allow kube enforcer audit.
- allowed_
applications Sequence[str] - List of application names to allow on the hosts. if provided, only containers of the listed applications will be allowed to run.
- allowed_
labels Sequence[str] - List of label names to allow on the hosts.
- allowed_
registries Sequence[str] - List of registry names to allow on the hosts.
- antivirus_
protection bool - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Host Runtime policies. - aqua_
version str - Aqua server version
- audit_
all bool - Agent will send extra audit messages to the server for success operations from inside the container (runtime).
- auto_
copy_ boolsecrets - This option is applicable only if
Enable Pod Enforcer injection
is selected. Select this option if you want Aqua Enterprise to copy the secrets defined above to the Pod Enforcer namespace and container. Otherwise, you can choose to copy these secrets by other means. - auto_
discover_ boolconfigure_ registries - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will add previously unknown image registries from the cluster to Aqua. - auto_
discovery_ boolenabled - When this option is selected, the KubeEnforcer will discover workloads on its cluster.
- auto_
scan_ booldiscovered_ images_ running_ containers - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will automatically register images running as workloads (and scan the discovered images for security issues). - behavioral_
engine bool - If
Enabled
, detects suspicious activity in your containers and displays potential security threats in the Incidents and Audits pages. - block_
admission_ boolcontrol - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - commands
Sequence[Get
Enforcer Groups Command] - The installation command.
- connected_
count int - Number of connected enforcers in the enforcer group.
- container_
activity_ boolprotection - When set to
True
applies Container Runtime Policies, Image Profiles, and Firewall Policies to containers. - container_
antivirus_ boolprotection - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Container Runtime policies. - description str
- A description for the Aqua Enforcer group.
- disconnected_
count int - Number of disconnected enforcers in the enforcer group.
- enforce bool
- Whether the enforce mode is enabled on the Enforcers.
- enforcer_
image_ strname - The specific Aqua Enforcer product image (with image tag) to be deployed.
- gateway_
address str - Gateway Address
- gateway_
name str - Gateway Name
- gateways Sequence[str]
- List of Aqua gateway IDs for the Enforcers.
- group_
id str - The ID of the Enforcer group.
- high_
vulns int - Number of high vulnerabilities in the enforcers that in this enforcer group.
- host_
assurance bool - When set to
True
enables host scanning and respective Host Assurance controls. - host_
behavioral_ boolengine - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- host_
network_ boolprotection - When set to
True
applies Firewall Policies to hosts, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information - host_
os str - The OS type for the host
- host_
protection bool - When set to
True
enables all Host Runtime Policy controls except forOS Users and Groups Allowed
andOS Users and Groups Blocked
. - host_
user_ boolprotection - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- hosts_
count int - Number of enforcers in the enforcer group.
- id str
- The provider-assigned unique ID for this managed resource.
- image_
assurance bool - When Set to
True
enables selected controls: Container Runtime Policy (Block Non-Compliant Images
,Block Unregistered Images
, andRegistries Allowed
) and Default Image Assurance Policy (Images Blocked
). - install_
command str - Enforcer install command
- kube_
bench_ strimage_ name - See https://docs.aquasec.com/docs/securing-kubernetes-applications#section-configuration-hardening, The KubeEnforcer can deploy the Aqua Security kube-bench open-source product to perform Kubernetes CIS benchmark testing of nodes. This field specifies the path and file name of the kube-bench product image for the KubeEnforcer to deploy; it will be filled in automatically. You can optionally enter a different value.
- last_
update int - The last date and time the batch token was updated in UNIX time.
- logical_
name str - Name for the batch install record.
- low_
vulns int - Number of low vulnerabilities in the enforcers that in this enforcer group.
- med_
vulns int - Number of medium vulnerabilities in the enforcers that in this enforcer group.
- micro_
enforcer_ strcerts_ secrets_ name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - micro_
enforcer_ strimage_ name - This option is applicable only if
Enable Pod Enforcer injection
is selected. This field specifies the path and file name of the KubeEnforcer product image to be deployed; it will be filled in automatically. You can optionally enter a different value. - micro_
enforcer_ boolinjection - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - micro_
enforcer_ strsecrets_ name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - neg_
vulns int - Number of negligible vulnerabilities in the enforcers that in this enforcer group.
- network_
protection bool - When set to
True
applies Firewall Policies to containers, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information. - orchestrators
Sequence[Get
Enforcer Groups Orchestrator] - The orchestrator for which you are creating the Enforcer group.
- pas_
deployment_ strlink - pas deployment link
- permission str
- Permission Action
- risk_
explorer_ boolauto_ discovery - When set to
True
allows Enforcers to be discovered in the Risk Explorer. - runtime_
policy_ strname - Function Runtime Policy that will applay on the nano enforcer.
