oci.DataSafe.getSqlFirewallViolationAnalytics
Explore with Pulumi AI
This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
Returns the aggregation details of the SQL Firewall violations.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSqlFirewallViolationAnalytics = oci.DataSafe.getSqlFirewallViolationAnalytics({
compartmentId: compartmentId,
accessLevel: sqlFirewallViolationAnalyticAccessLevel,
compartmentIdInSubtree: sqlFirewallViolationAnalyticCompartmentIdInSubtree,
groupBies: sqlFirewallViolationAnalyticGroupBy,
queryTimeZone: sqlFirewallViolationAnalyticQueryTimeZone,
scimQuery: sqlFirewallViolationAnalyticScimQuery,
summaryFields: sqlFirewallViolationAnalyticSummaryField,
timeEnded: sqlFirewallViolationAnalyticTimeEnded,
timeStarted: sqlFirewallViolationAnalyticTimeStarted,
});
import pulumi
import pulumi_oci as oci
test_sql_firewall_violation_analytics = oci.DataSafe.get_sql_firewall_violation_analytics(compartment_id=compartment_id,
access_level=sql_firewall_violation_analytic_access_level,
compartment_id_in_subtree=sql_firewall_violation_analytic_compartment_id_in_subtree,
group_bies=sql_firewall_violation_analytic_group_by,
query_time_zone=sql_firewall_violation_analytic_query_time_zone,
scim_query=sql_firewall_violation_analytic_scim_query,
summary_fields=sql_firewall_violation_analytic_summary_field,
time_ended=sql_firewall_violation_analytic_time_ended,
time_started=sql_firewall_violation_analytic_time_started)
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/DataSafe"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := DataSafe.GetSqlFirewallViolationAnalytics(ctx, &datasafe.GetSqlFirewallViolationAnalyticsArgs{
CompartmentId: compartmentId,
AccessLevel: pulumi.StringRef(sqlFirewallViolationAnalyticAccessLevel),
CompartmentIdInSubtree: pulumi.BoolRef(sqlFirewallViolationAnalyticCompartmentIdInSubtree),
GroupBies: sqlFirewallViolationAnalyticGroupBy,
QueryTimeZone: pulumi.StringRef(sqlFirewallViolationAnalyticQueryTimeZone),
ScimQuery: pulumi.StringRef(sqlFirewallViolationAnalyticScimQuery),
SummaryFields: sqlFirewallViolationAnalyticSummaryField,
TimeEnded: pulumi.StringRef(sqlFirewallViolationAnalyticTimeEnded),
TimeStarted: pulumi.StringRef(sqlFirewallViolationAnalyticTimeStarted),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testSqlFirewallViolationAnalytics = Oci.DataSafe.GetSqlFirewallViolationAnalytics.Invoke(new()
{
CompartmentId = compartmentId,
AccessLevel = sqlFirewallViolationAnalyticAccessLevel,
CompartmentIdInSubtree = sqlFirewallViolationAnalyticCompartmentIdInSubtree,
GroupBies = sqlFirewallViolationAnalyticGroupBy,
QueryTimeZone = sqlFirewallViolationAnalyticQueryTimeZone,
ScimQuery = sqlFirewallViolationAnalyticScimQuery,
SummaryFields = sqlFirewallViolationAnalyticSummaryField,
TimeEnded = sqlFirewallViolationAnalyticTimeEnded,
TimeStarted = sqlFirewallViolationAnalyticTimeStarted,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.DataSafe.DataSafeFunctions;
import com.pulumi.oci.DataSafe.inputs.GetSqlFirewallViolationAnalyticsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testSqlFirewallViolationAnalytics = DataSafeFunctions.getSqlFirewallViolationAnalytics(GetSqlFirewallViolationAnalyticsArgs.builder()
.compartmentId(compartmentId)
.accessLevel(sqlFirewallViolationAnalyticAccessLevel)
.compartmentIdInSubtree(sqlFirewallViolationAnalyticCompartmentIdInSubtree)
.groupBies(sqlFirewallViolationAnalyticGroupBy)
.queryTimeZone(sqlFirewallViolationAnalyticQueryTimeZone)
.scimQuery(sqlFirewallViolationAnalyticScimQuery)
.summaryFields(sqlFirewallViolationAnalyticSummaryField)
.timeEnded(sqlFirewallViolationAnalyticTimeEnded)
.timeStarted(sqlFirewallViolationAnalyticTimeStarted)
.build());
}
}
variables:
testSqlFirewallViolationAnalytics:
fn::invoke:
Function: oci:DataSafe:getSqlFirewallViolationAnalytics
Arguments:
compartmentId: ${compartmentId}
accessLevel: ${sqlFirewallViolationAnalyticAccessLevel}
compartmentIdInSubtree: ${sqlFirewallViolationAnalyticCompartmentIdInSubtree}
groupBies: ${sqlFirewallViolationAnalyticGroupBy}
queryTimeZone: ${sqlFirewallViolationAnalyticQueryTimeZone}
scimQuery: ${sqlFirewallViolationAnalyticScimQuery}
summaryFields: ${sqlFirewallViolationAnalyticSummaryField}
timeEnded: ${sqlFirewallViolationAnalyticTimeEnded}
timeStarted: ${sqlFirewallViolationAnalyticTimeStarted}
Using getSqlFirewallViolationAnalytics
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSqlFirewallViolationAnalytics(args: GetSqlFirewallViolationAnalyticsArgs, opts?: InvokeOptions): Promise<GetSqlFirewallViolationAnalyticsResult>
function getSqlFirewallViolationAnalyticsOutput(args: GetSqlFirewallViolationAnalyticsOutputArgs, opts?: InvokeOptions): Output<GetSqlFirewallViolationAnalyticsResult>
def get_sql_firewall_violation_analytics(access_level: Optional[str] = None,
compartment_id: Optional[str] = None,
compartment_id_in_subtree: Optional[bool] = None,
