AuditArgs

data class AuditArgs(val aliuid: Output<String>? = null, val displayName: Output<String>? = null, val multiAccounts: Output<List<String>>? = null, val resourceDirectoryType: Output<String>? = null, val variableMap: Output<Map<String, Any>>? = null) : ConvertibleToJava<AuditArgs>

SLS log audit exists in the form of log service app. In addition to inheriting all SLS functions, it also enhances the real-time automatic centralized collection of audit related logs across multi cloud products under multi accounts, and provides support for storage, query and information summary required by audit. It covers actiontrail, OSS, NAS, SLB, API gateway, RDS, WAF, cloud firewall, cloud security center and other products.

NOTE: Available since v1.81.0

Example Usage

Basic Usage

package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.alicloud.AlicloudFunctions;
import com.pulumi.alicloud.log.Audit;
import com.pulumi.alicloud.log.AuditArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var default = AlicloudFunctions.getAccount();
var example = new Audit("example", AuditArgs.builder()
.displayName("tf-audit-example")
.aliuid(default_.id())
.variableMap(Map.ofEntries(
Map.entry("actiontrail_enabled", "true"),
Map.entry("actiontrail_ttl", "180"),
Map.entry("oss_access_enabled", "true"),
Map.entry("oss_access_ttl", "7"),
Map.entry("oss_sync_enabled", "true"),
Map.entry("oss_sync_ttl", "180"),
Map.entry("oss_metering_enabled", "true"),
Map.entry("oss_metering_ttl", "180"),
Map.entry("rds_enabled", "true"),
Map.entry("rds_audit_collection_policy", ""),
Map.entry("rds_ttl", "180"),
Map.entry("rds_slow_enabled", "false"),
Map.entry("rds_slow_collection_policy", ""),
Map.entry("rds_slow_ttl", "180"),
Map.entry("rds_perf_enabled", "false"),
Map.entry("rds_perf_collection_policy", ""),
Map.entry("rds_perf_ttl", "180"),
Map.entry("vpc_flow_enabled", "false"),
Map.entry("vpc_flow_ttl", "7"),
Map.entry("vpc_flow_collection_policy", ""),
Map.entry("vpc_sync_enabled", "true"),
Map.entry("vpc_sync_ttl", "180"),
Map.entry("polardb_enabled", "true"),
Map.entry("polardb_audit_collection_policy", ""),
Map.entry("polardb_ttl", "180"),
Map.entry("polardb_slow_enabled", "false"),
Map.entry("polardb_slow_collection_policy", ""),
Map.entry("polardb_slow_ttl", "180"),
Map.entry("polardb_perf_enabled", "false"),
Map.entry("polardb_perf_collection_policy", ""),
Map.entry("polardb_perf_ttl", "180"),
Map.entry("drds_audit_enabled", "true"),
Map.entry("drds_audit_collection_policy", ""),
Map.entry("drds_audit_ttl", "7"),
Map.entry("drds_sync_enabled", "true"),
Map.entry("drds_sync_ttl", "180"),
Map.entry("slb_access_enabled", "true"),
Map.entry("slb_access_collection_policy", ""),
Map.entry("slb_access_ttl", "7"),
Map.entry("slb_sync_enabled", "true"),
Map.entry("slb_sync_ttl", "180"),
Map.entry("bastion_enabled", "true"),
Map.entry("bastion_ttl", "180"),
Map.entry("waf_enabled", "true"),
Map.entry("waf_ttl", "180"),
Map.entry("cloudfirewall_enabled", "true"),
Map.entry("cloudfirewall_ttl", "180"),
Map.entry("ddos_coo_access_enabled", "false"),
Map.entry("ddos_coo_access_ttl", "180"),
Map.entry("ddos_bgp_access_enabled", "false"),
Map.entry("ddos_bgp_access_ttl", "180"),
Map.entry("ddos_dip_access_enabled", "false"),
Map.entry("ddos_dip_access_ttl", "180"),
Map.entry("sas_crack_enabled", "true"),
Map.entry("sas_dns_enabled", "true"),
Map.entry("sas_http_enabled", "true"),
Map.entry("sas_local_dns_enabled", "true"),
Map.entry("sas_login_enabled", "true"),
Map.entry("sas_network_enabled", "true"),
Map.entry("sas_process_enabled", "true"),
Map.entry("sas_security_alert_enabled", "true"),
Map.entry("sas_security_hc_enabled", "true"),
Map.entry("sas_security_vul_enabled", "true"),
Map.entry("sas_session_enabled", "true"),
Map.entry("sas_snapshot_account_enabled", "true"),
Map.entry("sas_snapshot_port_enabled", "true"),
Map.entry("sas_snapshot_process_enabled", "true"),
Map.entry("sas_ttl", "180"),
Map.entry("apigateway_enabled", "true"),
Map.entry("apigateway_ttl", "180"),
Map.entry("nas_enabled", "true"),
Map.entry("nas_ttl", "180"),
Map.entry("appconnect_enabled", "false"),
Map.entry("appconnect_ttl", "180"),
Map.entry("cps_enabled", "true"),
Map.entry("cps_ttl", "180"),
Map.entry("k8s_audit_enabled", "true"),
Map.entry("k8s_audit_collection_policy", ""),
Map.entry("k8s_audit_ttl", "180"),
Map.entry("k8s_event_enabled", "true"),
Map.entry("k8s_event_collection_policy", ""),
Map.entry("k8s_event_ttl", "180"),
Map.entry("k8s_ingress_enabled", "true"),
Map.entry("k8s_ingress_collection_policy", ""),
Map.entry("k8s_ingress_ttl", "180")
))
.build());
}
}

Import

Log audit can be imported using the id, e.g.

$ pulumi import alicloud:log/audit:Audit example tf-audit-example

Constructors

Link copied to clipboard
fun AuditArgs(aliuid: Output<String>? = null, displayName: Output<String>? = null, multiAccounts: Output<List<String>>? = null, resourceDirectoryType: Output<String>? = null, variableMap: Output<Map<String, Any>>? = null)

Functions

Link copied to clipboard
open override fun toJava(): AuditArgs

Properties

Link copied to clipboard
val aliuid: Output<String>? = null

Aliuid value of your account.

Link copied to clipboard
val displayName: Output<String>? = null

Name of SLS log audit.

Link copied to clipboard
val multiAccounts: Output<List<String>>? = null

Multi-account configuration, please fill in multiple aliuid.

Link copied to clipboard
val resourceDirectoryType: Output<String>? = null

Resource Directory type. Optional values are all or custom. If the value is custom, argument multi_account should be provided.

Link copied to clipboard
val variableMap: Output<Map<String, Any>>? = null

Log audit detailed configuration.