cyral.RepositoryConfAnalysis
Explore with Pulumi AI
Manages Repository Analysis Configuration. This resource allows configuring Data Activity Logs, Alerts and Policy Enforcement settings for Data Repositories.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cyral from "@pulumi/cyral";
//## All Config enabled
const allConfAnalysisEnabled = new cyral.RepositoryConfAnalysis("allConfAnalysisEnabled", {
repositoryId: cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id,
redact: "all",
alertOnViolation: true,
disablePreConfiguredAlerts: false,
blockOnViolation: true,
disableFilterAnalysis: false,
enableDatasetRewrites: true,
enableDataMasking: true,
maskAllOccurrences: true,
commentAnnotationGroups: ["identity"],
logGroups: ["everything"],
});
//## All Config disabled
const allConfAnalysisDisabled = new cyral.RepositoryConfAnalysis("allConfAnalysisDisabled", {
repositoryId: cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id,
redact: "none",
alertOnViolation: false,
disablePreConfiguredAlerts: true,
blockOnViolation: false,
disableFilterAnalysis: true,
enableDatasetRewrites: false,
enableDataMasking: false,
maskAllOccurrences: false,
commentAnnotationGroups: [],
logGroups: [],
});
import pulumi
import pulumi_cyral as cyral
### All Config enabled
all_conf_analysis_enabled = cyral.RepositoryConfAnalysis("allConfAnalysisEnabled",
repository_id=cyral_repository["SOME_REPOSITORY_RESOURCE_NAME"]["id"],
redact="all",
alert_on_violation=True,
disable_pre_configured_alerts=False,
block_on_violation=True,
disable_filter_analysis=False,
enable_dataset_rewrites=True,
enable_data_masking=True,
mask_all_occurrences=True,
comment_annotation_groups=["identity"],
log_groups=["everything"])
### All Config disabled
all_conf_analysis_disabled = cyral.RepositoryConfAnalysis("allConfAnalysisDisabled",
repository_id=cyral_repository["SOME_REPOSITORY_RESOURCE_NAME"]["id"],
redact="none",
alert_on_violation=False,
disable_pre_configured_alerts=True,
block_on_violation=False,
disable_filter_analysis=True,
enable_dataset_rewrites=False,
enable_data_masking=False,
mask_all_occurrences=False,
comment_annotation_groups=[],
log_groups=[])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/cyral/v4/cyral"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// ## All Config enabled
_, err := cyral.NewRepositoryConfAnalysis(ctx, "allConfAnalysisEnabled", &cyral.RepositoryConfAnalysisArgs{
RepositoryId: pulumi.Any(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id),
Redact: pulumi.String("all"),
AlertOnViolation: pulumi.Bool(true),
DisablePreConfiguredAlerts: pulumi.Bool(false),
BlockOnViolation: pulumi.Bool(true),
DisableFilterAnalysis: pulumi.Bool(false),
EnableDatasetRewrites: pulumi.Bool(true),
EnableDataMasking: pulumi.Bool(true),
MaskAllOccurrences: pulumi.Bool(true),
CommentAnnotationGroups: pulumi.StringArray{
pulumi.String("identity"),
},
LogGroups: pulumi.StringArray{
pulumi.String("everything"),
},
})
if err != nil {
return err
}
// ## All Config disabled
_, err = cyral.NewRepositoryConfAnalysis(ctx, "allConfAnalysisDisabled", &cyral.RepositoryConfAnalysisArgs{
RepositoryId: pulumi.Any(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id),
Redact: pulumi.String("none"),
AlertOnViolation: pulumi.Bool(false),
DisablePreConfiguredAlerts: pulumi.Bool(true),
BlockOnViolation: pulumi.Bool(false),
DisableFilterAnalysis: pulumi.Bool(true),
EnableDatasetRewrites: pulumi.Bool(false),
EnableDataMasking: pulumi.Bool(false),
MaskAllOccurrences: pulumi.Bool(false),
CommentAnnotationGroups: pulumi.StringArray{},
LogGroups: pulumi.StringArray{},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cyral = Pulumi.Cyral;
return await Deployment.RunAsync(() =>
{
