From 7f3480efbd2a528dc8b120a4be27bfd727d7a481 Mon Sep 17 00:00:00 2001 From: misraved Date: Wed, 29 Nov 2023 20:16:35 +0530 Subject: [PATCH 1/2] Improve table docs and recompile plugin with steampipe-plugin-sdk v5.7.0 --- docs/tables/azure_ad_group.md | 5 +- docs/tables/azure_ad_service_principal.md | 6 +- docs/tables/azure_ad_user.md | 6 +- docs/tables/azure_alert_management.md | 7 +- docs/tables/azure_api_management.md | 19 +- docs/tables/azure_app_configuration.md | 20 +- docs/tables/azure_app_service_environment.md | 18 +- docs/tables/azure_app_service_function_app.md | 19 +- docs/tables/azure_app_service_plan.md | 16 +- docs/tables/azure_app_service_web_app.md | 21 +- docs/tables/azure_app_service_web_app_slot.md | 22 +- docs/tables/azure_application_gateway.md | 20 +- docs/tables/azure_application_insight.md | 17 +- .../azure_application_security_group.md | 17 +- docs/tables/azure_automation_account.md | 18 +- docs/tables/azure_automation_variable.md | 19 +- docs/tables/azure_bastion_host.md | 17 +- docs/tables/azure_batch_account.md | 17 +- docs/tables/azure_cognitive_account.md | 19 +- docs/tables/azure_compute_availability_set.md | 18 +- docs/tables/azure_compute_disk.md | 20 +- docs/tables/azure_compute_disk_access.md | 17 +- .../azure_compute_disk_encryption_set.md | 16 +- .../azure_compute_disk_metric_read_ops.md | 17 +- ...zure_compute_disk_metric_read_ops_daily.md | 17 +- ...ure_compute_disk_metric_read_ops_hourly.md | 17 +- .../azure_compute_disk_metric_write_ops.md | 17 +- ...ure_compute_disk_metric_write_ops_daily.md | 17 +- ...re_compute_disk_metric_write_ops_hourly.md | 17 +- docs/tables/azure_compute_image.md | 20 +- docs/tables/azure_compute_resource_sku.md | 16 +- docs/tables/azure_compute_snapshot.md | 16 +- docs/tables/azure_compute_ssh_key.md | 17 +- docs/tables/azure_compute_virtual_machine.md | 25 +- ..._virtual_machine_metric_cpu_utilization.md | 17 +- ...al_machine_metric_cpu_utilization_daily.md | 17 +- ...l_machine_metric_cpu_utilization_hourly.md | 17 +- ...azure_compute_virtual_machine_scale_set.md | 17 +- ...ual_machine_scale_set_network_interface.md | 19 +- ...re_compute_virtual_machine_scale_set_vm.md | 17 +- docs/tables/azure_container_group.md | 22 +- docs/tables/azure_container_registry.md | 19 +- docs/tables/azure_cosmosdb_account.md | 21 +- .../tables/azure_cosmosdb_mongo_collection.md | 17 +- docs/tables/azure_cosmosdb_mongo_database.md | 16 +- ...re_cosmosdb_restorable_database_account.md | 17 +- docs/tables/azure_cosmosdb_sql_database.md | 16 +- docs/tables/azure_data_factory.md | 18 +- docs/tables/azure_data_factory_dataset.md | 15 +- docs/tables/azure_data_factory_pipeline.md | 16 +- .../azure_data_lake_analytics_account.md | 18 +- docs/tables/azure_data_lake_store.md | 18 +- docs/tables/azure_databox_edge_device.md | 17 +- docs/tables/azure_databricks_workspace.md | 20 +- docs/tables/azure_diagnostic_setting.md | 20 +- docs/tables/azure_dns_zone.md | 18 +- docs/tables/azure_eventgrid_domain.md | 18 +- docs/tables/azure_eventgrid_topic.md | 18 +- docs/tables/azure_eventhub_namespace.md | 20 +- docs/tables/azure_express_route_circuit.md | 18 +- docs/tables/azure_firewall.md | 19 +- docs/tables/azure_firewall_policy.md | 19 +- docs/tables/azure_frontdoor.md | 21 +- docs/tables/azure_hdinsight_cluster.md | 19 +- docs/tables/azure_healthcare_service.md | 20 +- docs/tables/azure_hpc_cache.md | 18 +- docs/tables/azure_hybrid_compute_machine.md | 15 +- ...ure_hybrid_kubernetes_connected_cluster.md | 17 +- docs/tables/azure_iothub.md | 17 +- docs/tables/azure_iothub_dps.md | 17 +- docs/tables/azure_key_vault.md | 21 +- docs/tables/azure_key_vault_deleted_vault.md | 17 +- docs/tables/azure_key_vault_key.md | 20 +- docs/tables/azure_key_vault_key_version.md | 20 +- ..._vault_managed_hardware_security_module.md | 15 +- docs/tables/azure_key_vault_secret.md | 20 +- docs/tables/azure_kubernetes_cluster.md | 19 +- .../azure_kubernetes_service_version.md | 20 +- docs/tables/azure_kusto_cluster.md | 17 +- docs/tables/azure_lb.md | 15 +- docs/tables/azure_lb_backend_address_pool.md | 17 +- docs/tables/azure_lb_nat_rule.md | 16 +- docs/tables/azure_lb_outbound_rule.md | 16 +- docs/tables/azure_lb_probe.md | 16 +- docs/tables/azure_lb_rule.md | 16 +- docs/tables/azure_location.md | 15 +- docs/tables/azure_log_alert.md | 17 +- docs/tables/azure_log_profile.md | 14 +- docs/tables/azure_logic_app_workflow.md | 18 +- .../azure_machine_learning_workspace.md | 16 +- docs/tables/azure_management_group.md | 18 +- docs/tables/azure_management_lock.md | 17 +- docs/tables/azure_mariadb_server.md | 19 +- .../azure_monitor_activity_log_event.md | 31 ++- docs/tables/azure_mssql_elasticpool.md | 17 +- docs/tables/azure_mssql_managed_instance.md | 18 +- docs/tables/azure_mssql_virtual_machine.md | 17 +- docs/tables/azure_mysql_flexible_server.md | 25 +- docs/tables/azure_mysql_server.md | 29 ++- docs/tables/azure_nat_gateway.md | 18 +- docs/tables/azure_network_interface.md | 16 +- docs/tables/azure_network_security_group.md | 16 +- docs/tables/azure_network_watcher.md | 15 +- docs/tables/azure_network_watcher_flow_log.md | 19 +- docs/tables/azure_policy_assignment.md | 18 +- docs/tables/azure_policy_definition.md | 17 +- .../azure_postgresql_flexible_server.md | 17 +- docs/tables/azure_postgresql_server.md | 23 +- docs/tables/azure_private_dns_zone.md | 18 +- docs/tables/azure_provider.md | 17 +- docs/tables/azure_public_ip.md | 18 +- .../azure_recovery_services_backup_job.md | 17 +- docs/tables/azure_recovery_services_vault.md | 17 +- docs/tables/azure_redis_cache.md | 19 +- docs/tables/azure_resource_group.md | 15 +- docs/tables/azure_resource_link.md | 17 +- docs/tables/azure_role_assignment.md | 18 +- docs/tables/azure_role_definition.md | 18 +- docs/tables/azure_route_table.md | 18 +- docs/tables/azure_search_service.md | 15 +- ...azure_security_center_auto_provisioning.md | 17 +- .../azure_security_center_automation.md | 16 +- docs/tables/azure_security_center_contact.md | 17 +- ...curity_center_jit_network_access_policy.md | 16 +- docs/tables/azure_security_center_setting.md | 17 +- .../azure_security_center_sub_assessment.md | 18 +- ...re_security_center_subscription_pricing.md | 17 +- docs/tables/azure_service_fabric_cluster.md | 20 +- docs/tables/azure_servicebus_namespace.md | 21 +- docs/tables/azure_signalr_service.md | 18 +- docs/tables/azure_spring_cloud_service.md | 15 +- docs/tables/azure_sql_database.md | 18 +- docs/tables/azure_sql_server.md | 21 +- docs/tables/azure_storage_account.md | 24 +- docs/tables/azure_storage_blob.md | 17 +- docs/tables/azure_storage_blob_service.md | 17 +- docs/tables/azure_storage_container.md | 20 +- docs/tables/azure_storage_queue.md | 15 +- docs/tables/azure_storage_share_file.md | 18 +- docs/tables/azure_storage_sync.md | 18 +- docs/tables/azure_storage_table.md | 16 +- docs/tables/azure_storage_table_service.md | 15 +- docs/tables/azure_stream_analytics_job.md | 15 +- docs/tables/azure_subnet.md | 19 +- docs/tables/azure_subscription.md | 16 +- docs/tables/azure_synapse_workspace.md | 20 +- docs/tables/azure_tenant.md | 16 +- docs/tables/azure_virtual_network.md | 19 +- docs/tables/azure_virtual_network_gateway.md | 17 +- go.mod | 66 +++--- go.sum | 217 +++++------------- 151 files changed, 2308 insertions(+), 608 deletions(-) diff --git a/docs/tables/azure_ad_group.md b/docs/tables/azure_ad_group.md index d00de9c6..31ba7359 100644 --- a/docs/tables/azure_ad_group.md +++ b/docs/tables/azure_ad_group.md @@ -7,6 +7,7 @@ Azure Active Directory groups is used to manage access to your cloud-based apps, ## Examples ### Basic info +Determine the areas in which your Azure Active Directory groups are mail-enabled. This could be beneficial for managing group email communications and understanding which groups have specific email settings. ```sql select @@ -21,6 +22,7 @@ from ### List of AD groups where security is not enabled +Determine the areas in which Azure Active Directory groups are not security-enabled. This is crucial for identifying potential vulnerabilities and enhancing the security posture of your organization. ```sql select @@ -35,6 +37,7 @@ where ### List of AD groups where mail is not enabled +Determine the areas in which Azure Active Directory groups have not enabled mail. This can be useful in identifying groups that may not be receiving important communications or updates. ```sql select @@ -45,4 +48,4 @@ from azure_ad_group where not mail_enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_ad_service_principal.md b/docs/tables/azure_ad_service_principal.md index 6e2ea65b..942dc2e6 100644 --- a/docs/tables/azure_ad_service_principal.md +++ b/docs/tables/azure_ad_service_principal.md @@ -7,6 +7,7 @@ An Azure service principal is an identity created for use with applications, hos ## Examples ### List of ad service principals where service principal account is disabled +Determine which ad service principals have their account disabled in Azure. This is useful for identifying potential inactive or unused resources within your Azure environment. ```sql select @@ -22,6 +23,7 @@ where ### List of ad service principals where app role assignment is not required +Determine the areas in which ad service principals do not require app role assignments. This is useful to identify potential areas of your Azure AD environment where security could be improved by requiring app role assignments. ```sql select @@ -36,6 +38,7 @@ where ### Application role info of service principals +Identify the roles of service principals within an application to gain insights into their permissions and status. This is useful for understanding who has access to what within your application and ensuring appropriate security measures are in place. ```sql select @@ -53,6 +56,7 @@ from ### Oauth 2.0 permission info of ad service principal +This query is useful to gain insights into the permissions related to the OAuth 2.0 protocol for an advertising service principal in Azure. It allows you to understand the consent descriptions, display names, IDs and the status (enabled or not) of these permissions, which is crucial for managing access and maintaining security. ```sql select @@ -66,4 +70,4 @@ select from azure_ad_service_principal cross join jsonb_array_elements(oauth2_permissions) as perm; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_ad_user.md b/docs/tables/azure_ad_user.md index 1c9a6db3..2e9125ba 100644 --- a/docs/tables/azure_ad_user.md +++ b/docs/tables/azure_ad_user.md @@ -7,6 +7,7 @@ Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access ## Examples ### Basic active directory user info +Explore user details within your Azure Active Directory to gain insights into their status and contact information. This can be particularly useful for managing user access and maintaining up-to-date records. ```sql select @@ -22,6 +23,7 @@ from ### List of guest users in the active directory +Determine the areas in which guest users are active within your directory. This can help in managing user access and maintaining security protocols. ```sql select @@ -38,6 +40,7 @@ where ### Password profile info of each user +Determine the areas in which user password policies are enforced and where users are required to change their passwords at their next login. This helps to understand and manage user security within your Azure Active Directory. ```sql select @@ -47,5 +50,4 @@ select additional_properties -> 'passwordProfile' -> 'forceChangePasswordNextLogin' as change_password_next_login from azure_ad_user; -``` - +``` \ No newline at end of file diff --git a/docs/tables/azure_alert_management.md b/docs/tables/azure_alert_management.md index 07dc6fd7..0ea07013 100644 --- a/docs/tables/azure_alert_management.md +++ b/docs/tables/azure_alert_management.md @@ -25,6 +25,7 @@ Azure Alert Management is a service and set of tools within Microsoft Azure that ## Examples ### Basic info +Explore which alerts are currently active within your Azure management system. This can help you identify potential issues or areas that may require your attention, thus improving system monitoring and management. ```sql select @@ -40,6 +41,7 @@ from ``` ### List fired alerts +Discover the alerts that have been triggered in your Azure environment. This can help you quickly identify potential issues or anomalies that require attention. ```sql select @@ -57,6 +59,7 @@ where ``` ### List alerts within the last 7 days +Gain insights into recent alerts by identifying those that occurred within the past week. This is useful for keeping track of recent system issues or identifying patterns in alert occurrences. ```sql select @@ -73,6 +76,7 @@ where ``` ### List critical alerts +Uncover the details of critical alerts in your Azure environment to promptly address any severe issues affecting your resources. This query helps in identifying and prioritizing alerts with the highest severity for immediate action. ```sql select @@ -90,6 +94,7 @@ where ``` ### List alerts of VMInsights monitoring service +Explore alerts generated by the VMInsights monitoring service. This can help you gain insights into system performance and identify potential issues with your virtual machines. ```sql select @@ -104,4 +109,4 @@ from azure_alert_management where monitor_service = 'VMInsights'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_api_management.md b/docs/tables/azure_api_management.md index 359d1293..685317cf 100644 --- a/docs/tables/azure_api_management.md +++ b/docs/tables/azure_api_management.md @@ -1,10 +1,20 @@ -# Table: azure_api_management +--- +title: "Steampipe Table: azure_api_management - Query Azure API Management Services using SQL" +description: "Allows users to query Azure API Management Services." +--- -Azure API Management is a fully managed service that enables customers to publish, secure, transform, maintain, and monitor APIs. +# Table: azure_api_management - Query Azure API Management Services using SQL + +Azure API Management is a fully managed service that helps customers publish, secure, transform, maintain, and monitor APIs. With Azure API Management, organizations can ensure that their APIs are always available and performing as expected, and that their valuable data is secure. The service also includes a developer portal to help onboard developers and foster a developer community. + +## Table Usage Guide + +The 'azure_api_management' table provides insights into API Management Services within Azure. As a DevOps engineer, explore service-specific details through this table, including API names, locations, and associated metadata. Utilize it to uncover information about services, such as those with specific SKUs, the regions they are deployed in, and the verification of their identities. The schema presents a range of attributes of the API Management Service for your analysis, like the service name, resource group, subscription ID, and associated tags. ## Examples ### Public and private IP address info of each API management +Gain insights into the public and private IP addresses associated with each API management system in your Azure environment. This allows for better network management and security monitoring. ```sql select @@ -17,6 +27,7 @@ from ### API management publisher info +Gain insights into the publishers of your Azure API management service, including their names and contact emails, to facilitate effective communication and management. ```sql select @@ -29,6 +40,7 @@ from ### List of premium API managements and their computing capacity +Identify premium Azure API management services and their computing capacities. This is useful for assessing your organization's API management capabilities and planning for potential upgrades or expansions. ```sql select @@ -43,6 +55,7 @@ where ### List of API management without application tag key +Identify instances where API management in Azure is missing the 'application' tag. This can aid in pinpointing areas where tagging conventions may not have been followed, helping to improve resource management and compliance. ```sql select @@ -52,4 +65,4 @@ from azure_api_management where not tags :: JSONB ? 'application'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_configuration.md b/docs/tables/azure_app_configuration.md index b205d983..68605769 100644 --- a/docs/tables/azure_app_configuration.md +++ b/docs/tables/azure_app_configuration.md @@ -1,10 +1,20 @@ -# Table: azure_app_configuration +--- +title: "Steampipe Table: azure_app_configuration - Query Azure App Configuration Stores using SQL" +description: "Allows users to query Azure App Configuration Stores" +--- -Azure App Configuration provides a service to centrally manage application settings and feature flags. App Configuration is used to store all the settings for your application and secure their accesses in one place. +# Table: azure_app_configuration - Query Azure App Configuration Stores using SQL + +Azure App Configuration is a managed service that helps developers centralize their application and feature settings simply and securely. It provides a way to manage and distribute application settings, helping to improve the speed and reliability of application deployment. Azure App Configuration also allows you to automate the process of managing and updating these settings across multiple environments. + +## Table Usage Guide + +The 'azure_app_configuration' table provides insights into App Configuration Stores within Azure App Configuration. As a DevOps engineer, explore store-specific details through this table, including store names, resource groups, subscription IDs, and associated metadata. Utilize it to uncover information about stores, such as their provisioning states, creation times, and the number of failed requests. The schema presents a range of attributes of the App Configuration Store for your analysis, like the store name, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore the status and creation dates of your Azure application configurations. This can help you understand the overall state of your applications, allowing for better management and timely updates. ```sql select @@ -18,6 +28,7 @@ from ``` ### List public network access enabled app configurations +Explore which app configurations have public network access enabled. This can be useful in identifying potential security risks and ensuring your app configurations adhere to best practices. ```sql select @@ -33,6 +44,7 @@ where ``` ### List app configurations with user assigned identities +This query helps in identifying the application configurations within Azure that have been assigned user identities. It is useful in managing and tracking user access, contributing to improved security and compliance. ```sql select @@ -53,6 +65,7 @@ where ``` ### List private endpoint connection details for app configurations +Explore the details of private endpoint connections for your app configurations. This can help you understand their current status, any required actions, and their provisioning state, which can be useful for troubleshooting or optimizing your app's performance. ```sql select @@ -70,6 +83,7 @@ from ``` ### List encryption details for app configurations +Explore the encryption details of your app configurations to ensure secure data handling. This is particularly useful in maintaining data security standards and regulatory compliance. ```sql select @@ -79,4 +93,4 @@ select encryption -> 'keyVaultProperties' ->> 'keyIdentifier' as key_vault_key_identifier from azure_app_configuration; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_service_environment.md b/docs/tables/azure_app_service_environment.md index c4c7c8da..0e776836 100644 --- a/docs/tables/azure_app_service_environment.md +++ b/docs/tables/azure_app_service_environment.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_environment +--- +title: "Steampipe Table: azure_app_service_environment - Query Azure App Service Environments using SQL" +description: "Allows users to query Azure App Service Environments" +--- -The Azure App Service Environment provides a fully isolated and dedicated environment for securely running App Service apps at high scale. +# Table: azure_app_service_environment - Query Azure App Service Environments using SQL + +Azure App Service Environment is a fully isolated and dedicated environment for securely running App Service apps at high scale. It is designed for applications that require secure, scalable and isolated environments for their execution. It provides network isolation and improved scalability capabilities, making it ideal for applications that require high levels of security and isolation, or that run at a large scale. + +## Table Usage Guide + +The 'azure_app_service_environment' table provides insights into App Service Environments within Azure. As a DevOps engineer, explore environment-specific details through this table, including the environment's capacity, status, and associated metadata. Utilize it to uncover information about the environments, such as their virtual network integration, worker pool specifications, and inbound and outbound IP addresses. The schema presents a range of attributes of the App Service Environment for your analysis, like the environment's ID, location, resource group, and tags. ## Examples ### List of app service environments which are not healthy +Identify the Azure app service environments that are not functioning properly. This is useful for promptly addressing issues and maintaining optimal application performance. ```sql select @@ -17,6 +27,7 @@ where ``` ### Virtual network info of each app service environment +Gain insights into the virtual network configuration of each app service environment to understand the internal load balancing mode and ensure optimal resource allocation. ```sql select @@ -30,6 +41,7 @@ from ``` ### List cluster settings details +Explore the configuration details of your Azure app service environment to gain insights into the specific cluster settings. This can help you understand the current setup and make informed decisions on potential modifications. ```sql select @@ -40,4 +52,4 @@ select from azure_app_service_environment, jsonb_array_elements(cluster_settings) as settings; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_service_function_app.md b/docs/tables/azure_app_service_function_app.md index 6e06768a..2094c959 100644 --- a/docs/tables/azure_app_service_function_app.md +++ b/docs/tables/azure_app_service_function_app.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_function_app +--- +title: "Steampipe Table: azure_app_service_function_app - Query Azure App Service Function Apps using SQL" +description: "Allows users to query Azure App Service Function Apps." +--- -A function app is the container that hosts the execution of individual functions. +# Table: azure_app_service_function_app - Query Azure App Service Function Apps using SQL + +Azure App Service is a fully managed platform for building, deploying, and scaling web apps. Azure Function Apps, a part of Azure App Service, is a serverless compute service that lets you run event-triggered code without having to provision or manage infrastructure. It enables developers to host and run chunks of code, or "functions," in the cloud, without needing to create a virtual machine or publish a web application. + +## Table Usage Guide + +The 'azure_app_service_function_app' table provides insights into Function Apps within Azure App Service. As a DevOps engineer, explore Function App-specific details through this table, including App settings, connection strings, default hostname, and associated metadata. Utilize it to uncover information about Function Apps, such as those with specific configurations, the relationships between apps, and the verification of connection strings. The schema presents a range of attributes of the Function App for your analysis, like the app service plan id, creation date, default hostname, and associated tags. ## Examples ### List of app functions which accepts HTTP traffic +Identify Azure app functions that accept HTTP traffic to assess potential security risks and ensure secure communication protocols are in place. ```sql select @@ -20,6 +30,7 @@ where ### List of all unreserved app function +Explore which Azure app service function apps are not reserved. This is useful for identifying potential resource allocation inefficiencies and optimizing your cloud infrastructure. ```sql select @@ -34,6 +45,7 @@ where ### Outbound IP addresses and possible outbound IP addresses info of each function app +Explore the outbound IP addresses associated with each function app to understand potential network communication paths. This is useful in identifying and managing the network traffic routes for your application. ```sql select @@ -46,6 +58,7 @@ from ### List of app functions where client certificate mode is disabled. +Explore which Azure app service functions have the client certificate mode disabled. This can be useful for identifying potential security vulnerabilities in your application services. ```sql select @@ -57,4 +70,4 @@ from azure_app_service_function_app where not client_cert_enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_service_plan.md b/docs/tables/azure_app_service_plan.md index 079716c0..4de029f3 100644 --- a/docs/tables/azure_app_service_plan.md +++ b/docs/tables/azure_app_service_plan.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_plan +--- +title: "Steampipe Table: azure_app_service_plan - Query Azure App Service Plans using SQL" +description: "Allows users to query Azure App Service Plans." +--- -An App Service plan defines a set of compute resources for a web app to run. These compute resources are analogous to the server farm in conventional web hosting. +# Table: azure_app_service_plan - Query Azure App Service Plans using SQL + +Azure App Service Plan is a component of Azure App Service, the platform that runs and manages web applications. This service plan allocates the resources your web app will use. It determines the number of VM instances that will be used to run the app and it affects the cost. + +## Table Usage Guide + +The 'azure_app_service_plan' table provides insights into App Service Plans within Azure App Service. As a DevOps engineer, explore service plan-specific details through this table, including the number of workers, kind of operating system, and associated metadata. Utilize it to uncover information about service plans, such as the maximum number of workers, the reserved status, and the targeted worker size. The schema presents a range of attributes of the App Service Plan for your analysis, like the resource group, kind, status, and associated tags. ## Examples ### App service plan SKU info +Gain insights into the various specifications of your Azure App Service Plan, such as the SKU family, name, size, tier, and capacity. This is useful in understanding the resources allocated to your application, which can help in optimizing performance and cost. ```sql select @@ -20,6 +30,7 @@ from ### List of Hyper-V container app service plan +Explore which Azure app service plans are using Hyper-V containers and understand their distribution across different regions. This can be useful for assessing the distribution and usage of Hyper-V containers in your Azure environment. ```sql select @@ -35,6 +46,7 @@ where ### List of App service plan that owns spot instances +Explore which Azure App Service plans own spot instances to better manage your resources and costs in different regions and resource groups. This is particularly useful for identifying potential cost savings and optimizing resource allocation. ```sql select diff --git a/docs/tables/azure_app_service_web_app.md b/docs/tables/azure_app_service_web_app.md index 5abb830c..b80db3c1 100644 --- a/docs/tables/azure_app_service_web_app.md +++ b/docs/tables/azure_app_service_web_app.