cyral.RepositoryConfAnalysis
Explore with Pulumi AI
Manages Repository Analysis Configuration. This resource allows configuring Data Activity Logs, Alerts and Policy Enforcement settings for Data Repositories.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cyral from "@pulumi/cyral";
//## All Config enabled
const allConfAnalysisEnabled = new cyral.RepositoryConfAnalysis("allConfAnalysisEnabled", {
    repositoryId: cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id,
    redact: "all",
    alertOnViolation: true,
    disablePreConfiguredAlerts: false,
    blockOnViolation: true,
    disableFilterAnalysis: false,
    enableDatasetRewrites: true,
    enableDataMasking: true,
    maskAllOccurrences: true,
    commentAnnotationGroups: ["identity"],
    logGroups: ["everything"],
});
//## All Config disabled
const allConfAnalysisDisabled = new cyral.RepositoryConfAnalysis("allConfAnalysisDisabled", {
    repositoryId: cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id,
    redact: "none",
    alertOnViolation: false,
    disablePreConfiguredAlerts: true,
    blockOnViolation: false,
    disableFilterAnalysis: true,
    enableDatasetRewrites: false,
    enableDataMasking: false,
    maskAllOccurrences: false,
    commentAnnotationGroups: [],
    logGroups: [],
});
import pulumi
import pulumi_cyral as cyral
### All Config enabled
all_conf_analysis_enabled = cyral.RepositoryConfAnalysis("allConfAnalysisEnabled",
    repository_id=cyral_repository["SOME_REPOSITORY_RESOURCE_NAME"]["id"],
    redact="all",
    alert_on_violation=True,
    disable_pre_configured_alerts=False,
    block_on_violation=True,
    disable_filter_analysis=False,
    enable_dataset_rewrites=True,
    enable_data_masking=True,
    mask_all_occurrences=True,
    comment_annotation_groups=["identity"],
    log_groups=["everything"])
### All Config disabled
all_conf_analysis_disabled = cyral.RepositoryConfAnalysis("allConfAnalysisDisabled",
    repository_id=cyral_repository["SOME_REPOSITORY_RESOURCE_NAME"]["id"],
    redact="none",
    alert_on_violation=False,
    disable_pre_configured_alerts=True,
    block_on_violation=False,
    disable_filter_analysis=True,
    enable_dataset_rewrites=False,
    enable_data_masking=False,
    mask_all_occurrences=False,
    comment_annotation_groups=[],
    log_groups=[])
package main
import (
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/cyral/v4/cyral"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		// ## All Config enabled
		_, err := cyral.NewRepositoryConfAnalysis(ctx, "allConfAnalysisEnabled", &cyral.RepositoryConfAnalysisArgs{
			RepositoryId:               pulumi.Any(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id),
			Redact:                     pulumi.String("all"),
			AlertOnViolation:           pulumi.Bool(true),
			DisablePreConfiguredAlerts: pulumi.Bool(false),
			BlockOnViolation:           pulumi.Bool(true),
			DisableFilterAnalysis:      pulumi.Bool(false),
			EnableDatasetRewrites:      pulumi.Bool(true),
			EnableDataMasking:          pulumi.Bool(true),
			MaskAllOccurrences:         pulumi.Bool(true),
			CommentAnnotationGroups: pulumi.StringArray{
				pulumi.String("identity"),
			},
			LogGroups: pulumi.StringArray{
				pulumi.String("everything"),
			},
		})
		if err != nil {
			return err
		}
		// ## All Config disabled
		_, err = cyral.NewRepositoryConfAnalysis(ctx, "allConfAnalysisDisabled", &cyral.RepositoryConfAnalysisArgs{
			RepositoryId:               pulumi.Any(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id),
			Redact:                     pulumi.String("none"),
			AlertOnViolation:           pulumi.Bool(false),
			DisablePreConfiguredAlerts: pulumi.Bool(true),
			BlockOnViolation:           pulumi.Bool(false),
			DisableFilterAnalysis:      pulumi.Bool(true),
			EnableDatasetRewrites:      pulumi.Bool(false),
			EnableDataMasking:          pulumi.Bool(false),
			MaskAllOccurrences:         pulumi.Bool(false),
			CommentAnnotationGroups:    pulumi.StringArray{},
			LogGroups:                  pulumi.StringArray{},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cyral = Pulumi.Cyral;
return await Deployment.RunAsync(() => 
{
    //## All Config enabled
    var allConfAnalysisEnabled = new Cyral.RepositoryConfAnalysis("allConfAnalysisEnabled", new()
    {
        RepositoryId = cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id,
        Redact = "all",
        AlertOnViolation = true,
        DisablePreConfiguredAlerts = false,
        BlockOnViolation = true,
        DisableFilterAnalysis = false,
        EnableDatasetRewrites = true,
