oci.DataSafe.getSqlFirewallViolationAnalytics
Explore with Pulumi AI
This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
Returns the aggregation details of the SQL Firewall violations.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSqlFirewallViolationAnalytics = oci.DataSafe.getSqlFirewallViolationAnalytics({
    compartmentId: compartmentId,
    accessLevel: sqlFirewallViolationAnalyticAccessLevel,
    compartmentIdInSubtree: sqlFirewallViolationAnalyticCompartmentIdInSubtree,
    groupBies: sqlFirewallViolationAnalyticGroupBy,
    queryTimeZone: sqlFirewallViolationAnalyticQueryTimeZone,
    scimQuery: sqlFirewallViolationAnalyticScimQuery,
    summaryFields: sqlFirewallViolationAnalyticSummaryField,
    timeEnded: sqlFirewallViolationAnalyticTimeEnded,
    timeStarted: sqlFirewallViolationAnalyticTimeStarted,
});
import pulumi
import pulumi_oci as oci
test_sql_firewall_violation_analytics = oci.DataSafe.get_sql_firewall_violation_analytics(compartment_id=compartment_id,
    access_level=sql_firewall_violation_analytic_access_level,
    compartment_id_in_subtree=sql_firewall_violation_analytic_compartment_id_in_subtree,
    group_bies=sql_firewall_violation_analytic_group_by,
    query_time_zone=sql_firewall_violation_analytic_query_time_zone,
    scim_query=sql_firewall_violation_analytic_scim_query,
    summary_fields=sql_firewall_violation_analytic_summary_field,
    time_ended=sql_firewall_violation_analytic_time_ended,
    time_started=sql_firewall_violation_analytic_time_started)
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/datasafe"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := datasafe.GetSqlFirewallViolationAnalytics(ctx, &datasafe.GetSqlFirewallViolationAnalyticsArgs{
			CompartmentId:          compartmentId,
			AccessLevel:            pulumi.StringRef(sqlFirewallViolationAnalyticAccessLevel),
			CompartmentIdInSubtree: pulumi.BoolRef(sqlFirewallViolationAnalyticCompartmentIdInSubtree),
			GroupBies:              sqlFirewallViolationAnalyticGroupBy,
			QueryTimeZone:          pulumi.StringRef(sqlFirewallViolationAnalyticQueryTimeZone),
			ScimQuery:              pulumi.StringRef(sqlFirewallViolationAnalyticScimQuery),
			SummaryFields:          sqlFirewallViolationAnalyticSummaryField,
			TimeEnded:              pulumi.StringRef(sqlFirewallViolationAnalyticTimeEnded),
			TimeStarted:            pulumi.StringRef(sqlFirewallViolationAnalyticTimeStarted),
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testSqlFirewallViolationAnalytics = Oci.DataSafe.GetSqlFirewallViolationAnalytics.Invoke(new()
    {
        CompartmentId = compartmentId,
        AccessLevel = sqlFirewallViolationAnalyticAccessLevel,
        CompartmentIdInSubtree = sqlFirewallViolationAnalyticCompartmentIdInSubtree,
        GroupBies = sqlFirewallViolationAnalyticGroupBy,
        QueryTimeZone = sqlFirewallViolationAnalyticQueryTimeZone,
        ScimQuery = sqlFirewallViolationAnalyticScimQuery,
        SummaryFields = sqlFirewallViolationAnalyticSummaryField,
        TimeEnded = sqlFirewallViolationAnalyticTimeEnded,
        TimeStarted = sqlFirewallViolationAnalyticTimeStarted,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.DataSafe.DataSafeFunctions;
import com.pulumi.oci.DataSafe.inputs.GetSqlFirewallViolationAnalyticsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testSqlFirewallViolationAnalytics = DataSafeFunctions.getSqlFirewallViolationAnalytics(GetSqlFirewallViolationAnalyticsArgs.builder()
            .compartmentId(compartmentId)
            .accessLevel(sqlFirewallViolationAnalyticAccessLevel)
            .compartmentIdInSubtree(sqlFirewallViolationAnalyticCompartmentIdInSubtree)
            .groupBies(sqlFirewallViolationAnalyticGroupBy)
            .queryTimeZone(sqlFirewallViolationAnalyticQueryTimeZone)
            .scimQuery(sqlFirewallViolationAnalyticScimQuery)
            .summaryFields(sqlFirewallViolationAnalyticSummaryField)
            .timeEnded(sqlFirewallViolationAnalyticTimeEnded)
            .timeStarted(sqlFirewallViolationAnalyticTimeStarted)
            .build());
    }
}
variables:
  testSqlFirewallViolationAnalytics:
    fn::invoke:
      function: oci:DataSafe:getSqlFirewallViolationAnalytics
      arguments:
        compartmentId: ${compartmentId}
        accessLevel: ${sqlFirewallViolationAnalyticAccessLevel}