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_web_app +--- +title: "Steampipe Table: azure_app_service_web_app - Query Azure App Service Web Apps using SQL" +description: "Allows users to query Azure App Service Web Apps" +--- -Azure App Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends. +# Table: azure_app_service_web_app - Query Azure App Service Web Apps using SQL + +Azure App Service is a fully managed platform for building, deploying, and scaling web apps. You can host and scale web apps in Azure with minimal to zero code changes. Azure App Service not only adds the power of Microsoft Azure to your application, such as security, load balancing, and automated management, but also provides the ability to build a web app in your favorite language, be it .NET, .NET Core, Java, Ruby, Node.js, PHP, or Python. + +## Table Usage Guide + +The 'azure_app_service_web_app' table provides insights into web apps within Azure App Service. As a DevOps engineer, explore web app-specific details through this table, including app settings, configuration details, and associated metadata. Utilize it to uncover information about web apps, such as those with specific configurations, the relationships between different apps, and the verification of app settings. The schema presents a range of attributes of the web app for your analysis, like the app name, resource group, kind, location, and associated tags. ## Examples ### Outbound IP addresses and possible outbound IP addresses info of each web app +Analyze the settings to understand the outbound IP addresses currently in use and potential future ones for each web application. This can help in planning and managing network configurations for improved security and performance. ```sql select @@ -16,6 +26,7 @@ from ``` ### List web apps which accepts HTTP traffics (i.e HTTPS only is disabled) +Discover the segments of your web applications that are potentially insecure by identifying which ones are accepting HTTP traffic. This is useful for understanding where your system may be vulnerable to unencrypted data transfer, aiding in enhancing your overall security measures. ```sql select @@ -30,6 +41,7 @@ where ``` ### List of web app where client certificate mode is disabled +Explore which web applications on Azure App Service have the client certificate mode disabled. This can be useful in identifying potential security risks, as applications without client certificates may be more vulnerable to unauthorized access. ```sql select @@ -44,6 +56,7 @@ where ``` ### Host names of each web app +Analyze the settings to understand the geographical distribution and organization of your Azure web applications. This can help you manage resources more effectively and plan for scalability. ```sql select @@ -57,6 +70,7 @@ from ``` ### List web apps with latest HTTP version +Explore which Azure web apps are enabled with the latest HTTP version. This can be useful in identifying potential updates needed for apps running on older HTTP versions. ```sql select @@ -70,6 +84,7 @@ where ``` ### List web apps that have FTP deployments set to disabled +Determine the areas in which web apps are operating with FTP deployments disabled. This can be beneficial for auditing security measures and ensuring compliance with company policies that disallow FTP deployments. ```sql select @@ -82,6 +97,7 @@ where ``` ### List web apps that have managed service identity disabled +Discover the segments that have the managed service identity feature disabled in your web applications. This is useful in identifying potential security risks as it allows you to pinpoint applications that might not be properly utilizing Azure's built-in identity management features. ```sql select @@ -96,6 +112,7 @@ where ``` ### Get the storage information associated to a particular app +Explore the storage details linked to a specific application within a designated resource group to better manage and allocate resources. This is particularly useful for optimizing storage utilization and planning for future capacity needs. ```sql select diff --git a/docs/tables/azure_app_service_web_app_slot.md b/docs/tables/azure_app_service_web_app_slot.md index a4405989..bb896867 100644 --- a/docs/tables/azure_app_service_web_app_slot.md +++ b/docs/tables/azure_app_service_web_app_slot.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_web_app +--- +title: "Steampipe Table: azure_app_service_web_app_slot - Query Azure App Service Web App Slots using SQL" +description: "Allows users to query Azure App Service Web App Slots" +--- -When you deploy your web app on Linux, mobile back end, or API app to Azure App Service, you can use a separate deployment slot instead of the default production slot when running in the Standard, Premium, or Isolated App Service plan tier. Deployment slots are live apps with their host names. App content and configuration elements can be swapped between two deployment slots, including the production slot. +# Table: azure_app_service_web_app_slot - Query Azure App Service Web App Slots using SQL + +Azure App Service is a fully managed platform for building, deploying, and scaling web apps. You can host web apps, mobile app back ends, RESTful APIs, or automated business processes. Web App Slots are live apps with their own hostnames that are used to deploy different versions of an app and then swap them to production with zero downtime. + +## Table Usage Guide + +The 'azure_app_service_web_app_slot' table provides insights into Web App Slots within Azure App Service. As a DevOps engineer, explore slot-specific details through this table, including configuration settings, app service plans, and associated metadata. Utilize it to uncover information about slots, such as those in stopped state, the configuration settings of each slot, and the verification of app service plans. The schema presents a range of attributes of the Web App Slot for your analysis, like the slot name, kind, fully qualified domain name, and associated tags. ## Examples ### Basic info +Explore which web application slots in Azure App Service are currently active and when they were last modified. This can be useful to manage and monitor your application deployment slots. ```sql select @@ -22,6 +32,7 @@ from ``` ### List slots where the apps are enabled +Explore which slots have apps enabled to gain insights into active app usage and distribution. This can be beneficial for managing resources and optimizing app performance. ```sql select @@ -40,6 +51,7 @@ where ``` ### List slots that accept HTTP traffic (i.e only HTTPS is disabled) +Explore which Azure App Service slots are configured to accept HTTP traffic, allowing you to identify potential security vulnerabilities where HTTPS is not enforced. This could be useful in a security audit to ensure all web applications are using secure protocols. ```sql select @@ -54,6 +66,7 @@ where ``` ### Host names of each slot +Explore which web application slots are hosted in different regions and resource groups. This can aid in managing and organizing your Azure App Service resources effectively. ```sql select @@ -67,6 +80,7 @@ from ``` ### List enabled host names +Explore which web application slots in your Azure App Service are currently enabled. This can be useful for managing your resources and understanding the active components within your cloud environment. ```sql select @@ -80,6 +94,7 @@ from ``` ### Get slot swap status of each slot +Assess the status of slot swaps within your application, identifying the source and destination of each swap. This allows you to track changes and manage your app's performance effectively. ```sql select @@ -93,6 +108,7 @@ from ``` ### Get site config details of each slot +Assess the configuration details of each web application slot to gain insights into the number of workers, enabled features, and software versions installed. This can help in managing resources and ensuring optimal performance. ```sql select @@ -121,4 +137,4 @@ select site_config ->> 'DocumentRoot' as DocumentRoot from azure_app_service_web_app_slot; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_application_gateway.md b/docs/tables/azure_application_gateway.md index d6173a45..63fb541f 100644 --- a/docs/tables/azure_application_gateway.md +++ b/docs/tables/azure_application_gateway.md @@ -1,10 +1,20 @@ -# Table: azure_application_gateway +--- +title: "Steampipe Table: azure_application_gateway - Query Azure Network Application Gateways using SQL" +description: "Allows users to query Azure Network Application Gateways" +--- -Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. Traditional load balancers operate at the transport layer (OSI layer 4 - TCP and UDP) and route traffic based on source IP address and port, to a destination IP address and port. Application Gateway can make routing decisions based on additional attributes of an HTTP request, for example URI path or host headers. +# Table: azure_application_gateway - Query Azure Network Application Gateways using SQL + +An Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. It operates at the application layer (Layer 7) of the Open Systems Interconnection (OSI) model. This service provides routing capabilities and can make routing decisions based on additional attributes of an HTTP request, for instance, URI path or host headers. + +## Table Usage Guide + +The 'azure_application_gateway' table provides insights into Application Gateways within Azure Network. As a Network Engineer, explore Application Gateway-specific details through this table, including backend configurations, SSL policy, and associated metadata. Utilize it to uncover information about Application Gateways, such as their SKU, operational state, and the verification of SSL policies. The schema presents a range of attributes of the Application Gateway for your analysis, like the gateway's ID, name, type, region, and associated tags. ## Examples ### Basic info +Explore which application gateways in your Azure environment are currently being provisioned and where they are located. This is beneficial for keeping track of your network resources and their geographical distribution. ```sql select @@ -18,6 +28,7 @@ from ``` ### List web application firewall configurations for application gateway +Analyze the settings to understand the configurations of your web application firewall for application gateways. This can help you assess its current status, identify any disabled rule groups, exclusions, and understand the limitations such as file upload limit and maximum request body size. ```sql select @@ -37,6 +48,7 @@ from ``` ### List http listeners for application gateway +Determine the areas in which HTTP listeners for the application gateway are configured. This is useful for understanding the setup and configuration of your application gateway, particularly for troubleshooting or optimizing network traffic management. ```sql select @@ -54,6 +66,7 @@ from ``` ### List backend http settings collection for application gateway +This query aids in gaining insights into the backend HTTP settings for an application gateway. It's particularly useful for understanding settings such as cookie-based affinity, host name selection, port, protocol, and request timeout, which can help optimize the application gateway's performance and security. ```sql select @@ -72,6 +85,7 @@ from ``` ### List frontend IP configurations for application gateway +This example helps you identify the different frontend IP configurations for your application gateway in Azure. It's useful for managing and understanding the various IP settings associated with your application gateway, including public and private IP allocations. ```sql select @@ -84,4 +98,4 @@ select from azure_application_gateway, jsonb_array_elements(frontend_ip_configurations) as config; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_application_insight.md b/docs/tables/azure_application_insight.md index f7afa305..8fba834e 100644 --- a/docs/tables/azure_application_insight.md +++ b/docs/tables/azure_application_insight.md @@ -1,10 +1,20 @@ -# Table: azure_application_insight +--- +title: "Steampipe Table: azure_application_insight - Query Azure Monitor Application Insights using SQL" +description: "Allows users to query Application Insights from Azure Monitor." +--- -Application Insights is an extension of Azure Monitor and provides Application Performance Monitoring (also known as “APM”) features. +# Table: azure_application_insight - Query Azure Monitor Application Insights using SQL + +Application Insights is an extensible Application Performance Management (APM) service for developers and DevOps professionals. It is part of Azure Monitor. You can use it to monitor your live applications. It will automatically detect performance anomalies, and includes powerful analytics tools to help you diagnose issues and to understand what users actually do with your app. + +## Table Usage Guide + +The 'azure_application_insight' table provides insights into Application Insights within Azure Monitor. As a DevOps professional, explore