        EnableDataMasking = true,
        MaskAllOccurrences = true,
        CommentAnnotationGroups = new[]
        {
            "identity",
        },
        LogGroups = new[]
        {
            "everything",
        },
    });
    //## All Config disabled
    var allConfAnalysisDisabled = new Cyral.RepositoryConfAnalysis("allConfAnalysisDisabled", new()
    {
        RepositoryId = cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id,
        Redact = "none",
        AlertOnViolation = false,
        DisablePreConfiguredAlerts = true,
        BlockOnViolation = false,
        DisableFilterAnalysis = true,
        EnableDatasetRewrites = false,
        EnableDataMasking = false,
        MaskAllOccurrences = false,
        CommentAnnotationGroups = new[] {},
        LogGroups = new[] {},
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cyral.RepositoryConfAnalysis;
import com.pulumi.cyral.RepositoryConfAnalysisArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        //## All Config enabled
        var allConfAnalysisEnabled = new RepositoryConfAnalysis("allConfAnalysisEnabled", RepositoryConfAnalysisArgs.builder()
            .repositoryId(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME().id())
            .redact("all")
            .alertOnViolation(true)
            .disablePreConfiguredAlerts(false)
            .blockOnViolation(true)
            .disableFilterAnalysis(false)
            .enableDatasetRewrites(true)
            .enableDataMasking(true)
            .maskAllOccurrences(true)
            .commentAnnotationGroups("identity")
            .logGroups("everything")
            .build());
        //## All Config disabled
        var allConfAnalysisDisabled = new RepositoryConfAnalysis("allConfAnalysisDisabled", RepositoryConfAnalysisArgs.builder()
            .repositoryId(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME().id())
            .redact("none")
            .alertOnViolation(false)
            .disablePreConfiguredAlerts(true)
            .blockOnViolation(false)
            .disableFilterAnalysis(true)
            .enableDatasetRewrites(false)
            .enableDataMasking(false)
            .maskAllOccurrences(false)
            .commentAnnotationGroups()
            .logGroups()
            .build());
    }
}
resources:
  ### All Config enabled
  allConfAnalysisEnabled:
    type: cyral:RepositoryConfAnalysis
    properties:
      repositoryId: ${cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id}
      redact: all
      alertOnViolation: true
      disablePreConfiguredAlerts: false
      blockOnViolation: true
      disableFilterAnalysis: false
      enableDatasetRewrites: true
      enableDataMasking: true
      maskAllOccurrences: true
      commentAnnotationGroups:
        - identity
      logGroups:
        - everything
  ### All Config disabled
  allConfAnalysisDisabled:
    type: cyral:RepositoryConfAnalysis
    properties:
      repositoryId: ${cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id}
      redact: none
      alertOnViolation: false
      disablePreConfiguredAlerts: true
      blockOnViolation: false
      disableFilterAnalysis: true
      enableDatasetRewrites: false
      enableDataMasking: false
      maskAllOccurrences: false
      commentAnnotationGroups: []
      logGroups: []
Create RepositoryConfAnalysis Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new RepositoryConfAnalysis(name: string, args: RepositoryConfAnalysisArgs, opts?: CustomResourceOptions);@overload
def RepositoryConfAnalysis(resource_name: str,
                           args: RepositoryConfAnalysisArgs,
                           opts: Optional[ResourceOptions] = None)
@overload
def RepositoryConfAnalysis(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           repository_id: Optional[str] = None,
                           alert_on_violation: Optional[bool] = None,
                           block_on_violation: Optional[bool] = None,
                           comment_annotation_groups: Optional[Sequence[str]] = None,
                           disable_filter_analysis: Optional[bool] = None,
                           disable_pre_configured_alerts: Optional[bool] = None,
                           enable_data_masking: Optional[bool] = None,
                           enable_dataset_rewrites: Optional[bool] = None,
                           log_groups: Optional[Sequence[str]] = None,
                           mask_all_occurrences: Optional[bool] = None,
