oci.DataSafe.getSqlFirewallAllowedSqlAnalytics
Explore with Pulumi AI
This data source provides the list of Sql Firewall Allowed Sql Analytics in Oracle Cloud Infrastructure Data Safe service.
Returns the aggregation details of all SQL Firewall allowed SQL statements.
The ListSqlFirewallAllowedSqlAnalytics operation returns the aggregates of the SQL Firewall allowed SQL statements in the specified compartmentId
.
The parameter accessLevel
specifies whether to return only those compartments for which the
requestor has INSPECT permissions on at least one resource directly
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
Principal doesn’t have access to even one of the child compartments. This is valid only when
compartmentIdInSubtree
is set to true
.
The parameter compartmentIdInSubtree
applies when you perform ListSqlFirewallAllowedSqlAnalytics on the
compartmentId
passed and when it is set to true, the entire hierarchy of compartments can be returned.
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
set the parameter compartmentIdInSubtree
to true and accessLevel
to ACCESSIBLE.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSqlFirewallAllowedSqlAnalytics = oci.DataSafe.getSqlFirewallAllowedSqlAnalytics({
compartmentId: compartmentId,
accessLevel: sqlFirewallAllowedSqlAnalyticAccessLevel,
compartmentIdInSubtree: sqlFirewallAllowedSqlAnalyticCompartmentIdInSubtree,
groupBies: sqlFirewallAllowedSqlAnalyticGroupBy,
scimQuery: sqlFirewallAllowedSqlAnalyticScimQuery,
});
import pulumi
import pulumi_oci as oci
test_sql_firewall_allowed_sql_analytics = oci.DataSafe.get_sql_firewall_allowed_sql_analytics(compartment_id=compartment_id,
access_level=sql_firewall_allowed_sql_analytic_access_level,
compartment_id_in_subtree=sql_firewall_allowed_sql_analytic_compartment_id_in_subtree,
group_bies=sql_firewall_allowed_sql_analytic_group_by,
scim_query=sql_firewall_allowed_sql_analytic_scim_query)
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/DataSafe"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := DataSafe.GetSqlFirewallAllowedSqlAnalytics(ctx, &datasafe.GetSqlFirewallAllowedSqlAnalyticsArgs{
CompartmentId: compartmentId,
AccessLevel: pulumi.StringRef(sqlFirewallAllowedSqlAnalyticAccessLevel),
CompartmentIdInSubtree: pulumi.BoolRef(sqlFirewallAllowedSqlAnalyticCompartmentIdInSubtree),
GroupBies: sqlFirewallAllowedSqlAnalyticGroupBy,
ScimQuery: pulumi.StringRef(sqlFirewallAllowedSqlAnalyticScimQuery),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testSqlFirewallAllowedSqlAnalytics = Oci.DataSafe.GetSqlFirewallAllowedSqlAnalytics.Invoke(new()
{
CompartmentId = compartmentId,
AccessLevel = sqlFirewallAllowedSqlAnalyticAccessLevel,
CompartmentIdInSubtree = sqlFirewallAllowedSqlAnalyticCompartmentIdInSubtree,
GroupBies = sqlFirewallAllowedSqlAnalyticGroupBy,
ScimQuery = sqlFirewallAllowedSqlAnalyticScimQuery,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.DataSafe.DataSafeFunctions;
import com.pulumi.oci.DataSafe.inputs.GetSqlFirewallAllowedSqlAnalyticsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testSqlFirewallAllowedSqlAnalytics = DataSafeFunctions.getSqlFirewallAllowedSqlAnalytics(GetSqlFirewallAllowedSqlAnalyticsArgs.builder()
.compartmentId(compartmentId)
.accessLevel(sqlFirewallAllowedSqlAnalyticAccessLevel)
.compartmentIdInSubtree(sqlFirewallAllowedSqlAnalyticCompartmentIdInSubtree)
.groupBies(sqlFirewallAllowedSqlAnalyticGroupBy)
.scimQuery(sqlFirewallAllowedSqlAnalyticScimQuery)
.build());
}
}
variables:
testSqlFirewallAllowedSqlAnalytics:
fn::invoke:
Function: oci:DataSafe:getSqlFirewallAllowedSqlAnalytics
Arguments:
compartmentId: ${compartmentId}
accessLevel: ${sqlFirewallAllowedSqlAnalyticAccessLevel}
compartmentIdInSubtree: ${sqlFirewallAllowedSqlAnalyticCompartmentIdInSubtree}
groupBies: ${sqlFirewallAllowedSqlAnalyticGroupBy}
scimQuery: ${sqlFirewallAllowedSqlAnalyticScimQuery}
Using getSqlFirewallAllowedSqlAnalytics
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSqlFirewallAllowedSqlAnalytics(args: GetSqlFirewallAllowedSqlAnalyticsArgs, opts?: InvokeOptions): Promise<GetSqlFirewallAllowedSqlAnalyticsResult>
function getSqlFirewallAllowedSqlAnalyticsOutput(args: GetSqlFirewallAllowedSqlAnalyticsOutputArgs, opts?: InvokeOptions): Output<GetSqlFirewallAllowedSqlAnalyticsResult>
def get_sql_firewall_allowed_sql_analytics(access_level: Optional[str] = None,
compartment_id: Optional[str] = None,
compartment_id_in_subtree: Optional[bool] = None,
filters: Optional[Sequence[_datasafe.GetSqlFirewallAllowedSqlAnalyticsFilter]] = None,
group_bies: Optional[Sequence[str]] = None,