//## All Config enabled
var allConfAnalysisEnabled = new Cyral.RepositoryConfAnalysis("allConfAnalysisEnabled", new()
{
RepositoryId = cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id,
Redact = "all",
AlertOnViolation = true,
DisablePreConfiguredAlerts = false,
BlockOnViolation = true,
DisableFilterAnalysis = false,
EnableDatasetRewrites = true,
EnableDataMasking = true,
MaskAllOccurrences = true,
CommentAnnotationGroups = new[]
{
"identity",
},
LogGroups = new[]
{
"everything",
},
});
//## All Config disabled
var allConfAnalysisDisabled = new Cyral.RepositoryConfAnalysis("allConfAnalysisDisabled", new()
{
RepositoryId = cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.Id,
Redact = "none",
AlertOnViolation = false,
DisablePreConfiguredAlerts = true,
BlockOnViolation = false,
DisableFilterAnalysis = true,
EnableDatasetRewrites = false,
EnableDataMasking = false,
MaskAllOccurrences = false,
CommentAnnotationGroups = new[] {},
LogGroups = new[] {},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cyral.RepositoryConfAnalysis;
import com.pulumi.cyral.RepositoryConfAnalysisArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
//## All Config enabled
var allConfAnalysisEnabled = new RepositoryConfAnalysis("allConfAnalysisEnabled", RepositoryConfAnalysisArgs.builder()
.repositoryId(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME().id())
.redact("all")
.alertOnViolation(true)
.disablePreConfiguredAlerts(false)
.blockOnViolation(true)
.disableFilterAnalysis(false)
.enableDatasetRewrites(true)
.enableDataMasking(true)
.maskAllOccurrences(true)
.commentAnnotationGroups("identity")
.logGroups("everything")
.build());
//## All Config disabled
var allConfAnalysisDisabled = new RepositoryConfAnalysis("allConfAnalysisDisabled", RepositoryConfAnalysisArgs.builder()
.repositoryId(cyral_repository.SOME_REPOSITORY_RESOURCE_NAME().id())
.redact("none")
.alertOnViolation(false)
.disablePreConfiguredAlerts(true)
.blockOnViolation(false)
.disableFilterAnalysis(true)
.enableDatasetRewrites(false)
.enableDataMasking(false)
.maskAllOccurrences(false)
.commentAnnotationGroups()
.logGroups()
.build());
}
}
resources:
### All Config enabled
allConfAnalysisEnabled:
type: cyral:RepositoryConfAnalysis
properties:
repositoryId: ${cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id}
redact: all
alertOnViolation: true
disablePreConfiguredAlerts: false
blockOnViolation: true
disableFilterAnalysis: false
enableDatasetRewrites: true
enableDataMasking: true
maskAllOccurrences: true
commentAnnotationGroups:
- identity
logGroups:
- everything
### All Config disabled
allConfAnalysisDisabled:
type: cyral:RepositoryConfAnalysis
properties:
repositoryId: ${cyral_repository.SOME_REPOSITORY_RESOURCE_NAME.id}
redact: none
alertOnViolation: false
disablePreConfiguredAlerts: true
blockOnViolation: false
disableFilterAnalysis: true
enableDatasetRewrites: false
enableDataMasking: false
maskAllOccurrences: false
commentAnnotationGroups: []
logGroups: []
Create RepositoryConfAnalysis Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new RepositoryConfAnalysis(name: string, args: RepositoryConfAnalysisArgs, opts?: CustomResourceOptions);
@overload
def RepositoryConfAnalysis(resource_name: str,
args: RepositoryConfAnalysisArgs,
opts: Optional[ResourceOptions] = None)
@overload
def RepositoryConfAnalysis(resource_name: str,
opts: Optional[ResourceOptions] = None,
repository_id: Optional[str] = None,
alert_on_violation: Optional[bool] = None,
block_on_violation: Optional[bool] = None,
comment_annotation_groups: Optional[Sequence[str]] = None,
disable_filter_analysis: Optional[bool] = None,
disable_pre_configured_alerts: Optional[bool] = None,