                           redact: Optional[str] = None)func NewRepositoryConfAnalysis(ctx *Context, name string, args RepositoryConfAnalysisArgs, opts ...ResourceOption) (*RepositoryConfAnalysis, error)public RepositoryConfAnalysis(string name, RepositoryConfAnalysisArgs args, CustomResourceOptions? opts = null)
public RepositoryConfAnalysis(String name, RepositoryConfAnalysisArgs args)
public RepositoryConfAnalysis(String name, RepositoryConfAnalysisArgs args, CustomResourceOptions options)
type: cyral:RepositoryConfAnalysis
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var repositoryConfAnalysisResource = new Cyral.RepositoryConfAnalysis("repositoryConfAnalysisResource", new()
{
    RepositoryId = "string",
    AlertOnViolation = false,
    BlockOnViolation = false,
    CommentAnnotationGroups = new[]
    {
        "string",
    },
    DisableFilterAnalysis = false,
    DisablePreConfiguredAlerts = false,
    EnableDataMasking = false,
    EnableDatasetRewrites = false,
    LogGroups = new[]
    {
        "string",
    },
    MaskAllOccurrences = false,
    Redact = "string",
});
example, err := cyral.NewRepositoryConfAnalysis(ctx, "repositoryConfAnalysisResource", &cyral.RepositoryConfAnalysisArgs{
	RepositoryId:     pulumi.String("string"),
	AlertOnViolation: pulumi.Bool(false),
	BlockOnViolation: pulumi.Bool(false),
	CommentAnnotationGroups: pulumi.StringArray{
		pulumi.String("string"),
	},
	DisableFilterAnalysis:      pulumi.Bool(false),
	DisablePreConfiguredAlerts: pulumi.Bool(false),
	EnableDataMasking:          pulumi.Bool(false),
	EnableDatasetRewrites:      pulumi.Bool(false),
	LogGroups: pulumi.StringArray{
		pulumi.String("string"),
	},
	MaskAllOccurrences: pulumi.Bool(false),
	Redact:             pulumi.String("string"),
})
var repositoryConfAnalysisResource = new RepositoryConfAnalysis("repositoryConfAnalysisResource", RepositoryConfAnalysisArgs.builder()
    .repositoryId("string")
    .alertOnViolation(false)
    .blockOnViolation(false)
    .commentAnnotationGroups("string")
    .disableFilterAnalysis(false)
    .disablePreConfiguredAlerts(false)
    .enableDataMasking(false)
    .enableDatasetRewrites(false)
    .logGroups("string")
    .maskAllOccurrences(false)
    .redact("string")
    .build());
repository_conf_analysis_resource = cyral.RepositoryConfAnalysis("repositoryConfAnalysisResource",
    repository_id="string",
    alert_on_violation=False,
    block_on_violation=False,
    comment_annotation_groups=["string"],
    disable_filter_analysis=False,
    disable_pre_configured_alerts=False,
    enable_data_masking=False,
    enable_dataset_rewrites=False,
    log_groups=["string"],
    mask_all_occurrences=False,
    redact="string")
const repositoryConfAnalysisResource = new cyral.RepositoryConfAnalysis("repositoryConfAnalysisResource", {
    repositoryId: "string",
    alertOnViolation: false,
    blockOnViolation: false,
    commentAnnotationGroups: ["string"],
    disableFilterAnalysis: false,
    disablePreConfiguredAlerts: false,
    enableDataMasking: false,
    enableDatasetRewrites: false,
    logGroups: ["string"],
    maskAllOccurrences: false,
    redact: "string",
});
type: cyral:RepositoryConfAnalysis
properties:
    alertOnViolation: false
    blockOnViolation: false
    commentAnnotationGroups:
        - string
    disableFilterAnalysis: false
    disablePreConfiguredAlerts: false
    enableDataMasking: false
    enableDatasetRewrites: false
    logGroups:
        - string
    maskAllOccurrences: false
    redact: string
    repositoryId: string
RepositoryConfAnalysis Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The RepositoryConfAnalysis resource accepts the following input properties:
- RepositoryId string
- The ID of an existing data repository resource that will be configured.
- AlertOn boolViolation 
- If set to trueit will enable alert on policy violations.
- BlockOn boolViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- CommentAnnotation List<string>Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- DisableFilter boolAnalysis 
- If set to trueit will disable filter analysis.
- DisablePre boolConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- EnableData boolMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- EnableDataset boolRewrites 
- If set to trueit will enable rewriting queries.
- LogGroups List<string>
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- MaskAll boolOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- Redact string
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- RepositoryId string
- The ID of an existing data repository resource that will be configured.
- AlertOn boolViolation 
- If set to trueit will enable alert on policy violations.