- runtime_
type str - The container runtime environment.
- sync_
host_ boolimages - When set to
True
configures Enforcers to discover local host images. Discovered images will be listed under Images > Host Images, as well as under Infrastructure (in the Images tab for applicable hosts). - syscall_
enabled bool - When set to
True
allows profiling and monitoring system calls made by running containers. - token str
- The batch install token.
- type str
- Enforcer Type.
- user_
access_ boolcontrol - When set to
True
applies User Access Control Policies to containers. Note that Aqua Enforcers must be deployed with the AQUARUNCINTERCEPTION environment variable set to 0 in order to use User Access Control Policies. - forensics bool
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host_
forensics bool - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
- admission
Control Boolean - Selecting this option will allow the KubeEnforcer to block the deployment of container images that have failed any of these Container Runtime Policy controls:
* Block Non-Compliant Images
* Block Non-Compliant Workloads
* Block Unregistered Images
This functionality can work only when the KubeEnforcer is deployed in Enforce mode. - allow
Kube BooleanEnforcer Audit - Allow kube enforcer audit.
- allowed
Applications List<String> - List of application names to allow on the hosts. if provided, only containers of the listed applications will be allowed to run.
- allowed
Labels List<String> - List of label names to allow on the hosts.
- allowed
Registries List<String> - List of registry names to allow on the hosts.
- antivirus
Protection Boolean - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Host Runtime policies. - aqua
Version String - Aqua server version
- audit
All Boolean - Agent will send extra audit messages to the server for success operations from inside the container (runtime).
- auto
Copy BooleanSecrets - This option is applicable only if
Enable Pod Enforcer injection
is selected. Select this option if you want Aqua Enterprise to copy the secrets defined above to the Pod Enforcer namespace and container. Otherwise, you can choose to copy these secrets by other means. - auto
Discover BooleanConfigure Registries - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will add previously unknown image registries from the cluster to Aqua. - auto
Discovery BooleanEnabled - When this option is selected, the KubeEnforcer will discover workloads on its cluster.
- auto
Scan BooleanDiscovered Images Running Containers - This option is available only if
Enable workload discovery
is selected. If selected, the KubeEnforcer will automatically register images running as workloads (and scan the discovered images for security issues). - behavioral
Engine Boolean - If
Enabled
, detects suspicious activity in your containers and displays potential security threats in the Incidents and Audits pages. - block
Admission BooleanControl - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - commands List<Property Map>
- The installation command.
- connected
Count Number - Number of connected enforcers in the enforcer group.
- container
Activity BooleanProtection - When set to
True
applies Container Runtime Policies, Image Profiles, and Firewall Policies to containers. - container
Antivirus BooleanProtection - This setting is available only when you have license for
Advanced Malware Protection
. Send true to make use of the license and enable theReal-time Malware Protection
control in the Container Runtime policies. - description String
- A description for the Aqua Enforcer group.
- disconnected
Count Number - Number of disconnected enforcers in the enforcer group.
- enforce Boolean
- Whether the enforce mode is enabled on the Enforcers.
- enforcer
Image StringName - The specific Aqua Enforcer product image (with image tag) to be deployed.
- gateway
Address String - Gateway Address
- gateway
Name String - Gateway Name
- gateways List<String>
- List of Aqua gateway IDs for the Enforcers.
- group
Id String - The ID of the Enforcer group.
- high
Vulns Number - Number of high vulnerabilities in the enforcers that in this enforcer group.
- host
Assurance Boolean - When set to
True
enables host scanning and respective Host Assurance controls. - host
Behavioral BooleanEngine - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- host
Network BooleanProtection - When set to
True
applies Firewall Policies to hosts, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information - host
Os String - The OS type for the host
- host
Protection Boolean - When set to
True
enables all Host Runtime Policy controls except forOS Users and Groups Allowed
andOS Users and Groups Blocked
. - host
User BooleanProtection - When set to
True
enables these Host Runtime Policy controls:OS Users and Groups Allowed
andOS Users and Groups Blocked
- hosts
Count Number - Number of enforcers in the enforcer group.
- id String
- The provider-assigned unique ID for this managed resource.
- image
Assurance Boolean - When Set to
True
enables selected controls: Container Runtime Policy (Block Non-Compliant Images
,Block Unregistered Images
, andRegistries Allowed
) and Default Image Assurance Policy (Images Blocked
). - install
Command String - Enforcer install command
- kube
Bench StringImage Name - See https://docs.aquasec.com/docs/securing-kubernetes-applications#section-configuration-hardening, The KubeEnforcer can deploy the Aqua Security kube-bench open-source product to perform Kubernetes CIS benchmark testing of nodes. This field specifies the path and file name of the kube-bench product image for the KubeEnforcer to deploy; it will be filled in automatically. You can optionally enter a different value.