filters: Optional[Sequence[_datasafe.GetSqlFirewallViolationAnalyticsFilter]] = None,
group_bies: Optional[Sequence[str]] = None,
query_time_zone: Optional[str] = None,
scim_query: Optional[str] = None,
summary_fields: Optional[Sequence[str]] = None,
time_ended: Optional[str] = None,
time_started: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSqlFirewallViolationAnalyticsResult
def get_sql_firewall_violation_analytics_output(access_level: Optional[pulumi.Input[str]] = None,
compartment_id: Optional[pulumi.Input[str]] = None,
compartment_id_in_subtree: Optional[pulumi.Input[bool]] = None,
filters: Optional[pulumi.Input[Sequence[pulumi.Input[_datasafe.GetSqlFirewallViolationAnalyticsFilterArgs]]]] = None,
group_bies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
query_time_zone: Optional[pulumi.Input[str]] = None,
scim_query: Optional[pulumi.Input[str]] = None,
summary_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
time_ended: Optional[pulumi.Input[str]] = None,
time_started: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSqlFirewallViolationAnalyticsResult]
func GetSqlFirewallViolationAnalytics(ctx *Context, args *GetSqlFirewallViolationAnalyticsArgs, opts ...InvokeOption) (*GetSqlFirewallViolationAnalyticsResult, error)
func GetSqlFirewallViolationAnalyticsOutput(ctx *Context, args *GetSqlFirewallViolationAnalyticsOutputArgs, opts ...InvokeOption) GetSqlFirewallViolationAnalyticsResultOutput
> Note: This function is named GetSqlFirewallViolationAnalytics
in the Go SDK.
public static class GetSqlFirewallViolationAnalytics
{
public static Task<GetSqlFirewallViolationAnalyticsResult> InvokeAsync(GetSqlFirewallViolationAnalyticsArgs args, InvokeOptions? opts = null)
public static Output<GetSqlFirewallViolationAnalyticsResult> Invoke(GetSqlFirewallViolationAnalyticsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetSqlFirewallViolationAnalyticsResult> getSqlFirewallViolationAnalytics(GetSqlFirewallViolationAnalyticsArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:DataSafe/getSqlFirewallViolationAnalytics:getSqlFirewallViolationAnalytics
arguments:
# arguments dictionary
The following arguments are supported:
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- Compartment
Id boolIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Filters
List<Get
Sql Firewall Violation Analytics Filter> - Group
Bies List<string> - A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- Query
Time stringZone - Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- Scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
- Summary
Fields List<string> - Specifies a subset of summarized fields to be returned in the response.
- Time
Ended string - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- Time
Started string - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- Compartment
Id boolIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Filters
[]Get
Sql Firewall Violation Analytics Filter - Group
Bies []string - A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- Query
Time stringZone - Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- Scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
- Summary
Fields []string - Specifies a subset of summarized fields to be returned in the response.
- Time
Ended string - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- Time
Started string - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- access
Level String - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id BooleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
List<Get
Sql Firewall Violation Analytics Filter> - group
Bies List<String> - A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- query
Time StringZone - Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scim
Query String The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
- summary
Fields List<String> - Specifies a subset of summarized fields to be returned in the response.
- time
Ended String - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time
Started String - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id booleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
Get
Sql Firewall Violation Analytics Filter[] - group
Bies string[] - A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- query
Time stringZone - Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scim
Query string The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
- summary
Fields string[] - Specifies a subset of summarized fields to be returned in the response.
- time
Ended string - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time
Started string - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartment_
id str - A filter to return only resources that match the specified compartment OCID.
- access_
level str - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment_
id_ boolin_ subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
Sequence[datasafe.