specific details through this table, including application types, instrumentation keys, and associated metadata. Utilize it to uncover information about applications, such as the application type, the resource group it belongs to, and the region it is hosted in. The schema presents a range of attributes of the Application Insight for your analysis, like the application type, resource group, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure Application Insights to gain insights into the retention period and geographical distribution. This can help in assessing resource allocation and data management strategies. ```sql select @@ -18,6 +28,7 @@ from ``` ### List application insights having retention period less than 30 days +Explore which application insights have a retention period of less than 30 days to manage data storage and optimize resource use in the Azure environment. This is useful for identifying potential areas of cost reduction and ensuring compliance with data retention policies. ```sql select @@ -33,6 +44,7 @@ where ``` ### List insights that can be queried publicly +Explore which Azure Application Insights are publicly accessible, allowing you to identify potential areas of vulnerability and manage access control more effectively. This query is particularly useful for enhancing data security and maintaining compliance. ```sql select @@ -48,6 +60,7 @@ where ``` ### List insights that allow ingestion publicly +Explore which application insights within your Azure environment are configured to allow public network access for data ingestion. This can help in assessing potential security risks and improving data management strategies. ```sql select diff --git a/docs/tables/azure_application_security_group.md b/docs/tables/azure_application_security_group.md index 014750a8..120b0199 100644 --- a/docs/tables/azure_application_security_group.md +++ b/docs/tables/azure_application_security_group.md @@ -1,10 +1,20 @@ -# Table: azure_application_security_groups +--- +title: "Steampipe Table: azure_application_security_group - Query Azure Network Security Groups using SQL" +description: "Allows users to query Azure Application Security Groups" +--- -Application security groups enable you to configure network security as a natural extension of an application's structure, allowing you to group virtual machines and define network security policies based on those groups. +# Table: azure_application_security_group - Query Azure Network Security Groups using SQL + +An Azure Application Security Group is a network security feature provided by Azure Network Security Groups. It allows users to define fine-grained network policies based on workloads, centralized on applications, instead of explicit IP addresses. Application Security Groups provide a tool to manage the network security policy at scale and increases the manageability of security policies. + +## Table Usage Guide + +The 'azure_application_security_group' table provides insights into Application Security Groups within Azure Network Security Groups. As a Network Administrator, explore group-specific details through this table, including security rules, associated network interfaces, and associated metadata. Utilize it to uncover information about groups, such as those with certain security rules, the relationships between different groups, and the verification of security policies. The schema presents a range of attributes of the Application Security Group for your analysis, like the resource group, location, type, and associated tags. ## Examples ### Basic info +Discover the segments of your Azure application security groups, such as their names and regions, to better understand their distribution and organization within your resource groups. ```sql select @@ -17,6 +27,7 @@ from ### List of application security group without application tag key +Explore which Azure Application Security Groups lack the 'application' tag key. This is useful for identifying potential gaps in your tagging strategy, which could impact resource tracking and management. ```sql select @@ -26,4 +37,4 @@ from azure_application_security_group where not tags :: JSONB ? 'application'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_automation_account.md b/docs/tables/azure_automation_account.md index 13c4e66b..8495575f 100644 --- a/docs/tables/azure_automation_account.md +++ b/docs/tables/azure_automation_account.md @@ -1,10 +1,20 @@ -# Table: azure_automation_account +--- +title: "Steampipe Table: azure_automation_account - Query Azure Automation Accounts using SQL" +description: "Allows users to query Azure Automation Accounts." +--- - Automation accounts allow you to isolate your Automation resources, runbooks, assets, and configurations from the resources of other accounts. You can use Automation accounts to separate resources into separate logical environments or delegated responsibilities. +# Table: azure_automation_account - Query Azure Automation Accounts using SQL + +Azure Automation is a service in Microsoft Azure that allows users to automate their manual, long-running, error-prone, and frequently repeated tasks. It provides process automation, update management and configuration features, and integrates with other popular DevOps tools. Azure Automation helps users to focus on work that adds business value by reducing the time spent on routine tasks. + +## Table Usage Guide + +The 'azure_automation_account' table provides insights into Automation Accounts within Azure Automation. As a DevOps engineer, explore account-specific details through this table, including the account's name, ID, location, and type. Utilize it to uncover information about accounts, such as their provisioning state, creation time, last modified time, and their SKU. The schema presents a range of attributes of the Automation Account for your analysis, like the subscription ID, tenant ID, resource group, and associated tags. ## Examples ### Basic info +Explore the different automation accounts within your Azure environment, including their names and associated resource groups. This can help you manage and organize your resources more effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List accounts that are created in last 30 days +Gain insights into newly created accounts in the past month. This query is useful for tracking recent account activity and managing resources within Azure automation. ```sql select @@ -32,6 +43,7 @@ where ``` ### List accounts that are suspended +Explore which Azure Automation accounts are currently suspended. This can be useful in identifying any potential issues or disruptions in your automation tasks and processes. ```sql select @@ -45,4 +57,4 @@ from azure_automation_account where state = 'AccountStateSuspended'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_automation_variable.md b/docs/tables/azure_automation_variable.md index ba1f6af2..99c13ea6 100644 --- a/docs/tables/azure_automation_variable.md +++ b/docs/tables/azure_automation_variable.md @@ -1,10 +1,20 @@ -# Table: azure_automation_variable +--- +title: "Steampipe Table: azure_automation_variable - Query Azure Automation Variables using SQL" +description: "Allows users to query Azure Automation Variables" +--- -Variable assets are values that are available to all runbooks and DSC configurations in your Automation account. You can manage them from the Azure portal, from PowerShell, within a runbook, or in a DSC configuration. +# Table: azure_automation_variable - Query Azure Automation Variables using SQL + +Azure Automation is a service that allows you to automate your Azure management tasks and to orchestrate actions across external systems from right within Azure. Variables in Azure Automation are used to store values that can be accessed across runbooks and modules during their execution. These variables can store different types of values, such as strings, integers, Booleans, and DateTime values. + +## Table Usage Guide + +The 'azure_automation_variable' table provides insights into Variables within Azure Automation. As a DevOps engineer, explore variable-specific details through this table, including names, types, values, and descriptions. Utilize it to uncover information about variables, such as those with specific values, the encrypted status of the variables, and the last time they were updated. The schema presents a range of attributes of the Automation Variable for your analysis, like the variable id, creation time, last modified time, and associated tags. ## Examples ### Basic info +Explore the basic information of Azure Automation Variables to understand the type and encryption status. This can help in managing and securing the automation environment. ```sql select @@ -19,6 +29,7 @@ from ``` ### List variables that are unencrypted +Discover the segments that contain unencrypted variables within your Azure Automation account. This is useful for identifying potential security risks and ensuring that all sensitive information is adequately protected. ```sql select @@ -35,6 +46,7 @@ where ``` ### List variables created in last 30 days +Discover the segments that have been newly added in the past month, which can be useful in understanding recent changes or additions to your system. This can help in assessing the elements within your system that have been recently modified or created. ```sql select @@ -52,6 +64,7 @@ where ``` ### Get details of a variable +Explore the specific settings of a variable within a given account and resource group in Azure Automation. This is useful for assessing the elements within your automation environment, such as identifying if a variable is encrypted or not. ```sql select @@ -67,4 +80,4 @@ where account_name = 'turbot_account' and name = 'turbot' and resource_group = 'turbot_rg'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_bastion_host.md b/docs/tables/azure_bastion_host.md index d3edd54b..d6832027 100644 --- a/docs/tables/azure_bastion_host.md +++ b/docs/tables/azure_bastion_host.md @@ -1,10 +1,20 @@ -# Table: azure_bastion_host +--- +title: "Steampipe Table: azure_bastion_host - Query Azure Bastion Hosts using SQL" +description: "Allows users to query Azure Bastion Hosts to retrieve information about the state, configurations, and associated resources." +--- -Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal, or via the native SSH or RDP client already installed on your local computer. The Azure Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. When you connect via Azure Bastion, your virtual machines don't need a public IP address, agent, or special client software. +# Table: azure_bastion_host - Query Azure Bastion Hosts using SQL + +Azure Bastion is a fully managed network security service that provides secure and seamless RDP and SSH access to your virtual machines directly from the Azure portal. Azure Bastion is provisioned directly in your Virtual Network (VNet) and supports all VMs in your VNet. Using Azure Bastion protects your virtual machines from exposing RDP/SSH ports to the outside world, while providing secure access to manage your VMs. + +## Table Usage Guide + +The 'azure_bastion_host' table provides insights into Bastion Hosts within Azure Bastion service. As an IT administrator, explore host-specific details through this table, including its state, configurations, and associated resources. Utilize it to uncover information about hosts, such as those with specific configurations, the associated subnets, and the verification of their state. The schema presents a range of attributes of the Bastion Host for your analysis, like the host name, provisioning state, type, id, and associated tags. ## Examples ### Basic info +Explore which Azure Bastion Hosts are currently provisioned and where they are located. This helps in managing resources and planning deployment strategies across different regions. ```sql select @@ -18,6 +28,7 @@ from ``` ### List bastion hosts that are in failed state +Discover the segments that have bastion hosts in a failed state. This can help in identifying and troubleshooting problematic hosts, ensuring the stability and security of your Azure environment. ```sql select @@ -33,6 +44,7 @@ where ``` ### Get subnet details associated with each host +Discover the network organization of your Azure resources by identifying the specific subnets associated with each bastion host. This allows for efficient infrastructure management and helps in identifying potential network vulnerabilities. ```sql select @@ -49,6 +61,7 @@ where ``` ### Get IP configuration details associated with each host +Explore the IP configurations linked to each host in your Azure environment to gain insights into allocation methods and SKU details. This can help in managing and optimizing your network resources in Azure. ```sql select diff --git a/docs/tables/azure_batch_account.md b/docs/tables/azure_batch_account.md index ab28422e..fd29d86e 100644 --- a/docs/tables/azure_batch_account.md +++ b/docs/tables/azure_batch_account.md @@ -1,10 +1,20 @@ -# Table: azure_batch_account +--- +title: "Steampipe Table: azure_batch_account - Query Azure Batch Accounts using SQL" +description: "Allows users to query Azure Batch Accounts." +--- -An Azure Batch account is a uniquely identified entity within the Batch service. Most Batch solutions use Azure Storage for storing resource files and output files, so each Batch account is usually associated with a corresponding storage account. +# Table: azure_batch_account - Query Azure Batch Accounts using SQL + +Azure Batch is a cloud-based job scheduling service that parallelizes and distributes the processing of large volumes of data across many computers. It is designed for high-performance computing (HPC) applications, enabling developers and scientists to run large-scale parallel and high-performance computing (HPC) applications efficiently in the cloud. Azure Batch creates and manages a pool of compute nodes (virtual machines), installs the applications you want to run, and schedules jobs to run on the nodes. + +## Table Usage Guide + +The 'azure_batch_account' table provides insights into Batch Accounts within Azure Batch. As a DevOps engineer, explore account-specific details through this table, including the provisioning state, pool allocation mode, and associated metadata. Utilize it to uncover information about accounts, such as those with public network access, the key vault reference, and the verification of pool allocation mode. The schema presents a range of attributes of the Batch Account for your analysis, like the account name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Batch accounts are active and their dedicated core quota limits, to manage resource allocation and prevent potential overuse. This helps in maintaining cost-effective and efficient operations within your Azure environment. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed batch accounts +Explore which batch accounts in your Azure environment have failed to provision. This is useful for identifying and addressing potential issues in resource allocation or configuration. ```sql select @@ -32,4 +43,4 @@ from azure_batch_account where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_cognitive_account.md b/docs/tables/azure_cognitive_account.md index 2451f514..755f15ea 100644 --- a/docs/tables/azure_cognitive_account.md +++ b/docs/tables/azure_cognitive_account.md @@ -1,10 +1,20 @@ -# Table: azure_cognitive_account +--- +title: "Steampipe Table: azure_cognitive_account - Query Azure Cognitive Services Accounts using SQL" +description: "Allows users to query Azure Cognitive Services Accounts." +--- -Azure Cognitive Services are cloud-based services with REST APIs and client library SDKs available to help you build cognitive intelligence into your applications. You can add cognitive features to your applications without having artificial intelligence (AI) or data science skills. Azure Cognitive Services comprise various AI services that enable you to build cognitive solutions that can see, hear, speak, understand, and even make decisions. +# Table: azure_cognitive_account - Query Azure Cognitive Services Accounts using SQL + +Azure Cognitive Services is a suite of artificial intelligence (AI) services and cognitive APIs to help you build intelligent apps. It provides developers with APIs that help in building applications that can see, hear, speak, understand, and even begin to reason. The APIs are designed to be easy to use, while also providing a comprehensive set of capabilities. + +## Table Usage Guide + +The 'azure_cognitive_account' table provides insights into Cognitive Services Accounts within Azure Cognitive Services. As a DevOps engineer, explore account-specific details through this table, including the kind of cognitive service, the network rules set, and associated metadata. Utilize it to uncover information about accounts, such as those with specific capabilities, the network rules applied to them, and the status of the accounts. The schema presents a range of attributes of the Cognitive Services Account for your analysis, like the account name, creation date, endpoint, and associated tags. ## Examples ### Basic info +Explore which Azure cognitive accounts are currently being provisioned, by understanding their type and kind. This can help in managing resources and planning for capacity. ```sql select @@ -18,6 +28,7 @@ from ``` ### List accounts with enabled public network access +Determine the areas in which public network access is enabled within your Azure cognitive accounts. This can assist in identifying potential security risks and ensuring your data remains protected. ```sql select @@ -34,6 +45,7 @@ where ``` ### List private endpoint connection details for accounts +This example helps in exploring the details of private endpoint connections linked to cognitive accounts in Azure. It can assist in understanding the connections' status and type, which is essential for managing network accessibility and ensuring secure data communication. ```sql select @@ -50,6 +62,7 @@ from ``` ### List diagnostic setting details for accounts +This query allows you to analyze the diagnostic settings of your Azure Cognitive Services accounts. It's useful for understanding the log and metric settings of each account, which can help in monitoring and troubleshooting. ```sql select @@ -64,4 +77,4 @@ select from azure_cognitive_account, jsonb_array_elements(diagnostic_settings) as settings; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_availability_set.md b/docs/tables/azure_compute_availability_set.md index 13232a08..5150c186 100644 --- a/docs/tables/azure_compute_availability_set.md +++ b/docs/tables/azure_compute_availability_set.md @@ -1,10 +1,20 @@ -# Table: azure_compute_availability_set +--- +title: "Steampipe Table: azure_compute_availability_set - Query Azure Compute Availability Sets using SQL" +description: "Allows users to query Azure Compute Availability Sets." +--- -An Availability Set is a logical grouping capability for isolating VM resources from each other when they're deployed. +# Table: azure_compute_availability_set - Query Azure Compute Availability Sets using SQL + +An Azure Compute Availability Set is a logical grouping capability that you can use in Azure to ensure that the VM resources you place within it are isolated from each other when they are deployed within an Azure datacenter. Azure ensures that the VMs you place within an Availability Set run across multiple physical servers, compute racks, storage units, and network switches. This is particularly useful for building high availability applications and protecting your applications from planned or unplanned maintenance. + +## Table Usage Guide + +The 'azure_compute_availability_set' table provides insights into the Availability Sets within Azure Compute. As a DevOps engineer, explore Availability Set-specific details through this table, including fault domain count, update domain count, and associated metadata. Utilize it to uncover information about Availability Sets, such as those with specific virtual machine profiles, the virtual machines within an availability set, and the verification of fault and update domains. The schema presents a range of attributes of the Availability Set for your analysis, like the set name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Compute Availability Sets are in a specific region and assess the count of fault and update domains within them. This can help in managing and planning resource distribution across various domains and regions. ```sql select @@ -18,6 +28,7 @@ from ### List of availability sets which does not use managed disks configuration +Identify instances where availability sets in Azure are not utilizing the managed disks configuration. This is beneficial in pinpointing areas where you could optimize your resources for improved performance and management. ```sql select @@ -31,6 +42,7 @@ where ### List of availability sets without application tag key +Discover the segments that lack specific application tag keys within the Azure compute availability sets. This query is useful for identifying potential areas of misconfiguration or missing data. ```sql select @@ -40,4 +52,4 @@ from azure_compute_availability_set where not tags :: JSONB ? 'application'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk.md b/docs/tables/azure_compute_disk.md index 9e003d7e..c3a1ce86 100644 --- a/docs/tables/azure_compute_disk.md +++ b/docs/tables/azure_compute_disk.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk +--- +title: "Steampipe Table: azure_compute_disk - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks." +--- -Azure Managed Disks are the new and recommended disk storage offering for use with Azure virtual machines for persistent storage of data. +# Table: azure_compute_disk - Query Azure Compute Disks using SQL + +Azure Compute Disks are durable, high-performance, secure disk storage for Azure Virtual Machines. They provide persistent, secured disk storage and support for industry-leading data protection capabilities. Azure Compute Disks can be used with Azure Virtual Machines to deliver high-performance and highly durable disk storage. + +## Table Usage Guide + +The 'azure_compute_disk' table provides insights into Azure Compute Disks within Azure Compute service. As a DevOps engineer, explore disk-specific details through this table, including disk size, creation time, encryption settings, and associated metadata. Utilize it to uncover information about disks, such as the ones with specific encryption settings, the type of disks, and their provisioning state. The schema presents a range of attributes of the Azure Compute Disk for your analysis, like the disk ID, creation time, disk state, and associated tags. ## Examples ### List of all premium tier compute disks +Determine the areas in which premium tier compute disks are being utilized within the Azure environment. This can be beneficial for cost management and resource optimization. ```sql select @@ -19,6 +29,7 @@ where ### List of unattached disks +Determine the areas in which there are unattached disks within your Azure Compute service. This can help you identify unused resources and potential cost savings. ```sql select @@ -32,6 +43,7 @@ where ### Size and performance info of each disk +Explore the performance and capacity of each disk in your Azure Compute environment. This information can be crucial for optimizing resource allocation and ensuring efficient data operations. ```sql select @@ -47,6 +59,7 @@ from ### List of compute disks which are not available in multiple az +Determine the areas in which certain compute disks are not available across multiple Azure availability zones. This is useful in identifying potential risks to data redundancy and disaster recovery plans. ```sql select @@ -62,6 +75,7 @@ where ### List of compute disks which are not encrypted with customer key +Discover the segments of your Azure compute disks that are not utilizing customer key encryption. This is beneficial in identifying potential security vulnerabilities and ensuring data protection standards are met. ```sql select @@ -71,4 +85,4 @@ from azure_compute_disk where encryption_type <> 'EncryptionAtRestWithCustomerKey'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_access.md b/docs/tables/azure_compute_disk_access.md index f01634a9..6e10452b 100644 --- a/docs/tables/azure_compute_disk_access.md +++ b/docs/tables/azure_compute_disk_access.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_access +--- +title: "Steampipe Table: azure_compute_disk_access - Query Azure Compute Disk Accesses using SQL" +description: "Allows users to query Azure Compute Disk Accesses" +--- -Disk access resource is required to use private link to export and import managed disks, first you create a disk access resource and link it to a virtual network in the same subscription by creating a private endpoint. Then, associate a disk or a snapshot with a disk access instance. +# Table: azure_compute_disk_access - Query Azure Compute Disk Accesses using SQL + +Azure Compute Disk Access is a feature within Microsoft Azure that enables and controls access to managed disks, snapshots, and images. It provides a secure way to grant permissions to read or write data from these resources. Disk Access resources are Azure Resource Manager resources that can be created and managed just like other Azure resources. + +## Table Usage Guide + +The 'azure_compute_disk_access' table provides insights into Disk Accesses within Azure Compute. As a DevOps engineer, explore specific details through this table, including the network access policy, disk encryption set ID, and associated metadata. Utilize it to uncover information about disk accesses, such as those with unrestricted network access, the associated disk encryption sets, and the verification of network access policies. The schema presents a range of attributes of the Disk Access for your analysis, like the resource ID, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure compute disk access to understand its state and group allocation. This can help you manage and optimize your resources effectively. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed disk accesses +Explore which disk accesses in your Azure Compute resource have failed. This is useful for diagnosing system issues and ensuring optimal performance of your resources. ```sql select @@ -30,4 +41,4 @@ from azure_compute_disk_access where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_encryption_set.md b/docs/tables/azure_compute_disk_encryption_set.md index cb9c97bb..d66369ca 100644 --- a/docs/tables/azure_compute_disk_encryption_set.md +++ b/docs/tables/azure_compute_disk_encryption_set.