        compartmentIdInSubtree: ${sqlFirewallViolationAnalyticCompartmentIdInSubtree}
        groupBies: ${sqlFirewallViolationAnalyticGroupBy}
        queryTimeZone: ${sqlFirewallViolationAnalyticQueryTimeZone}
        scimQuery: ${sqlFirewallViolationAnalyticScimQuery}
        summaryFields: ${sqlFirewallViolationAnalyticSummaryField}
        timeEnded: ${sqlFirewallViolationAnalyticTimeEnded}
        timeStarted: ${sqlFirewallViolationAnalyticTimeStarted}
Using getSqlFirewallViolationAnalytics
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSqlFirewallViolationAnalytics(args: GetSqlFirewallViolationAnalyticsArgs, opts?: InvokeOptions): Promise<GetSqlFirewallViolationAnalyticsResult>
function getSqlFirewallViolationAnalyticsOutput(args: GetSqlFirewallViolationAnalyticsOutputArgs, opts?: InvokeOptions): Output<GetSqlFirewallViolationAnalyticsResult>def get_sql_firewall_violation_analytics(access_level: Optional[str] = None,
                                         compartment_id: Optional[str] = None,
                                         compartment_id_in_subtree: Optional[bool] = None,
                                         filters: Optional[Sequence[GetSqlFirewallViolationAnalyticsFilter]] = None,
                                         group_bies: Optional[Sequence[str]] = None,
                                         query_time_zone: Optional[str] = None,
                                         scim_query: Optional[str] = None,
                                         summary_fields: Optional[Sequence[str]] = None,
                                         time_ended: Optional[str] = None,
                                         time_started: Optional[str] = None,
                                         opts: Optional[InvokeOptions] = None) -> GetSqlFirewallViolationAnalyticsResult
def get_sql_firewall_violation_analytics_output(access_level: Optional[pulumi.Input[str]] = None,
                                         compartment_id: Optional[pulumi.Input[str]] = None,
                                         compartment_id_in_subtree: Optional[pulumi.Input[bool]] = None,
                                         filters: Optional[pulumi.Input[Sequence[pulumi.Input[GetSqlFirewallViolationAnalyticsFilterArgs]]]] = None,
                                         group_bies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
                                         query_time_zone: Optional[pulumi.Input[str]] = None,
                                         scim_query: Optional[pulumi.Input[str]] = None,
                                         summary_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
                                         time_ended: Optional[pulumi.Input[str]] = None,
                                         time_started: Optional[pulumi.Input[str]] = None,
                                         opts: Optional[InvokeOptions] = None) -> Output[GetSqlFirewallViolationAnalyticsResult]func GetSqlFirewallViolationAnalytics(ctx *Context, args *GetSqlFirewallViolationAnalyticsArgs, opts ...InvokeOption) (*GetSqlFirewallViolationAnalyticsResult, error)
func GetSqlFirewallViolationAnalyticsOutput(ctx *Context, args *GetSqlFirewallViolationAnalyticsOutputArgs, opts ...InvokeOption) GetSqlFirewallViolationAnalyticsResultOutput> Note: This function is named GetSqlFirewallViolationAnalytics in the Go SDK.
public static class GetSqlFirewallViolationAnalytics 
{
    public static Task<GetSqlFirewallViolationAnalyticsResult> InvokeAsync(GetSqlFirewallViolationAnalyticsArgs args, InvokeOptions? opts = null)
    public static Output<GetSqlFirewallViolationAnalyticsResult> Invoke(GetSqlFirewallViolationAnalyticsInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetSqlFirewallViolationAnalyticsResult> getSqlFirewallViolationAnalytics(GetSqlFirewallViolationAnalyticsArgs args, InvokeOptions options)
public static Output<GetSqlFirewallViolationAnalyticsResult> getSqlFirewallViolationAnalytics(GetSqlFirewallViolationAnalyticsArgs args, InvokeOptions options)
fn::invoke:
  function: oci:DataSafe/getSqlFirewallViolationAnalytics:getSqlFirewallViolationAnalytics
  arguments:
    # arguments dictionaryThe following arguments are supported:
- CompartmentId string
- A filter to return only resources that match the specified compartment OCID.