Get Sql Firewall Violation Analytics Filter] - group_
bies Sequence[str] - A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- query_
time_ strzone - Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scim_
query str The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
- summary_
fields Sequence[str] - Specifies a subset of summarized fields to be returned in the response.
- time_
ended str - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time_
started str - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- access
Level String - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id BooleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters List<Property Map>
- group
Bies List<String> - A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- query
Time StringZone - Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scim
Query String The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
- summary
Fields List<String> - Specifies a subset of summarized fields to be returned in the response.
- time
Ended String - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time
Started String - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
getSqlFirewallViolationAnalytics Result
The following output properties are available:
- Compartment
Id string - Id string
- The provider-assigned unique ID for this managed resource.
- Sql
Firewall List<GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection> - The list of sql_firewall_violation_analytics_collection.
- Access
Level string - Compartment
Id boolIn Subtree - Filters
List<Get
Sql Firewall Violation Analytics Filter> - Group
Bies List<string> - Query
Time stringZone - Scim
Query string - Summary
Fields List<string> - Time
Ended string - The time at which the aggregation ended.
- Time
Started string - The time at which the aggregation started.
- Compartment
Id string - Id string
- The provider-assigned unique ID for this managed resource.
- Sql
Firewall []GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection - The list of sql_firewall_violation_analytics_collection.
- Access
Level string - Compartment
Id boolIn Subtree - Filters
[]Get
Sql Firewall Violation Analytics Filter - Group
Bies []string - Query
Time stringZone - Scim
Query string - Summary
Fields []string - Time
Ended string - The time at which the aggregation ended.
- Time
Started string - The time at which the aggregation started.
- compartment
Id String - id String
- The provider-assigned unique ID for this managed resource.
- sql
Firewall List<GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection> - The list of sql_firewall_violation_analytics_collection.
- access
Level String - compartment
Id BooleanIn Subtree - filters
List<Get
Sql Firewall Violation Analytics Filter> - group
Bies List<String> - query
Time StringZone - scim
Query String - summary
Fields List<String> - time
Ended String - The time at which the aggregation ended.
- time
Started String - The time at which the aggregation started.
- compartment
Id string - id string
- The provider-assigned unique ID for this managed resource.
- sql
Firewall GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection[] - The list of sql_firewall_violation_analytics_collection.
- access
Level string - compartment
Id booleanIn Subtree - filters
Get
Sql Firewall Violation Analytics Filter[] - group
Bies string[] - query
Time stringZone - scim
Query string - summary
Fields string[] - time
Ended string - The time at which the aggregation ended.
- time
Started string - The time at which the aggregation started.
- compartment_
id str - id str
- The provider-assigned unique ID for this managed resource.
- sql_
firewall_ Sequence[datasafe.violation_ analytics_ collections Get Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection] - The list of sql_firewall_violation_analytics_collection.
- access_
level str - compartment_
id_ boolin_ subtree - filters
Sequence[datasafe.
Get Sql Firewall Violation Analytics Filter] - group_
bies Sequence[str] - query_
time_ strzone - scim_
query str - summary_
fields Sequence[str] - time_
ended str - The time at which the aggregation ended.
- time_
started str - The time at which the aggregation started.
- compartment
Id String - id String
- The provider-assigned unique ID for this managed resource.
- sql
Firewall List<Property Map>Violation Analytics Collections - The list of sql_firewall_violation_analytics_collection.
- access
Level String - compartment
Id BooleanIn Subtree - filters List<Property Map>
- group
Bies List<String> - query
Time StringZone - scim
Query String - summary
Fields List<String> - time
Ended String - The time at which the aggregation ended.
- time
Started String - The time at which the aggregation started.
Supporting Types
GetSqlFirewallViolationAnalyticsFilter
GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollection
- Items
List<Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item> - The aggregated data point items.
- Items
[]Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item - The aggregated data point items.
- items
List<Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item> - The aggregated data point items.
- items
Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item[] - The aggregated data point items.
- items
Sequence[datasafe.
Get Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item] - The aggregated data point items.
- items List<Property Map>
- The aggregated data point items.
GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollectionItem
- Dimensions
List<Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension> - The details of the aggregation dimensions used for summarizing SQL violations.
- Display
Name string - The display name of aggregation field.
- Metric
Name string - The name of the aggregation.
- Sql
Firewall stringViolation Analytic Count - Total count of aggregated value.
- Time
Ended string - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- Time
Started string - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- Dimensions
[]Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension - The details of the aggregation dimensions used for summarizing SQL violations.
- Display
Name string - The display name of aggregation field.
- Metric
Name string - The name of the aggregation.
- Sql
Firewall stringViolation Analytic Count - Total count of aggregated value.