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_encryption_set +--- +title: "Steampipe Table: azure_compute_disk_encryption_set - Query Azure Compute Disk Encryption Sets using SQL" +description: "Allows users to query Azure Compute Disk Encryption Sets." +--- -Disk Encryption Set simplifies the key management for managed disks. When a disk encryption set is created, a system-assigned managed identity is created in Azure Active Directory (AD) and associated with the disk encryption set. +# Table: azure_compute_disk_encryption_set - Query Azure Compute Disk Encryption Sets using SQL + +Azure Disk Encryption is a capability that helps you encrypt your Windows and Linux IaaS virtual machine disks. Disk Encryption Sets are a resource in Azure that contain and manage the key for server-side encryption of Azure managed disks and snapshots. It simplifies the key management for disk encryption and allows you to use Customer Managed Keys for managed disks instead of platform-managed keys. + +## Table Usage Guide + +The 'azure_compute_disk_encryption_set' table provides insights into Disk Encryption Sets within Azure Compute. As a security engineer, explore Disk Encryption Set-specific details through this table, including the encryption type, key URL, and source vault. Utilize it to uncover information about encryption sets, such as those with server-side encryption and customer-managed keys. The schema presents a range of attributes of the Disk Encryption Set for your analysis, like the id, name, type, location, and associated tags. ## Examples ### Key vault associated with each disk encryption set +Identify the specific key vault associated with each disk encryption set in your Azure Compute environment. This is useful for managing and auditing your encryption keys and their usage. ```sql select @@ -17,6 +27,7 @@ from ### List of encryption sets which are not using customer managed key +Explore which encryption sets in Azure's Compute Disk Encryption are not utilizing customer-managed keys, providing a way to identify potential areas for enhancing data security practices. ```sql select @@ -33,6 +44,7 @@ where ### Identity info of each disk encryption set +Explore which disk encryption sets in your Azure Compute resources have specific identities associated with them. This can help in assessing security configurations and managing access control within your environment. ```sql select diff --git a/docs/tables/azure_compute_disk_metric_read_ops.md b/docs/tables/azure_compute_disk_metric_read_ops.md index 03b106bd..909fece2 100644 --- a/docs/tables/azure_compute_disk_metric_read_ops.md +++ b/docs/tables/azure_compute_disk_metric_read_ops.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_read_ops +--- +title: "Steampipe Table: azure_compute_disk_metric_read_ops - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks read operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_read_ops` table provides metric statistics at 5 minutes intervals for the most recent 5 days. +# Table: azure_compute_disk_metric_read_ops - Query Azure Compute Disks using SQL + +Azure Compute Disks are a type of Azure Storage that provide high-performance, durable block storage for Azure Virtual Machines. These disks are designed to support I/O-intensive workloads and offer seamless integration with Azure Virtual Machines. They provide consistent low-latency performance, deliver high IOPS/throughput, and ensure data durability and availability. + +## Table Usage Guide + +The 'azure_compute_disk_metric_read_ops' table provides insights into read operations metrics of Azure Compute Disks. As a DevOps engineer, explore specific details through this table, including the time grain, average, minimum, and maximum read operations. Utilize it to monitor and analyze the performance of your disks, such as those with high read operations, the average read operations over a period, and the peak read operations. The schema presents a range of attributes of the read operations metrics for your analysis, like the unit, timestamp, and total count. ## Examples ### Basic info +Explore the performance of Azure Compute Disks over time to identify potential bottlenecks or inefficiencies. This query provides a historical overview of disk operations, helping you pinpoint areas for optimization or resource allocation. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Determine the areas in which Azure compute disk read operations exceed an average of 10 bytes. This can be useful for identifying potential performance bottlenecks or areas where optimization may be beneficial. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_read_ops_daily.md b/docs/tables/azure_compute_disk_metric_read_ops_daily.md index e9bb1817..dcd46e1e 100644 --- a/docs/tables/azure_compute_disk_metric_read_ops_daily.md +++ b/docs/tables/azure_compute_disk_metric_read_ops_daily.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_read_ops_daily +--- +title: "Steampipe Table: azure_compute_disk_metric_read_ops_daily - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks daily read operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_read_ops_daily` table provides metric statistics at 24 hours intervals for the most recent 1 year. +# Table: azure_compute_disk_metric_read_ops_daily - Query Azure Compute Disks using SQL + +Azure Compute Disks are a key component of Azure Infrastructure-as-a-Service (IaaS) based solutions, providing high-performance, reliable, and resilient block storage for Azure Virtual Machines. They support a wide range of workloads like relational databases, high-volume transactional systems, and big data applications. Azure Compute Disks offer a variety of disk storage options to meet varying workload requirements. + +## Table Usage Guide + +The 'azure_compute_disk_metric_read_ops_daily' table provides insights into the daily read operations of Azure Compute Disks. As a system administrator or a DevOps engineer, you can explore disk-specific details through this table, including the total number of read operations, maximum and average read operations, and the time at which the maximum read operations occurred. Utilize it to monitor the performance of your disks, identify potential bottlenecks, and plan capacity. The schema presents a range of attributes of the disk read operations for your analysis, like the resource group name, subscription ID, time grain, and unit type. ## Examples ### Basic info +Explore the daily read operations metrics for Azure compute disks to understand usage patterns and performance. This can help in identifying any unusual activity or potential areas for optimization. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Explore which operations have an average higher than 10 bytes. This is useful for identifying potential areas of heavy data usage or inefficiency in your Azure compute disk metrics. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_read_ops_hourly.md b/docs/tables/azure_compute_disk_metric_read_ops_hourly.md index b9946142..d4950c58 100644 --- a/docs/tables/azure_compute_disk_metric_read_ops_hourly.md +++ b/docs/tables/azure_compute_disk_metric_read_ops_hourly.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_read_ops_hourly +--- +title: "Steampipe Table: azure_compute_disk_metric_read_ops_hourly - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks' hourly read operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_read_ops_hourly` table provides metric statistics at 1 hour intervals for the most recent 60 days. +# Table: azure_compute_disk_metric_read_ops_hourly - Query Azure Compute Disks using SQL + +Azure Compute Disks are data storage units available in Microsoft Azure, used to manage and store data persistently. These disks are designed to provide secure, scalable storage for virtual machines. They offer high-performance, durable storage for Azure Virtual Machines instances. + +## Table Usage Guide + +The 'azure_compute_disk_metric_read_ops_hourly' table provides insights into the read operations metrics of Azure Compute Disks on an hourly basis. As a DevOps engineer, you can use this table to explore disk-specific details such as the number of read operations, their time duration, and other related metadata. This can be particularly useful for monitoring disk performance, identifying potential bottlenecks, and ensuring optimal data management. The schema presents a range of attributes for your analysis, such as the disk name, resource group, subscription ID, and the count of read operations. ## Examples ### Basic info +Explore the performance of your Azure Compute Disks by analyzing the hourly read operations. This allows you to identify periods of high or low activity, assisting in capacity planning and troubleshooting performance issues. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +This query is useful to analyze disk operations that exceed an average of 10 bytes in Azure's Compute Disk service. It can help optimize system performance by identifying potential bottlenecks in disk operations. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_write_ops.md b/docs/tables/azure_compute_disk_metric_write_ops.md index ab2544d1..73e77301 100644 --- a/docs/tables/azure_compute_disk_metric_write_ops.md +++ b/docs/tables/azure_compute_disk_metric_write_ops.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_write_ops +--- +title: "Steampipe Table: azure_compute_disk_metric_write_ops - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks write operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_write_ops` table provides metric statistics at 5 minutes intervals for the most recent 5 days. +# Table: azure_compute_disk_metric_write_ops - Query Azure Compute Disks using SQL + +Azure Compute Disks are a type of storage that can be attached to Azure Virtual Machines. They provide persistent, secured, and highly reliable storage capabilities, allowing you to read and write data. Azure Compute Disks come in different performance tiers to support a variety of workloads and applications. + +## Table Usage Guide + +The 'azure_compute_disk_metric_write_ops' table provides insights into the write operations metrics of Azure Compute Disks. As a DevOps engineer, explore disk-specific details through this table, including total write operations, average write operations, and maximum write operations. Utilize it to monitor and analyze the performance of your Azure Compute Disks, identify any unusual increase in write operations, and optimize disk usage. The schema presents a range of attributes of the Compute Disk write operations for your analysis, like the average, maximum, minimum, and total count of write operations. ## Examples ### Basic info +Explore which Azure Compute Disk has the most write operations over time. This can help in understanding disk usage patterns and planning for potential disk capacity upgrades. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Explore disk operations that have an average higher than 10 bytes. This can be useful to monitor and manage storage performance, ensuring efficient data handling and optimal system operation. ```sql select @@ -37,4 +48,4 @@ where average > 10 order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_write_ops_daily.md b/docs/tables/azure_compute_disk_metric_write_ops_daily.md index 96ec0edc..9b0a7d5b 100644 --- a/docs/tables/azure_compute_disk_metric_write_ops_daily.md +++ b/docs/tables/azure_compute_disk_metric_write_ops_daily.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_write_ops_daily +--- +title: "Steampipe Table: azure_compute_disk_metric_write_ops_daily - Query Azure Compute Disks using SQL" +description: "Allows users to query daily write operations metrics of Azure Compute Disks." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_write_ops_daily` table provides metric statistics at 24 hours intervals for the most recent 1 year. +# Table: azure_compute_disk_metric_write_ops_daily - Query Azure Compute Disks using SQL + +Azure Compute Disks are a key component of the Azure Infrastructure-as-a-Service (IaaS) offering. These disks provide durable, secure, and scalable storage for the data that drives your applications and services. Azure Compute Disks support a variety of workloads, like relational databases, large-scale NoSQL databases, and enterprise applications, with the flexibility and security required for Azure-based virtual machines. + +## Table Usage Guide + +The 'azure_compute_disk_metric_write_ops_daily' table provides insights into the daily write operations metrics of Azure Compute Disks. As a system administrator or a DevOps engineer, you can explore disk-specific details through this table, including the time grain, average, minimum, and maximum write operations. Utilize it to uncover information about disk performance, such as spikes in write operations, periods of low activity, and overall write operation trends. The schema presents a range of attributes of the disk's write operations for your analysis, like the unit, timestamp, and the total count of write operations. ## Examples ### Basic info +Analyze the daily write operations on Azure Compute Disks to understand performance trends and identify potential areas of concern. This can help in proactive resource management and ensure optimal application performance. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Uncover the details of disk operations in your Azure Compute instances that exceed an average of 10 bytes. This allows you to monitor and manage disk usage effectively, ensuring optimal performance. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_write_ops_hourly.md b/docs/tables/azure_compute_disk_metric_write_ops_hourly.md index a514ed5e..3eafbcc1 100644 --- a/docs/tables/azure_compute_disk_metric_write_ops_hourly.md +++ b/docs/tables/azure_compute_disk_metric_write_ops_hourly.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_write_ops_hourly +--- +title: "Steampipe Table: azure_compute_disk_metric_write_ops_hourly - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks metrics on an hourly basis." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_write_ops_hourly` table provides metric statistics at 1 hour intervals for the most recent 60 days. +# Table: azure_compute_disk_metric_write_ops_hourly - Query Azure Compute Disks using SQL + +Azure Compute Disks is a service that allows you to create and manage disks for your virtual machines. These disks can be used as system disks or data disks, and are available in different performance tiers to meet the needs of various applications and workloads. Azure Compute Disks also provide capabilities such as disk snapshots and disk backups for data protection and recovery. + +## Table Usage Guide + +The 'azure_compute_disk_metric_write_ops_hourly' table provides insights into the write operations metrics of Azure Compute Disks on an hourly basis. As a system administrator, you can use this table to explore the write operations performance of your disks, including the frequency and volume of data written to the disks. The table offers detailed metrics such as the timestamp of the data, minimum, maximum, and average write operations, and total count of write operations. Utilize it to monitor your disk performance, identify potential bottlenecks, and optimize your disk utilization for improved application performance. The schema presents a range of attributes of the disk write operations for your analysis, like the disk name, resource group, subscription ID, and more. ## Examples ### Basic info +Explore the performance of Azure compute disks by examining hourly write operations. This information can help identify potential bottlenecks or performance issues, allowing you to optimize your disk usage. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Explore which operations have an above-average rate, allowing you to assess potential areas of high activity or strain on your system. This can be useful in managing resources and identifying potential bottlenecks or areas for optimization. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_image.md b/docs/tables/azure_compute_image.md index c8a5dc43..50b1157a 100644 --- a/docs/tables/azure_compute_image.md +++ b/docs/tables/azure_compute_image.md @@ -1,10 +1,21 @@ -# Table: azure_compute_image +--- +title: "Steampipe Table: azure_compute_image - Query Azure Compute Images using SQL" +description: "Allows users to query Azure Compute Images." +--- + +# Table: azure_compute_image - Query Azure Compute Images using SQL + +Azure Compute Images are resources within Microsoft Azure that represent a virtual machine's operating system, applications, and configuration settings. These images can be used to create multiple identical virtual machines within Azure. They provide an efficient way to package, provision, and manage VMs in your cloud environment. + +## Table Usage Guide + +The 'azure_compute_image' table provides insights into Azure Compute Images. As a DevOps engineer, explore image-specific details through this table, including publisher details, offer information, and associated metadata. Utilize it to uncover information about images, such as those used in multiple VM deployments, the publishers of these images, and the verification of image configurations. The schema presents a range of attributes of the Azure Compute Image for your analysis, like the image name, resource group, publisher, offer, SKU, and version. -Compute Engine offers many preconfigured public images that have compatible Linux or Windows operating systems. Compute Engine uses selected image to create a persistent boot disk for each instance. ## Examples ### Basic compute image info +Explore the types and regional distribution of virtual machine images in your Azure environment. This can help in understanding the configuration and usage patterns of virtual machines, thereby aiding in resource management and optimization. ```sql select @@ -19,6 +30,7 @@ from ### Storage profile's OS disk info of each compute image +Determine the storage characteristics of each compute image in your Azure environment. This could help optimize storage utilization and cost by revealing details such as disk size, snapshot ID, storage account type, state, and disk type. ```sql select @@ -34,6 +46,7 @@ from ### List of compute images where disk storage type is Premium_LRS +Determine the areas in which your compute images are using premium disk storage type. This query can be useful for understanding your storage usage and optimizing costs. ```sql select @@ -51,6 +64,7 @@ where ### List of compute images which do not have owner or app_id tag key +Discover the segments that lack either an 'owner' or 'app_id' tag key within your Azure compute images. This query can be used to identify potential gaps in your image tagging strategy, which can help improve resource tracking and management. ```sql select @@ -61,4 +75,4 @@ from where tags -> 'owner' is null or tags -> 'app_id' is null; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_resource_sku.md b/docs/tables/azure_compute_resource_sku.md index 31d9dfec..ddf6f971 100644 --- a/docs/tables/azure_compute_resource_sku.md +++ b/docs/tables/azure_compute_resource_sku.md @@ -1,10 +1,20 @@ -# Table: azure_compute_resource_sku +--- +title: "Steampipe Table: azure_compute_resource_sku - Query Azure Compute Resource SKUs using SQL" +description: "Allows users to query Azure Compute Resource SKUs" +--- -Types of sku available for azure compute resources. +# Table: azure_compute_resource_sku - Query Azure Compute Resource SKUs using SQL + +Azure Compute Resource SKUs represent the purchasable units for Azure resources, providing details about the available resources for a subscription, including their tier, size, and corresponding cost. They are used to define the size and capacity of the resources that you can provision within your Azure subscription. Each SKU represents a specific combination of resource type, tier, and size. + +## Table Usage Guide + +The 'azure_compute_resource_sku' table provides insights into the available SKUs for Azure Compute Resources. As a DevOps engineer, explore SKU-specific details through this table, including their tier, size, and corresponding cost. Utilize it to uncover information about SKUs, such as their capacity, family, kind, and locations. The schema presents a range of attributes of the SKU for your analysis, like the resource type, tier, size, and restrictions. ## Examples ### Compute resources sku info +Determine the characteristics of your Azure compute resources, such as their tier, size, and family. This is useful for understanding the specifics of your current resources and can aid in planning future resource allocation or optimization. ```sql select @@ -19,6 +29,7 @@ from ### Azure compute resources and their capacity +Identify the capacity range of Azure compute resources to efficiently manage and allocate your cloud resources. ```sql select @@ -32,6 +43,7 @@ from ### List of all premium type disks and location +Explore which premium type disks are in use and their locations. This is useful to manage resources and understand their distribution across various locations. ```sql select diff --git a/docs/tables/azure_compute_snapshot.md b/docs/tables/azure_compute_snapshot.md index 326678dd..3c51646b 100644 --- a/docs/tables/azure_compute_snapshot.md +++ b/docs/tables/azure_compute_snapshot.md @@ -1,10 +1,20 @@ -# Table: azure_compute_snapshot +--- +title: "Steampipe Table: azure_compute_snapshot - Query Azure Compute Snapshots using SQL" +description: "Allows users to query Azure Compute Snapshots" +--- -A snapshot is a full, read-only copy of a virtual hard drive (VHD). +# Table: azure_compute_snapshot - Query Azure Compute Snapshots using SQL + +Azure Compute Snapshots are a point-in-time copy of data. They are used to back up data and can be used to restore a virtual machine to the state at the time of the snapshot. Snapshots are incremental, capturing only the changes since the last snapshot, and are thus space-efficient. + +## Table Usage Guide + +The 'azure_compute_snapshot' table provides insights into snapshots within Azure Compute. As a DevOps engineer, explore snapshot-specific details through this table, including snapshot state, creation time, and associated metadata. Utilize it to uncover information about snapshots, such as those that are incremental, the disk size, and the source disk. The schema presents a range of attributes of the snapshot for your analysis, like the snapshot ID, resource group, and associated tags. ## Examples ### Disk info of each snapshot +Analyze the settings to understand the disk information for each snapshot in Azure, including its size and encryption set ID, which can help in managing storage and security aspects. This is particularly useful in assessing the storage consumption and encryption status of each snapshot. ```sql select @@ -19,6 +29,7 @@ from ### List of snapshots which are publicly accessible +Discover the segments that contain snapshots which are publicly accessible. This query is useful to identify potential security risks by pinpointing areas where data might be exposed. ```sql select @@ -32,6 +43,7 @@ where ### List of all incremental type snapshots +Gain insights into all snapshots that are incremental in nature within the Azure compute service. This is useful for managing storage and tracking changes made over time. ```sql select diff --git a/docs/tables/azure_compute_ssh_key.md b/docs/tables/azure_compute_ssh_key.md index 73168e3c..90af5484 100644 --- a/docs/tables/azure_compute_ssh_key.md +++ b/docs/tables/azure_compute_ssh_key.md @@ -1,10 +1,20 @@ -# Table: azure_compute_ssh_key +--- +title: "Steampipe Table: azure_compute_ssh_key - Query Azure Compute SSH Keys using SQL" +description: "Allows users to query Azure Compute SSH Keys" +--- -Azure SSH public key used by VMs. +# Table: azure_compute_ssh_key - Query Azure Compute SSH Keys using SQL + +Azure Compute is a service within Microsoft Azure that provides on-demand processing power and infrastructure for applications. It allows you to create and manage virtual machines, containers, and batch jobs, as well as supports remote application access via SSH keys. Azure Compute SSH Keys are used for secure, encrypted connections to your Azure resources. + +## Table Usage Guide + +The 'azure_compute_ssh_key' table provides insights into SSH Keys within Azure Compute. As a DevOps engineer, explore SSH Key-specific details through this table, including the associated virtual machine, key type, and key data. Utilize it to uncover information about SSH Keys, such as those associated with specific virtual machines, the type of SSH Key being used, and the actual key data for verification purposes. The schema presents a range of attributes of the SSH Key for your analysis, like the virtual machine id, key type, and key data. ## Examples ### Retrieve SSH public key by name +Assess the elements within your Azure Compute resources to identify a specific SSH public key associated with a given name. This can help in verifying access permissions or troubleshooting connectivity issues. ```sql select @@ -17,6 +27,7 @@ where ``` ### List compute virtual machines using SSH public key +Explore which virtual machines are using a particular SSH public key. This is useful for managing and securing your virtual machine access by keeping track of the SSH keys in use. ```sql select @@ -26,4 +37,4 @@ from azure_compute_virtual_machine as m, jsonb_array_elements(linux_configuration_ssh_public_keys) as s left join azure_compute_ssh_key as k on k.public_key = s ->> 'keyData'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine.md b/docs/tables/azure_compute_virtual_machine.md index 49256f01..1e7b005c 100644 --- a/docs/tables/azure_compute_virtual_machine.md +++ b/docs/tables/azure_compute_virtual_machine.