enable_data_masking: Optional[bool] = None,
enable_dataset_rewrites: Optional[bool] = None,
log_groups: Optional[Sequence[str]] = None,
mask_all_occurrences: Optional[bool] = None,
redact: Optional[str] = None)
func NewRepositoryConfAnalysis(ctx *Context, name string, args RepositoryConfAnalysisArgs, opts ...ResourceOption) (*RepositoryConfAnalysis, error)
public RepositoryConfAnalysis(string name, RepositoryConfAnalysisArgs args, CustomResourceOptions? opts = null)
public RepositoryConfAnalysis(String name, RepositoryConfAnalysisArgs args)
public RepositoryConfAnalysis(String name, RepositoryConfAnalysisArgs args, CustomResourceOptions options)
type: cyral:RepositoryConfAnalysis
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args RepositoryConfAnalysisArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var repositoryConfAnalysisResource = new Cyral.RepositoryConfAnalysis("repositoryConfAnalysisResource", new()
{
RepositoryId = "string",
AlertOnViolation = false,
BlockOnViolation = false,
CommentAnnotationGroups = new[]
{
"string",
},
DisableFilterAnalysis = false,
DisablePreConfiguredAlerts = false,
EnableDataMasking = false,
EnableDatasetRewrites = false,
LogGroups = new[]
{
"string",
},
MaskAllOccurrences = false,
Redact = "string",
});
example, err := cyral.NewRepositoryConfAnalysis(ctx, "repositoryConfAnalysisResource", &cyral.RepositoryConfAnalysisArgs{
RepositoryId: pulumi.String("string"),
AlertOnViolation: pulumi.Bool(false),
BlockOnViolation: pulumi.Bool(false),
CommentAnnotationGroups: pulumi.StringArray{
pulumi.String("string"),
},
DisableFilterAnalysis: pulumi.Bool(false),
DisablePreConfiguredAlerts: pulumi.Bool(false),
EnableDataMasking: pulumi.Bool(false),
EnableDatasetRewrites: pulumi.Bool(false),
LogGroups: pulumi.StringArray{
pulumi.String("string"),
},
MaskAllOccurrences: pulumi.Bool(false),
Redact: pulumi.String("string"),
})
var repositoryConfAnalysisResource = new RepositoryConfAnalysis("repositoryConfAnalysisResource", RepositoryConfAnalysisArgs.builder()
.repositoryId("string")
.alertOnViolation(false)
.blockOnViolation(false)
.commentAnnotationGroups("string")
.disableFilterAnalysis(false)
.disablePreConfiguredAlerts(false)
.enableDataMasking(false)
.enableDatasetRewrites(false)
.logGroups("string")
.maskAllOccurrences(false)
.redact("string")
.build());
repository_conf_analysis_resource = cyral.RepositoryConfAnalysis("repositoryConfAnalysisResource",
repository_id="string",
alert_on_violation=False,
block_on_violation=False,
comment_annotation_groups=["string"],
disable_filter_analysis=False,
disable_pre_configured_alerts=False,
enable_data_masking=False,
enable_dataset_rewrites=False,
log_groups=["string"],
mask_all_occurrences=False,
redact="string")
const repositoryConfAnalysisResource = new cyral.RepositoryConfAnalysis("repositoryConfAnalysisResource", {
repositoryId: "string",
alertOnViolation: false,
blockOnViolation: false,
commentAnnotationGroups: ["string"],
disableFilterAnalysis: false,
disablePreConfiguredAlerts: false,
enableDataMasking: false,
enableDatasetRewrites: false,
logGroups: ["string"],
maskAllOccurrences: false,
redact: "string",
});
type: cyral:RepositoryConfAnalysis
properties:
alertOnViolation: false
blockOnViolation: false
commentAnnotationGroups:
- string
disableFilterAnalysis: false
disablePreConfiguredAlerts: false
enableDataMasking: false
enableDatasetRewrites: false
logGroups:
- string
maskAllOccurrences: false
redact: string
repositoryId: string
RepositoryConfAnalysis Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The RepositoryConfAnalysis resource accepts the following input properties:
- Repository
Id string - The ID of an existing data repository resource that will be configured.