- last
Update Number - The last date and time the batch token was updated in UNIX time.
- logical
Name String - Name for the batch install record.
- low
Vulns Number - Number of low vulnerabilities in the enforcers that in this enforcer group.
- med
Vulns Number - Number of medium vulnerabilities in the enforcers that in this enforcer group.
- micro
Enforcer StringCerts Secrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - micro
Enforcer StringImage Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. This field specifies the path and file name of the KubeEnforcer product image to be deployed; it will be filled in automatically. You can optionally enter a different value. - micro
Enforcer BooleanInjection - This applies only if both
Enable admission control
and Enforce mode are set. This additional option must be selected for admission control to work if the KubeEnforcer is not connected to any Gateway. If this option is not selected, admission control will be disabled; this will have no effect on containers already running. - micro
Enforcer StringSecrets Name - This option is applicable only if
Enable Pod Enforcer injection
is selected. - neg
Vulns Number - Number of negligible vulnerabilities in the enforcers that in this enforcer group.
- network
Protection Boolean - When set to
True
applies Firewall Policies to containers, and allows recording network maps for Aqua services. The Network Firewall setting must be disabled when deploying the Aqua Enforcer on a machine running Rocky Linux. See https://docs.aquasec.com/docs/platform-support-limitations-rocky-linux for further information. - orchestrators List<Property Map>
- The orchestrator for which you are creating the Enforcer group.
- pas
Deployment StringLink - pas deployment link
- permission String
- Permission Action
- risk
Explorer BooleanAuto Discovery - When set to
True
allows Enforcers to be discovered in the Risk Explorer. - runtime
Policy StringName - Function Runtime Policy that will applay on the nano enforcer.
- runtime
Type String - The container runtime environment.
- sync
Host BooleanImages - When set to
True
configures Enforcers to discover local host images. Discovered images will be listed under Images > Host Images, as well as under Infrastructure (in the Images tab for applicable hosts). - syscall
Enabled Boolean - When set to
True
allows profiling and monitoring system calls made by running containers. - token String
- The batch install token.
- type String
- Enforcer Type.
- user
Access BooleanControl - When set to
True
applies User Access Control Policies to containers. Note that Aqua Enforcers must be deployed with the AQUARUNCINTERCEPTION environment variable set to 0 in order to use User Access Control Policies. - forensics Boolean
- Select Enabled to send activity logs in your containers to the Aqua Server for forensics purposes.
- host
Forensics Boolean - Select Enabled to send activity logs in your host to the Aqua Server for forensics purposes.
Supporting Types
GetEnforcerGroupsCommand
- Default string
- Kubernetes string
- Swarm string
- Windows string
- Default string
- Kubernetes string
- Swarm string
- Windows string
- default_ String
- kubernetes String
- swarm String
- windows String
- default string
- kubernetes string
- swarm string
- windows string
- default str
- kubernetes str
- swarm str
- windows str
- default String
- kubernetes String
- swarm String
- windows String
GetEnforcerGroupsOrchestrator
- Master bool
- Namespace string
- May be specified for these orchestrators: Kubernetes, Kubernetes GKE, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- Service
Account string - May be specified for these orchestrators: Kubernetes, Kubernetes GKE, OpenShift, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- Type string
- Master bool
- Namespace string
- May be specified for these orchestrators: Kubernetes, Kubernetes GKE, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- Service
Account string - May be specified for these orchestrators: Kubernetes, Kubernetes GKE, OpenShift, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- Type string
- master Boolean
- namespace String
- May be specified for these orchestrators: Kubernetes, Kubernetes GKE, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- service
Account String - May be specified for these orchestrators: Kubernetes, Kubernetes GKE, OpenShift, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- type String
- master boolean
- namespace string
- May be specified for these orchestrators: Kubernetes, Kubernetes GKE, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- service
Account string - May be specified for these orchestrators: Kubernetes, Kubernetes GKE, OpenShift, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- type string
- master bool
- namespace str
- May be specified for these orchestrators: Kubernetes, Kubernetes GKE, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- service_
account str - May be specified for these orchestrators: Kubernetes, Kubernetes GKE, OpenShift, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- type str
- master Boolean
- namespace String
- May be specified for these orchestrators: Kubernetes, Kubernetes GKE, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- service
Account String - May be specified for these orchestrators: Kubernetes, Kubernetes GKE, OpenShift, VMware Tanzu Kubernetes Grid Integrated Edition (PKS).
- type String
Package Details
- Repository
- aquasec pulumiverse/pulumi-aquasec
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
aquasec
Terraform Provider.