- BlockOn boolViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- CommentAnnotation []stringGroups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- DisableFilter boolAnalysis 
- If set to trueit will disable filter analysis.
- DisablePre boolConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- EnableData boolMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- EnableDataset boolRewrites 
- If set to trueit will enable rewriting queries.
- LogGroups []string
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- MaskAll boolOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- Redact string
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repositoryId String
- The ID of an existing data repository resource that will be configured.
- alertOn BooleanViolation 
- If set to trueit will enable alert on policy violations.
- blockOn BooleanViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- commentAnnotation List<String>Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disableFilter BooleanAnalysis 
- If set to trueit will disable filter analysis.
- disablePre BooleanConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- enableData BooleanMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enableDataset BooleanRewrites 
- If set to trueit will enable rewriting queries.
- logGroups List<String>
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- maskAll BooleanOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact String
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repositoryId string
- The ID of an existing data repository resource that will be configured.
- alertOn booleanViolation 
- If set to trueit will enable alert on policy violations.
- blockOn booleanViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- commentAnnotation string[]Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disableFilter booleanAnalysis 
- If set to trueit will disable filter analysis.
- disablePre booleanConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- enableData booleanMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enableDataset booleanRewrites 
- If set to trueit will enable rewriting queries.
- logGroups string[]
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- maskAll booleanOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact string
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repository_id str
- The ID of an existing data repository resource that will be configured.
- alert_on_ boolviolation 
- If set to trueit will enable alert on policy violations.
- block_on_ boolviolation 
- If set to trueit will enable query blocking in case of a policy violation.
- comment_annotation_ Sequence[str]groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disable_filter_ boolanalysis 
- If set to trueit will disable filter analysis.
- disable_pre_ boolconfigured_ alerts 
- If set to trueit will disable preconfigured alerts.
- enable_data_ boolmasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enable_dataset_ boolrewrites 
- If set to trueit will enable rewriting queries.
- log_groups Sequence[str]
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- mask_all_ booloccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact str
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repositoryId String
- The ID of an existing data repository resource that will be configured.
- alertOn BooleanViolation 
- If set to trueit will enable alert on policy violations.
- blockOn BooleanViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- commentAnnotation List<String>Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disableFilter BooleanAnalysis 
- If set to trueit will disable filter analysis.
- disablePre BooleanConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- enableData BooleanMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enableDataset BooleanRewrites 
- If set to trueit will enable rewriting queries.
- logGroups List<String>
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- maskAll BooleanOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact String
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
Outputs
All input properties are implicitly available as output properties. Additionally, the RepositoryConfAnalysis resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing RepositoryConfAnalysis Resource
Get an existing RepositoryConfAnalysis resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: RepositoryConfAnalysisState, opts?: CustomResourceOptions): RepositoryConfAnalysis@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        alert_on_violation: Optional[bool] = None,
        block_on_violation: Optional[bool] = None,
        comment_annotation_groups: Optional[Sequence[str]] = None,
        disable_filter_analysis: Optional[bool] = None,
        disable_pre_configured_alerts: Optional[bool] = None,
        enable_data_masking: Optional[bool] = None,
        enable_dataset_rewrites: Optional[bool] = None,
        log_groups: Optional[Sequence[str]] = None,
        mask_all_occurrences: Optional[bool] = None,
        redact: Optional[str] = None,
        repository_id: Optional[str] = None) -> RepositoryConfAnalysisfunc GetRepositoryConfAnalysis(ctx *Context, name string, id IDInput, state *RepositoryConfAnalysisState, opts ...ResourceOption) (*RepositoryConfAnalysis, error)public static RepositoryConfAnalysis Get(string name, Input<string> id, RepositoryConfAnalysisState? state, CustomResourceOptions? opts = null)public static RepositoryConfAnalysis get(String name, Output<String> id, RepositoryConfAnalysisState state, CustomResourceOptions options)resources:  _:    type: cyral:RepositoryConfAnalysis    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AlertOn boolViolation 
- If set to trueit will enable alert on policy violations.
- BlockOn boolViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- CommentAnnotation List<string>Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- DisableFilter boolAnalysis 
- If set to trueit will disable filter analysis.
- DisablePre boolConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- EnableData boolMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- EnableDataset boolRewrites 
- If set to trueit will enable rewriting queries.
- LogGroups List<string>
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- MaskAll boolOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- Redact string
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- RepositoryId string
- The ID of an existing data repository resource that will be configured.
- AlertOn boolViolation 
- If set to trueit will enable alert on policy violations.