- Alert
On boolViolation - If set to
true
it will enable alert on policy violations. - Block
On boolViolation - If set to
true
it will enable query blocking in case of a policy violation. - Comment
Annotation List<string>Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - Disable
Filter boolAnalysis - If set to
true
it will disable filter analysis. - Disable
Pre boolConfigured Alerts - If set to
true
it will disable preconfigured alerts. - Enable
Data boolMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - Enable
Dataset boolRewrites - If set to
true
it will enable rewriting queries. - Log
Groups List<string> - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- Mask
All boolOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - Redact string
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap.
- Repository
Id string - The ID of an existing data repository resource that will be configured.
- Alert
On boolViolation - If set to
true
it will enable alert on policy violations. - Block
On boolViolation - If set to
true
it will enable query blocking in case of a policy violation. - Comment
Annotation []stringGroups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - Disable
Filter boolAnalysis - If set to
true
it will disable filter analysis. - Disable
Pre boolConfigured Alerts - If set to
true
it will disable preconfigured alerts. - Enable
Data boolMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - Enable
Dataset boolRewrites - If set to
true
it will enable rewriting queries. - Log
Groups []string - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- Mask
All boolOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - Redact string
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap.
- repository
Id String - The ID of an existing data repository resource that will be configured.
- alert
On BooleanViolation - If set to
true
it will enable alert on policy violations. - block
On BooleanViolation - If set to
true
it will enable query blocking in case of a policy violation. - comment
Annotation List<String>Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable
Filter BooleanAnalysis - If set to
true
it will disable filter analysis. - disable
Pre BooleanConfigured Alerts - If set to
true
it will disable preconfigured alerts. - enable
Data BooleanMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable
Dataset BooleanRewrites - If set to
true
it will enable rewriting queries. - log
Groups List<String> - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask
All BooleanOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact String
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap.
- repository
Id string - The ID of an existing data repository resource that will be configured.
- alert
On booleanViolation - If set to
true
it will enable alert on policy violations. - block
On booleanViolation - If set to
true
it will enable query blocking in case of a policy violation. - comment
Annotation string[]Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable
Filter booleanAnalysis - If set to
true
it will disable filter analysis. - disable
Pre booleanConfigured Alerts - If set to
true
it will disable preconfigured alerts. - enable
Data booleanMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable
Dataset booleanRewrites - If set to
true
it will enable rewriting queries. - log
Groups string[] - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask
All booleanOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact string
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap.
- repository_
id str - The ID of an existing data repository resource that will be configured.
- alert_
on_ boolviolation - If set to
true
it will enable alert on policy violations. - block_
on_ boolviolation - If set to
true
it will enable query blocking in case of a policy violation. - comment_
annotation_ Sequence[str]groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable_
filter_ boolanalysis - If set to
true
it will disable filter analysis. - disable_
pre_ boolconfigured_ alerts - If set to
true
it will disable preconfigured alerts. - enable_
data_ boolmasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable_
dataset_ boolrewrites - If set to
true
it will enable rewriting queries. - log_
groups Sequence[str] - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask_
all_ booloccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact str
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap.
- repository
Id String - The ID of an existing data repository resource that will be configured.