- AccessLevel string
- Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- CompartmentId boolIn Subtree 
- Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Filters
List<GetSql Firewall Violation Analytics Filter> 
- GroupBies List<string>
- A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- QueryTime stringZone 
- Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- ScimQuery string
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED') 
- SummaryFields List<string>
- Specifies a subset of summarized fields to be returned in the response.
- TimeEnded string
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- TimeStarted string
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- CompartmentId string
- A filter to return only resources that match the specified compartment OCID.
- AccessLevel string
- Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- CompartmentId boolIn Subtree 
- Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Filters
[]GetSql Firewall Violation Analytics Filter 
- GroupBies []string
- A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- QueryTime stringZone 
- Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- ScimQuery string
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED') 
- SummaryFields []string
- Specifies a subset of summarized fields to be returned in the response.
- TimeEnded string
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- TimeStarted string
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartmentId String
- A filter to return only resources that match the specified compartment OCID.
- accessLevel String
- Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartmentId BooleanIn Subtree 
- Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
List<GetSql Firewall Violation Analytics Filter> 
- groupBies List<String>
- A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- queryTime StringZone 
- Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scimQuery String
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED') 
- summaryFields List<String>
- Specifies a subset of summarized fields to be returned in the response.
- timeEnded String
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- timeStarted String
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartmentId string
- A filter to return only resources that match the specified compartment OCID.
- accessLevel string
- Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartmentId booleanIn Subtree 
- Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
GetSql Firewall Violation Analytics Filter[] 
- groupBies string[]
- A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- queryTime stringZone 
- Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scimQuery string
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED') 
- summaryFields string[]
- Specifies a subset of summarized fields to be returned in the response.
- timeEnded string
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- timeStarted string
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartment_id str
- A filter to return only resources that match the specified compartment OCID.
- access_level str
- Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment_id_ boolin_ subtree 
- Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters
Sequence[GetSql Firewall Violation Analytics Filter] 
- group_bies Sequence[str]
- A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- query_time_ strzone 
- Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scim_query str
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED') 
- summary_fields Sequence[str]
- Specifies a subset of summarized fields to be returned in the response.
- time_ended str
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time_started str
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- compartmentId String
- A filter to return only resources that match the specified compartment OCID.
- accessLevel String
- Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartmentId BooleanIn Subtree 
- Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- filters List<Property Map>
- groupBies List<String>
- A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
- queryTime StringZone 
- Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
- scimQuery String
- The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.) - Example: query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED') 
- summaryFields List<String>
- Specifies a subset of summarized fields to be returned in the response.
- timeEnded String
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- timeStarted String
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
getSqlFirewallViolationAnalytics Result
The following output properties are available:
- CompartmentId string
- Id string
- The provider-assigned unique ID for this managed resource.
- SqlFirewall List<GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection> 
- The list of sql_firewall_violation_analytics_collection.
- AccessLevel string
- CompartmentId boolIn Subtree 
- Filters
List<GetSql Firewall Violation Analytics Filter> 
- GroupBies List<string>
- QueryTime stringZone 
- ScimQuery string
- SummaryFields List<string>
- TimeEnded string
- The time at which the aggregation ended.
- TimeStarted string
- The time at which the aggregation started.
- CompartmentId string
- Id string
- The provider-assigned unique ID for this managed resource.
- SqlFirewall []GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection 
- The list of sql_firewall_violation_analytics_collection.
- AccessLevel string
- CompartmentId boolIn Subtree 
- Filters
[]GetSql Firewall Violation Analytics Filter 
- GroupBies []string
- QueryTime stringZone 
- ScimQuery string
- SummaryFields []string
- TimeEnded string
- The time at which the aggregation ended.
- TimeStarted string
- The time at which the aggregation started.