- BlockOn boolViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- CommentAnnotation []stringGroups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- DisableFilter boolAnalysis 
- If set to trueit will disable filter analysis.
- DisablePre boolConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- EnableData boolMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- EnableDataset boolRewrites 
- If set to trueit will enable rewriting queries.
- LogGroups []string
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- MaskAll boolOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- Redact string
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- RepositoryId string
- The ID of an existing data repository resource that will be configured.
- alertOn BooleanViolation 
- If set to trueit will enable alert on policy violations.
- blockOn BooleanViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- commentAnnotation List<String>Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disableFilter BooleanAnalysis 
- If set to trueit will disable filter analysis.
- disablePre BooleanConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- enableData BooleanMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enableDataset BooleanRewrites 
- If set to trueit will enable rewriting queries.
- logGroups List<String>
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- maskAll BooleanOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact String
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repositoryId String
- The ID of an existing data repository resource that will be configured.
- alertOn booleanViolation 
- If set to trueit will enable alert on policy violations.
- blockOn booleanViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- commentAnnotation string[]Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disableFilter booleanAnalysis 
- If set to trueit will disable filter analysis.
- disablePre booleanConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- enableData booleanMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enableDataset booleanRewrites 
- If set to trueit will enable rewriting queries.
- logGroups string[]
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- maskAll booleanOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact string
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repositoryId string
- The ID of an existing data repository resource that will be configured.
- alert_on_ boolviolation 
- If set to trueit will enable alert on policy violations.
- block_on_ boolviolation 
- If set to trueit will enable query blocking in case of a policy violation.
- comment_annotation_ Sequence[str]groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disable_filter_ boolanalysis 
- If set to trueit will disable filter analysis.
- disable_pre_ boolconfigured_ alerts 
- If set to trueit will disable preconfigured alerts.
- enable_data_ boolmasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enable_dataset_ boolrewrites 
- If set to trueit will enable rewriting queries.
- log_groups Sequence[str]
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- mask_all_ booloccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact str
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repository_id str
- The ID of an existing data repository resource that will be configured.
- alertOn BooleanViolation 
- If set to trueit will enable alert on policy violations.
- blockOn BooleanViolation 
- If set to trueit will enable query blocking in case of a policy violation.
- commentAnnotation List<String>Groups 
- Valid values are: identity,client,repo,sidecar. The default behavior is to set only theidentitywhen this option is enabled, but you can also opt to add the contents ofclient,repo,sidecarlogging blocks as query comments. Learn more.
- disableFilter BooleanAnalysis 
- If set to trueit will disable filter analysis.
- disablePre BooleanConfigured Alerts 
- If set to trueit will disable preconfigured alerts.
- enableData BooleanMasking 
- If set to trueit will allow policies to force the masking of specified data fields in the results of queries. Learn more.
- enableDataset BooleanRewrites 
- If set to trueit will enable rewriting queries.
- logGroups List<String>
- Responsible for configuring the Log Settings. Valid values are documented below. The log_groupslist support the following values: -everything- Enables all the Log Settings. -dql- Enables theDQLssetting forall requests. -dml- Enables theDMLssetting forall requests. -ddl- Enables theDDLssetting forall requests. -sensitive & dql- Enables theDQLssetting forlogged fields. -sensitive & dml- Enables theDMLssetting forlogged fields. -sensitive & ddl- Enables theDDLssetting forlogged fields. -privileged- Enables the Privileged commandssetting. -port-scan- Enables thePort scanssetting. -auth-failure- Enables theAuthentication failuressetting. -full-table-scan- Enables theFull scanssetting. -violations- Enables thePolicy violationssetting. -connections- Enables theConnection activitysetting. -sensitive- Log all queries manipulating sensitive fields (watches) -data-classification- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit- Logsensitive,DQLs,DDLs,DMLsandprivileged. -error- Log analysis errors. -new-connections- Log new connections. -closed-connections- Log closed connections.
 
- Enables the 
- maskAll BooleanOccurrences 
- If set to trueit will also mask filtering conditions like inWHERE,HAVINGorONclauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=trueto use this feature.
- redact String
- Valid values are: all,noneandwatched. If set toallit will enable the redact of all literal values,nonewill disable it, andwatchedwill only redact values from tracked fields set in the Datamap.
- repositoryId String
- The ID of an existing data repository resource that will be configured.
Package Details
- Repository
- cyral cyralinc/terraform-provider-cyral
- License
- Notes
- This Pulumi package is based on the cyralTerraform Provider.