- alert
On BooleanViolation - If set to
true
it will enable alert on policy violations. - block
On BooleanViolation - If set to
true
it will enable query blocking in case of a policy violation. - comment
Annotation List<String>Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable
Filter BooleanAnalysis - If set to
true
it will disable filter analysis. - disable
Pre BooleanConfigured Alerts - If set to
true
it will disable preconfigured alerts. - enable
Data BooleanMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable
Dataset BooleanRewrites - If set to
true
it will enable rewriting queries. - log
Groups List<String> - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask
All BooleanOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact String
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap.
Outputs
All input properties are implicitly available as output properties. Additionally, the RepositoryConfAnalysis resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing RepositoryConfAnalysis Resource
Get an existing RepositoryConfAnalysis resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: RepositoryConfAnalysisState, opts?: CustomResourceOptions): RepositoryConfAnalysis
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
alert_on_violation: Optional[bool] = None,
block_on_violation: Optional[bool] = None,
comment_annotation_groups: Optional[Sequence[str]] = None,
disable_filter_analysis: Optional[bool] = None,
disable_pre_configured_alerts: Optional[bool] = None,
enable_data_masking: Optional[bool] = None,
enable_dataset_rewrites: Optional[bool] = None,
log_groups: Optional[Sequence[str]] = None,
mask_all_occurrences: Optional[bool] = None,
redact: Optional[str] = None,
repository_id: Optional[str] = None) -> RepositoryConfAnalysis
func GetRepositoryConfAnalysis(ctx *Context, name string, id IDInput, state *RepositoryConfAnalysisState, opts ...ResourceOption) (*RepositoryConfAnalysis, error)
public static RepositoryConfAnalysis Get(string name, Input<string> id, RepositoryConfAnalysisState? state, CustomResourceOptions? opts = null)
public static RepositoryConfAnalysis get(String name, Output<String> id, RepositoryConfAnalysisState state, CustomResourceOptions options)
resources: _: type: cyral:RepositoryConfAnalysis get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Alert
On boolViolation - If set to
true
it will enable alert on policy violations. - Block
On boolViolation - If set to
true
it will enable query blocking in case of a policy violation. - Comment
Annotation List<string>Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - Disable
Filter boolAnalysis - If set to
true
it will disable filter analysis. - Disable
Pre boolConfigured Alerts - If set to
true
it will disable preconfigured alerts. - Enable
Data boolMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - Enable
Dataset boolRewrites - If set to
true
it will enable rewriting queries. - Log
Groups List<string> - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- Mask
All boolOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - Redact string
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap. - Repository
Id string - The ID of an existing data repository resource that will be configured.
- Alert
On boolViolation - If set to
true
it will enable alert on policy violations. - Block
On boolViolation - If set to
true
it will enable query blocking in case of a policy violation. - Comment
Annotation []stringGroups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - Disable
Filter boolAnalysis - If set to
true
it will disable filter analysis. - Disable
Pre boolConfigured Alerts - If set to
true
it will disable preconfigured alerts. - Enable
Data boolMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - Enable
Dataset boolRewrites - If set to
true
it will enable rewriting queries. - Log
Groups []string - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- Mask
All boolOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - Redact string
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap. - Repository
Id string - The ID of an existing data repository resource that will be configured.
- alert
On BooleanViolation - If set to
true
it will enable alert on policy violations. - block
On BooleanViolation - If set to
true
it will enable query blocking in case of a policy violation. - comment
Annotation List<String>Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable
Filter BooleanAnalysis - If set to
true
it will disable filter analysis. - disable
Pre BooleanConfigured Alerts - If set to
true
it will disable preconfigured alerts. - enable
Data BooleanMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable
Dataset BooleanRewrites - If set to
true
it will enable rewriting queries. - log
Groups List<String> - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask
All BooleanOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact String
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap. - repository
Id String - The ID of an existing data repository resource that will be configured.