scim_query: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSqlFirewallAllowedSqlAnalyticsResult
def get_sql_firewall_allowed_sql_analytics_output(access_level: Optional[pulumi.Input[str]] = None,
compartment_id: Optional[pulumi.Input[str]] = None,
compartment_id_in_subtree: Optional[pulumi.Input[bool]] = None,
filters: Optional[pulumi.Input[Sequence[pulumi.Input[_datasafe.GetSqlFirewallAllowedSqlAnalyticsFilterArgs]]]] = None,
group_bies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
scim_query: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSqlFirewallAllowedSqlAnalyticsResult]
func GetSqlFirewallAllowedSqlAnalytics(ctx *Context, args *GetSqlFirewallAllowedSqlAnalyticsArgs, opts ...InvokeOption) (*GetSqlFirewallAllowedSqlAnalyticsResult, error)
func GetSqlFirewallAllowedSqlAnalyticsOutput(ctx *Context, args *GetSqlFirewallAllowedSqlAnalyticsOutputArgs, opts ...InvokeOption) GetSqlFirewallAllowedSqlAnalyticsResultOutput
> Note: This function is named GetSqlFirewallAllowedSqlAnalytics
in the Go SDK.
public static class GetSqlFirewallAllowedSqlAnalytics
{
public static Task<GetSqlFirewallAllowedSqlAnalyticsResult> InvokeAsync(GetSqlFirewallAllowedSqlAnalyticsArgs args, InvokeOptions? opts = null)
public static Output<GetSqlFirewallAllowedSqlAnalyticsResult> Invoke(GetSqlFirewallAllowedSqlAnalyticsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetSqlFirewallAllowedSqlAnalyticsResult> getSqlFirewallAllowedSqlAnalytics(GetSqlFirewallAllowedSqlAnalyticsArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:DataSafe/getSqlFirewallAllowedSqlAnalytics:getSqlFirewallAllowedSqlAnalytics
arguments:
# arguments dictionary
The following arguments are supported:
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- Compartment
Id boolIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Filters
List<Get
Sql Firewall Allowed Sql Analytics Filter> - Group
Bies List<string> - The group by parameter to summarize the allowed SQL aggregation.
- Scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- Compartment
Id boolIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Filters
[]Get
Sql Firewall Allowed Sql Analytics Filter - Group
Bies []string - The group by parameter to summarize the allowed SQL aggregation.
- Scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- access
Level String - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id BooleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
List<Get
Sql Firewall Allowed Sql Analytics Filter> - group
Bies List<String> - The group by parameter to summarize the allowed SQL aggregation.
- scim
Query String The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
- compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id booleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
Get
Sql Firewall Allowed Sql Analytics Filter[] - group
Bies string[] - The group by parameter to summarize the allowed SQL aggregation.
- scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
- compartment_
id str - A filter to return only resources that match the specified compartment OCID.
- access_
level str - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment_
id_ boolin_ subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
Sequence[datasafe.
Get Sql Firewall Allowed Sql Analytics Filter] - group_
bies Sequence[str] - The group by parameter to summarize the allowed SQL aggregation.
- scim_
query str The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- access
Level String - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id BooleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters List<Property Map>
- group
Bies List<String> - The group by parameter to summarize the allowed SQL aggregation.
- scim
Query String The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
getSqlFirewallAllowedSqlAnalytics Result
The following output properties are available:
- Compartment
Id string - Id string
- The provider-assigned unique ID for this managed resource.
- Sql
Firewall List<GetAllowed Sql Analytics Collections Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection> - The list of sql_firewall_allowed_sql_analytics_collection.
- Access
Level string - Compartment
Id boolIn Subtree - Filters
List<Get
Sql Firewall Allowed Sql Analytics Filter> - Group
Bies List<string> - Scim
Query string
- Compartment
Id string - Id string
- The provider-assigned unique ID for this managed resource.
- Sql
Firewall []GetAllowed Sql Analytics Collections Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection - The list of sql_firewall_allowed_sql_analytics_collection.