- compartmentId String
- id String
- The provider-assigned unique ID for this managed resource.
- sqlFirewall List<GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection> 
- The list of sql_firewall_violation_analytics_collection.
- accessLevel String
- compartmentId BooleanIn Subtree 
- filters
List<GetSql Firewall Violation Analytics Filter> 
- groupBies List<String>
- queryTime StringZone 
- scimQuery String
- summaryFields List<String>
- timeEnded String
- The time at which the aggregation ended.
- timeStarted String
- The time at which the aggregation started.
- compartmentId string
- id string
- The provider-assigned unique ID for this managed resource.
- sqlFirewall GetViolation Analytics Collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection[] 
- The list of sql_firewall_violation_analytics_collection.
- accessLevel string
- compartmentId booleanIn Subtree 
- filters
GetSql Firewall Violation Analytics Filter[] 
- groupBies string[]
- queryTime stringZone 
- scimQuery string
- summaryFields string[]
- timeEnded string
- The time at which the aggregation ended.
- timeStarted string
- The time at which the aggregation started.
- compartment_id str
- id str
- The provider-assigned unique ID for this managed resource.
- sql_firewall_ Sequence[Getviolation_ analytics_ collections Sql Firewall Violation Analytics Sql Firewall Violation Analytics Collection] 
- The list of sql_firewall_violation_analytics_collection.
- access_level str
- compartment_id_ boolin_ subtree 
- filters
Sequence[GetSql Firewall Violation Analytics Filter] 
- group_bies Sequence[str]
- query_time_ strzone 
- scim_query str
- summary_fields Sequence[str]
- time_ended str
- The time at which the aggregation ended.
- time_started str
- The time at which the aggregation started.
- compartmentId String
- id String
- The provider-assigned unique ID for this managed resource.
- sqlFirewall List<Property Map>Violation Analytics Collections 
- The list of sql_firewall_violation_analytics_collection.
- accessLevel String
- compartmentId BooleanIn Subtree 
- filters List<Property Map>
- groupBies List<String>
- queryTime StringZone 
- scimQuery String
- summaryFields List<String>
- timeEnded String
- The time at which the aggregation ended.
- timeStarted String
- The time at which the aggregation started.
Supporting Types
GetSqlFirewallViolationAnalyticsFilter     
GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollection         
- Items
List<GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item> 
- The aggregated data point items.
- Items
[]GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item 
- The aggregated data point items.
- items
List<GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item> 
- The aggregated data point items.
- items
GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item[] 
- The aggregated data point items.
- items
Sequence[GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item] 
- The aggregated data point items.
- items List<Property Map>
- The aggregated data point items.
GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollectionItem          
- Dimensions
List<GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension> 
- The details of the aggregation dimensions used for summarizing SQL violations.
- DisplayName string
- The display name of aggregation field.
- MetricName string
- The name of the aggregation.
- SqlFirewall stringViolation Analytic Count 
- Total count of aggregated value.
- TimeEnded string
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- TimeStarted string
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- Dimensions
[]GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension 
- The details of the aggregation dimensions used for summarizing SQL violations.
- DisplayName string
- The display name of aggregation field.
- MetricName string
- The name of the aggregation.
- SqlFirewall stringViolation Analytic Count 
- Total count of aggregated value.
- TimeEnded string
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- TimeStarted string
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions
List<GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension> 
- The details of the aggregation dimensions used for summarizing SQL violations.
- displayName String
- The display name of aggregation field.
- metricName String
- The name of the aggregation.
- sqlFirewall StringViolation Analytic Count 
- Total count of aggregated value.
- timeEnded String
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- timeStarted String
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions
GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension[] 
- The details of the aggregation dimensions used for summarizing SQL violations.
- displayName string
- The display name of aggregation field.
- metricName string
- The name of the aggregation.
- sqlFirewall stringViolation Analytic Count 
- Total count of aggregated value.
- timeEnded string
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- timeStarted string
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions
Sequence[GetSql Firewall Violation Analytics Sql Firewall Violation Analytics Collection Item Dimension] 
- The details of the aggregation dimensions used for summarizing SQL violations.
- display_name str
- The display name of aggregation field.
- metric_name str
- The name of the aggregation.
- sql_firewall_ strviolation_ analytic_ count 
- Total count of aggregated value.