- alert
On booleanViolation - If set to
true
it will enable alert on policy violations. - block
On booleanViolation - If set to
true
it will enable query blocking in case of a policy violation. - comment
Annotation string[]Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable
Filter booleanAnalysis - If set to
true
it will disable filter analysis. - disable
Pre booleanConfigured Alerts - If set to
true
it will disable preconfigured alerts. - enable
Data booleanMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable
Dataset booleanRewrites - If set to
true
it will enable rewriting queries. - log
Groups string[] - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask
All booleanOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact string
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap. - repository
Id string - The ID of an existing data repository resource that will be configured.
- alert_
on_ boolviolation - If set to
true
it will enable alert on policy violations. - block_
on_ boolviolation - If set to
true
it will enable query blocking in case of a policy violation. - comment_
annotation_ Sequence[str]groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable_
filter_ boolanalysis - If set to
true
it will disable filter analysis. - disable_
pre_ boolconfigured_ alerts - If set to
true
it will disable preconfigured alerts. - enable_
data_ boolmasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable_
dataset_ boolrewrites - If set to
true
it will enable rewriting queries. - log_
groups Sequence[str] - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask_
all_ booloccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact str
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap. - repository_
id str - The ID of an existing data repository resource that will be configured.
- alert
On BooleanViolation - If set to
true
it will enable alert on policy violations. - block
On BooleanViolation - If set to
true
it will enable query blocking in case of a policy violation. - comment
Annotation List<String>Groups - Valid values are:
identity
,client
,repo
,sidecar
. The default behavior is to set only theidentity
when this option is enabled, but you can also opt to add the contents ofclient
,repo
,sidecar
logging blocks as query comments. Learn more. - disable
Filter BooleanAnalysis - If set to
true
it will disable filter analysis. - disable
Pre BooleanConfigured Alerts - If set to
true
it will disable preconfigured alerts. - enable
Data BooleanMasking - If set to
true
it will allow policies to force the masking of specified data fields in the results of queries. Learn more. - enable
Dataset BooleanRewrites - If set to
true
it will enable rewriting queries. - log
Groups List<String> - Responsible for configuring the Log Settings. Valid values are documented below. The
log_groups
list support the following values: -everything
- Enables all the Log Settings. -dql
- Enables theDQLs
setting forall requests
. -dml
- Enables theDMLs
setting forall requests
. -ddl
- Enables theDDLs
setting forall requests
. -sensitive & dql
- Enables theDQLs
setting forlogged fields
. -sensitive & dml
- Enables theDMLs
setting forlogged fields
. -sensitive & ddl
- Enables theDDLs
setting forlogged fields
. -privileged
- Enables the
Privileged commands
setting. -port-scan
- Enables thePort scans
setting. -auth-failure
- Enables theAuthentication failures
setting. -full-table-scan
- Enables theFull scans
setting. -violations
- Enables thePolicy violations
setting. -connections
- Enables theConnection activity
setting. -sensitive
- Log all queries manipulating sensitive fields (watches) -data-classification
- Log all queries whose response was automatically classified as sensitive (credit card numbers, emails and so on). -audit
- Logsensitive
,DQLs
,DDLs
,DMLs
andprivileged
. -error
- Log analysis errors. -new-connections
- Log new connections. -closed-connections
- Log closed connections.
- Enables the
- mask
All BooleanOccurrences - If set to
true
it will also mask filtering conditions like inWHERE
,HAVING
orON
clauses. Note: Enabling this may cause some performance degradation on large tables. It is required to setenable_data_masking=true
to use this feature. - redact String
- Valid values are:
all
,none
andwatched
. If set toall
it will enable the redact of all literal values,none
will disable it, andwatched
will only redact values from tracked fields set in the Datamap. - repository
Id String - The ID of an existing data repository resource that will be configured.
Package Details
- Repository
- cyral cyralinc/terraform-provider-cyral
- License
- Notes
- This Pulumi package is based on the
cyral
Terraform Provider.