- Time
Ended string - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- Time
Started string - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions
List<Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension> - The details of the aggregation dimensions used for summarizing SQL violations.
- display
Name String - The display name of aggregation field.
- metric
Name String - The name of the aggregation.
- sql
Firewall StringViolation Analytic Count - Total count of aggregated value.
- time
Ended String - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time
Started String - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions
Get
Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension[] - The details of the aggregation dimensions used for summarizing SQL violations.
- display
Name string - The display name of aggregation field.
- metric
Name string - The name of the aggregation.
- sql
Firewall stringViolation Analytic Count - Total count of aggregated value.
- time
Ended string - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time
Started string - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions
Sequence[datasafe.
Get Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension] - The details of the aggregation dimensions used for summarizing SQL violations.
- display_
name str - The display name of aggregation field.
- metric_
name str - The name of the aggregation.
- sql_
firewall_ strviolation_ analytic_ count - Total count of aggregated value.
- time_
ended str - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time_
started str - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions List<Property Map>
- The details of the aggregation dimensions used for summarizing SQL violations.
- display
Name String - The display name of aggregation field.
- metric
Name String - The name of the aggregation.
- sql
Firewall StringViolation Analytic Count - Total count of aggregated value.
- time
Ended String - An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time
Started String - An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollectionItemDimension
- Client
Ips List<string> - The IP address of the host from which the session was spawned.
- Client
Os List<string>User Names - The name of the operating system user for the database session.
- Client
Programs List<string> - The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- Db
User List<string>Names - The name of the database user.
- Operation
Times List<string> - The time of the SQL violation occurrence in the target database.
- Operations List<string>
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- Sql
Levels List<string> - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- Target
Ids List<string> - The OCID of the target database.
- Target
Names List<string> - The name of the target database.
- Violation
Actions List<string> - The action taken for this SQL violation.
- Violation
Causes List<string> - Indicates whether SQL or context violation.
- Client
Ips []string - The IP address of the host from which the session was spawned.
- Client
Os []stringUser Names - The name of the operating system user for the database session.
- Client
Programs []string - The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- Db
User []stringNames - The name of the database user.
- Operation
Times []string - The time of the SQL violation occurrence in the target database.
- Operations []string
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- Sql
Levels []string - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- Target
Ids []string - The OCID of the target database.
- Target
Names []string - The name of the target database.
- Violation
Actions []string - The action taken for this SQL violation.
- Violation
Causes []string - Indicates whether SQL or context violation.
- client
Ips List<String> - The IP address of the host from which the session was spawned.
- client
Os List<String>User Names - The name of the operating system user for the database session.
- client
Programs List<String> - The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- db
User List<String>Names - The name of the database user.
- operation
Times List<String> - The time of the SQL violation occurrence in the target database.
- operations List<String>
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sql
Levels List<String> - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- target
Ids List<String> - The OCID of the target database.
- target
Names List<String> - The name of the target database.
- violation
Actions List<String> - The action taken for this SQL violation.
- violation
Causes List<String> - Indicates whether SQL or context violation.
- client
Ips string[] - The IP address of the host from which the session was spawned.
- client
Os string[]User Names - The name of the operating system user for the database session.
- client
Programs string[] - The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- db
User string[]Names - The name of the database user.
- operation
Times string[] - The time of the SQL violation occurrence in the target database.
- operations string[]
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sql
Levels string[] - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- target
Ids string[] - The OCID of the target database.
- target
Names string[] - The name of the target database.
- violation
Actions string[] - The action taken for this SQL violation.
- violation
Causes string[] - Indicates whether SQL or context violation.
- client_
ips Sequence[str] - The IP address of the host from which the session was spawned.
- client_
os_ Sequence[str]user_ names - The name of the operating system user for the database session.
- client_
programs Sequence[str] - The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- db_
user_ Sequence[str]names - The name of the database user.
- operation_
times Sequence[str] - The time of the SQL violation occurrence in the target database.
- operations Sequence[str]
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sql_
levels Sequence[str] - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- target_
ids Sequence[str] - The OCID of the target database.
- target_
names Sequence[str] - The name of the target database.
- violation_
actions Sequence[str] - The action taken for this SQL violation.
- violation_
causes Sequence[str] - Indicates whether SQL or context violation.
- client
Ips List<String> - The IP address of the host from which the session was spawned.
- client
Os List<String>User Names - The name of the operating system user for the database session.
- client
Programs List<String> - The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- db
User List<String>Names - The name of the database user.
- operation
Times List<String> - The time of the SQL violation occurrence in the target database.
- operations List<String>
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sql
Levels List<String> - Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- target
Ids List<String> - The OCID of the target database.
- target
Names List<String> - The name of the target database.
- violation
Actions List<String> - The action taken for this SQL violation.
- violation
Causes List<String> - Indicates whether SQL or context violation.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.