- time_ended str
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- time_started str
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
- dimensions List<Property Map>
- The details of the aggregation dimensions used for summarizing SQL violations.
- displayName String
- The display name of aggregation field.
- metricName String
- The name of the aggregation.
- sqlFirewall StringViolation Analytic Count 
- Total count of aggregated value.
- timeEnded String
- An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by RFC3339.
- timeStarted String
- An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by RFC3339.
GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollectionItemDimension           
- ClientIps List<string>
- The IP address of the host from which the session was spawned.
- ClientOs List<string>User Names 
- The name of the operating system user for the database session.
- ClientPrograms List<string>
- The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- DbUser List<string>Names 
- The name of the database user.
- OperationTimes List<string>
- The time of the SQL violation occurrence in the target database.
- Operations List<string>
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- SqlLevels List<string>
- Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- TargetIds List<string>
- The OCID of the target database.
- TargetNames List<string>
- The name of the target database.
- ViolationActions List<string>
- The action taken for this SQL violation.
- ViolationCauses List<string>
- Indicates whether SQL or context violation.
- ClientIps []string
- The IP address of the host from which the session was spawned.
- ClientOs []stringUser Names 
- The name of the operating system user for the database session.
- ClientPrograms []string
- The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- DbUser []stringNames 
- The name of the database user.
- OperationTimes []string
- The time of the SQL violation occurrence in the target database.
- Operations []string
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- SqlLevels []string
- Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- TargetIds []string
- The OCID of the target database.
- TargetNames []string
- The name of the target database.
- ViolationActions []string
- The action taken for this SQL violation.
- ViolationCauses []string
- Indicates whether SQL or context violation.
- clientIps List<String>
- The IP address of the host from which the session was spawned.
- clientOs List<String>User Names 
- The name of the operating system user for the database session.
- clientPrograms List<String>
- The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- dbUser List<String>Names 
- The name of the database user.
- operationTimes List<String>
- The time of the SQL violation occurrence in the target database.
- operations List<String>
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sqlLevels List<String>
- Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- targetIds List<String>
- The OCID of the target database.
- targetNames List<String>
- The name of the target database.
- violationActions List<String>
- The action taken for this SQL violation.
- violationCauses List<String>
- Indicates whether SQL or context violation.
- clientIps string[]
- The IP address of the host from which the session was spawned.
- clientOs string[]User Names 
- The name of the operating system user for the database session.
- clientPrograms string[]
- The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- dbUser string[]Names 
- The name of the database user.
- operationTimes string[]
- The time of the SQL violation occurrence in the target database.
- operations string[]
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sqlLevels string[]
- Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- targetIds string[]
- The OCID of the target database.
- targetNames string[]
- The name of the target database.
- violationActions string[]
- The action taken for this SQL violation.
- violationCauses string[]
- Indicates whether SQL or context violation.
- client_ips Sequence[str]
- The IP address of the host from which the session was spawned.
- client_os_ Sequence[str]user_ names 
- The name of the operating system user for the database session.
- client_programs Sequence[str]
- The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- db_user_ Sequence[str]names 
- The name of the database user.
- operation_times Sequence[str]
- The time of the SQL violation occurrence in the target database.
- operations Sequence[str]
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sql_levels Sequence[str]
- Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- target_ids Sequence[str]
- The OCID of the target database.
- target_names Sequence[str]
- The name of the target database.
- violation_actions Sequence[str]
- The action taken for this SQL violation.
- violation_causes Sequence[str]
- Indicates whether SQL or context violation.
- clientIps List<String>
- The IP address of the host from which the session was spawned.
- clientOs List<String>User Names 
- The name of the operating system user for the database session.
- clientPrograms List<String>
- The application from which the SQL violation was generated. Examples SQL Plus or SQL Developer.
- dbUser List<String>Names 
- The name of the database user.
- operationTimes List<String>
- The time of the SQL violation occurrence in the target database.
- operations List<String>
- The name of the action executed by the user on the target database, for example, ALTER, CREATE, DROP.
- sqlLevels List<String>
- Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
- targetIds List<String>
- The OCID of the target database.
- targetNames List<String>
- The name of the target database.
- violationActions List<String>
- The action taken for this SQL violation.
- violationCauses List<String>
- Indicates whether SQL or context violation.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.