- Access
Level string - Compartment
Id boolIn Subtree - Filters
[]Get
Sql Firewall Allowed Sql Analytics Filter - Group
Bies []string - Scim
Query string
- compartment
Id String - id String
- The provider-assigned unique ID for this managed resource.
- sql
Firewall List<GetAllowed Sql Analytics Collections Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection> - The list of sql_firewall_allowed_sql_analytics_collection.
- access
Level String - compartment
Id BooleanIn Subtree - filters
List<Get
Sql Firewall Allowed Sql Analytics Filter> - group
Bies List<String> - scim
Query String
- compartment
Id string - id string
- The provider-assigned unique ID for this managed resource.
- sql
Firewall GetAllowed Sql Analytics Collections Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection[] - The list of sql_firewall_allowed_sql_analytics_collection.
- access
Level string - compartment
Id booleanIn Subtree - filters
Get
Sql Firewall Allowed Sql Analytics Filter[] - group
Bies string[] - scim
Query string
- compartment_
id str - id str
- The provider-assigned unique ID for this managed resource.
- sql_
firewall_ Sequence[datasafe.allowed_ sql_ analytics_ collections Get Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection] - The list of sql_firewall_allowed_sql_analytics_collection.
- access_
level str - compartment_
id_ boolin_ subtree - filters
Sequence[datasafe.
Get Sql Firewall Allowed Sql Analytics Filter] - group_
bies Sequence[str] - scim_
query str
- compartment
Id String - id String
- The provider-assigned unique ID for this managed resource.
- sql
Firewall List<Property Map>Allowed Sql Analytics Collections - The list of sql_firewall_allowed_sql_analytics_collection.
- access
Level String - compartment
Id BooleanIn Subtree - filters List<Property Map>
- group
Bies List<String> - scim
Query String
Supporting Types
GetSqlFirewallAllowedSqlAnalyticsFilter
GetSqlFirewallAllowedSqlAnalyticsSqlFirewallAllowedSqlAnalyticsCollection
- Items
List<Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item> - The aggregated data point items.
- Items
[]Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item - The aggregated data point items.
- items
List<Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item> - The aggregated data point items.
- items
Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item[] - The aggregated data point items.
- items
Sequence[datasafe.
Get Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item] - The aggregated data point items.
- items List<Property Map>
- The aggregated data point items.
GetSqlFirewallAllowedSqlAnalyticsSqlFirewallAllowedSqlAnalyticsCollectionItem
- Dimensions
List<Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item Dimension> - The dimensions available for SQL Firewall allow SQL analytics.
- Sql
Firewall stringAllowed Sql Analytic Count - The total count of the aggregated metric.
- Dimensions
[]Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item Dimension - The dimensions available for SQL Firewall allow SQL analytics.
- Sql
Firewall stringAllowed Sql Analytic Count - The total count of the aggregated metric.
- dimensions
List<Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item Dimension> - The dimensions available for SQL Firewall allow SQL analytics.
- sql
Firewall StringAllowed Sql Analytic Count - The total count of the aggregated metric.
- dimensions
Get
Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item Dimension[] - The dimensions available for SQL Firewall allow SQL analytics.
- sql
Firewall stringAllowed Sql Analytic Count - The total count of the aggregated metric.
- dimensions
Sequence[datasafe.
Get Sql Firewall Allowed Sql Analytics Sql Firewall Allowed Sql Analytics Collection Item Dimension] - The dimensions available for SQL Firewall allow SQL analytics.
- sql_
firewall_ strallowed_ sql_ analytic_ count - The total count of the aggregated metric.
- dimensions List<Property Map>
- The dimensions available for SQL Firewall allow SQL analytics.
- sql
Firewall StringAllowed Sql Analytic Count - The total count of the aggregated metric.
GetSqlFirewallAllowedSqlAnalyticsSqlFirewallAllowedSqlAnalyticsCollectionItemDimension
- Db
User stringName - The database user name.
- Sql
Firewall stringPolicy Id - The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
- Sql
Level string - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- State string
- The current state of the SQL Firewall allowed SQL.
- Db
User stringName - The database user name.
- Sql
Firewall stringPolicy Id - The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
- Sql
Level string - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- State string
- The current state of the SQL Firewall allowed SQL.
- db
User StringName - The database user name.
- sql
Firewall StringPolicy Id - The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
- sql
Level String - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- state String
- The current state of the SQL Firewall allowed SQL.
- db
User stringName - The database user name.
- sql
Firewall stringPolicy Id - The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
- sql
Level string - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- state string
- The current state of the SQL Firewall allowed SQL.
- db_
user_ strname - The database user name.
- sql_
firewall_ strpolicy_ id - The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
- sql_
level str - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- state str
- The current state of the SQL Firewall allowed SQL.
- db
User StringName - The database user name.
- sql
Firewall StringPolicy Id - The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
- sql
Level String - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- state String
- The current state of the SQL Firewall allowed SQL.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.