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine +--- +title: "Steampipe Table: azure_compute_virtual_machine - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machines." +--- -Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. +# Table: azure_compute_virtual_machine - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service within Microsoft Azure that allows you to deploy and manage virtual machines (VMs). It provides the flexibility of virtualization for a wide range of computing solutions—development and testing, running applications, and extending your datacenter. Azure Virtual Machines provide on-demand, high-scale, secure, virtualized infrastructure using Windows servers or Linux servers. + +## Table Usage Guide + +The 'azure_compute_virtual_machine' table provides insights into Virtual Machines within Azure Compute. As a DevOps engineer, explore VM-specific details through this table, including VM sizes, operating systems, network interfaces, and associated metadata. Utilize it to uncover information about VMs, such as their power states, the virtual networks they are associated with, and the disks they use. The schema presents a range of attributes of the VM for your analysis, like the VM ID, creation date, location, and associated tags. ## Examples ### Virtual machine configuration info +Analyze the settings to understand the configuration and status of your virtual machines in Azure. This can assist in managing machine resources, tracking machine states, and ensuring optimal utilization of your Azure cloud resources. ```sql select @@ -22,6 +32,7 @@ from ``` ### Virtual machine count in each region +Gain insights into the distribution of virtual machines across different regions. This helps in understanding resource allocation and planning for capacity management. ```sql select @@ -34,6 +45,7 @@ group by ``` ### List of VMs whose OS disk is not encrypted by customer managed key +Discover the segments that include virtual machines (VMs) where the operating system disk is not encrypted using a customer-managed key. This can be useful for identifying potential security risks and ensuring compliance with data protection policies. ```sql select @@ -47,6 +59,7 @@ where ``` ### List of VMs provisioned with undesired(for example Standard_D8s_v3 and Standard_DS3_v3 is desired) sizes. +Explore which virtual machines have been provisioned with sizes other than the desired ones. This is useful for identifying potential inefficiencies or mismatches in resource allocation. ```sql select @@ -61,6 +74,7 @@ group by ``` ### Availability set info of VMs +Explore which virtual machines are part of a specific availability set in Azure. This can help you understand how your VMs are distributed across fault and update domains, allowing for better management of redundancy and availability. ```sql select @@ -75,6 +89,7 @@ from ``` ### List of all spot type VM and their eviction policy +Explore the comprehensive list of all spot type Virtual Machines and their corresponding eviction policies. This information can be used to understand and manage resource allocation and cost-efficiency in your Azure cloud environment. ```sql select @@ -88,6 +103,7 @@ where ``` ### Disk Storage Summary, by VM +Explore the disk storage usage across different virtual machines in your Azure environment. This helps in managing resources and planning for storage needs more effectively. ```sql select @@ -104,6 +120,7 @@ order by ``` ### View Network Security Group Rules for a VM +Discover the security rules applied to a specific virtual machine in your Azure network. This query is useful for understanding the security parameters and restrictions currently in place for a given machine. ```sql select @@ -121,6 +138,7 @@ where ``` ### List virtual machines with user assigned identities +Explore which virtual machines have user assigned identities. This can be beneficial for managing access control and ensuring secure operations in your Azure environment. ```sql select @@ -140,6 +158,7 @@ where ``` ### List security profile details +Explore the security profiles of your virtual machines in Azure to understand if the 'encryption at host' setting is enabled. This can aid in assessing your data security and compliance. ```sql select @@ -148,4 +167,4 @@ select security_profile -> 'encryptionAtHost' as encryption_at_host from azure_compute_virtual_machine; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md index dcde1adb..4724bc50 100644 --- a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md +++ b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_metric_cpu_utilization +--- +title: "Steampipe Table: azure_compute_virtual_machine_metric_cpu_utilization - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machine CPU Utilization metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_virtual_machine_metric_cpu_utilization` table provides metric statistics at 5 minutes intervals for the most recent 5 days. +# Table: azure_compute_virtual_machine_metric_cpu_utilization - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service within Microsoft Azure that provides on-demand, high-scale, secure, virtualized infrastructure using Microsoft's advanced data centers. With Azure Compute, users can deploy a wide range of computing solutions, including virtual machines (VMs). This service is particularly useful for workloads that require high-performance computing, analytics, AI, real-time applications, and low-latency applications. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_metric_cpu_utilization' table provides insights into CPU utilization metrics of Azure Compute Virtual Machines. As a systems administrator, you can explore VM-specific details through this table, including the average, minimum, and maximum CPU utilization, and the timestamps for these metrics. Utilize it to uncover information about VM performance, such as identifying VMs with high CPU utilization, understanding the CPU usage pattern over time, and taking necessary actions to optimize resource usage. The schema presents a range of attributes of the VM CPU utilization metrics for your analysis, like the average CPU utilization, minimum CPU utilization, maximum CPU utilization, and the timestamps for these metrics. ## Examples ### Basic info +Explore the use patterns of virtual machines in your Azure environment by analyzing CPU utilization metrics. This can help identify periods of high demand or underutilization, allowing for better resource management and cost optimization. ```sql select @@ -22,6 +32,7 @@ order by ``` ### CPU Over 80% average +Determine the areas in which virtual machine CPU utilization exceeds 80% on average. This can help in identifying potential performance issues and ensuring efficient resource management. ```sql select @@ -37,4 +48,4 @@ where average > 80 order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md index 6d3b0a96..3503a07e 100644 --- a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md +++ b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_metric_cpu_utilization_daily +--- +title: "Steampipe Table: azure_compute_virtual_machine_metric_cpu_utilization_daily - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machine daily CPU utilization metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_virtual_machine_metric_cpu_utilization_daily` table provides metric statistics at 24 hours intervals for the most recent 1 year. +# Table: azure_compute_virtual_machine_metric_cpu_utilization_daily - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service that provides on-demand, scalable compute resources in Microsoft Azure. It allows you to deploy and manage virtual machines and containers, and supports a range of operating systems, tools, and frameworks. Virtual machines are a core part of Azure Compute, providing the ability to quickly scale up or down with demand, and offering a range of options for CPU, memory, storage, and networking capacity. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_metric_cpu_utilization_daily' table provides insights into daily CPU utilization metrics of Azure Compute Virtual Machines. As a DevOps engineer, you can use this table to monitor and analyze the daily CPU usage of your virtual machines, helping you to understand the performance and resource demands of your applications and services. The schema presents a range of attributes for your analysis, such as the maximum, minimum, and average CPU utilization, the time of the metric, and the resource group and subscription ID of the virtual machine. Utilize this table to identify trends in resource usage, detect potential issues, and optimize your Azure Compute resources. ## Examples ### Basic info +Explore which Azure virtual machines have high CPU utilization over time. This can help in managing resources efficiently by identifying machines that may need upgrades or load balancing. ```sql select @@ -22,6 +32,7 @@ order by ``` ### CPU Over 80% average +Determine the areas in which the average CPU utilization of Azure virtual machines exceeds 80%. This query can help identify potential performance issues and optimize resource allocation. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md index b6564078..0945ed87 100644 --- a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md +++ b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_metric_cpu_utilization_hourly +--- +title: "Steampipe Table: azure_compute_virtual_machine_metric_cpu_utilization_hourly - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machines' CPU Utilization metrics on an hourly basis." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_virtual_machine_metric_cpu_utilization_hourly` table provides metric statistics at 1 hour intervals for the most recent 60 days. +# Table: azure_compute_virtual_machine_metric_cpu_utilization_hourly - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service that provides on-demand, scalable compute resources in the cloud. It allows users to create and manage virtual machines (VMs) that run on Microsoft's data centers. The service is designed to support a wide range of workloads, including web applications, batch processing, and high-performance computing. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_metric_cpu_utilization_hourly' table provides insights into the CPU utilization metrics of Azure Compute Virtual Machines on an hourly basis. As a system administrator, you can use this table to monitor and analyze the CPU usage of your virtual machines, helping you to optimize resource allocation and performance. The table provides detailed information such as the maximum and average CPU utilization, the time of the metric, and the resource group of the VM. Utilize it to uncover trends in CPU usage, identify potential performance bottlenecks, and make informed decisions about scaling and capacity planning. The schema presents a range of attributes of the VM's CPU utilization for your analysis, like the maximum and average utilization, the timestamp of the metric, and the resource group of the VM. ## Examples ### Basic info +Explore which virtual machines in your Azure Compute environment have the highest CPU utilization over the past hour. This can help you identify potential performance issues and optimize resource allocation. ```sql select @@ -22,6 +32,7 @@ order by ``` ### CPU Over 80% average +Analyze the performance of Azure virtual machines by identifying instances where the average CPU utilization exceeds 80%. This can be useful for spotting potential bottlenecks or performance issues in your infrastructure. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_scale_set.md b/docs/tables/azure_compute_virtual_machine_scale_set.md index 303fe324..65b4b8c3 100644 --- a/docs/tables/azure_compute_virtual_machine_scale_set.md +++ b/docs/tables/azure_compute_virtual_machine_scale_set.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_scale_set +--- +title: "Steampipe Table: azure_compute_virtual_machine_scale_set - Query Azure Compute Virtual Machine Scale Sets using SQL" +description: "Allows users to query Azure Compute Virtual Machine Scale Sets." +--- -Azure virtual machine scale sets let you create and manage a group of load balanced VMs. The number of VM instances can automatically increase or decrease in response to demand or a defined schedule. Scale sets provide high availability to your applications, and allow you to centrally manage, configure, and update a large number of VMs. +# Table: azure_compute_virtual_machine_scale_set - Query Azure Compute Virtual Machine Scale Sets using SQL + +Azure Compute Virtual Machine Scale Sets are a service that allows you to deploy and manage a set of identical, auto-scaling virtual machines. You can scale the number of VMs in the scale set manually, or define rules to auto-scale based on resource usage like CPU, memory demand, or network traffic. An Azure load balancer then distributes network traffic to the VM instances in the scale set. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_scale_set' table provides insights into Virtual Machine Scale Sets within Azure Compute. As a DevOps engineer, explore scale set-specific details through this table, including scaling configurations, virtual machine profiles, and associated metadata. Utilize it to uncover information about scale sets, such as those with specific scaling policies, the network configurations of the scale sets, and the verification of virtual machine profiles. The schema presents a range of attributes of the Virtual Machine Scale Set for your analysis, like the scale set name, resource group, location, and associated tags. ## Examples ### Basic info +Explore which virtual machine scale sets are located in specific regions and resource groups within your Azure Compute environment. This enables effective management and allocation of resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### List Standard tier virtual machine scale set +Explore the standard tier virtual machine scale sets within your Azure environment. This is useful for understanding your resource allocation and managing your cloud infrastructure more efficiently. ```sql select @@ -29,4 +40,4 @@ from azure_compute_virtual_machine_scale_set where sku_tier = 'Standard'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md b/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md index 092f4ff4..bc2a0130 100644 --- a/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md +++ b/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_scale_set_network_interface +--- +title: "Steampipe Table: azure_compute_virtual_machine_scale_set_network_interface - Query Azure Compute Virtual Machine Scale Set Network Interfaces using SQL" +description: "Allows users to query Azure Compute Virtual Machine Scale Set Network Interfaces." +--- -A network interface enables an Azure VM to communicate with internet, Azure, and on-premises resources. +# Table: azure_compute_virtual_machine_scale_set_network_interface - Query Azure Compute Virtual Machine Scale Set Network Interfaces using SQL + +A Virtual Machine Scale Set Network Interface in Azure is an interconnection between a Virtual Machine Scale Set and a Virtual Network. These network interfaces enable the virtual machines within the scale set to communicate with internet, Azure, and on-premises resources. Network security group rules and route tables can be applied directly to the network interfaces to filter network traffic. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_scale_set_network_interface' table provides insights into Network Interfaces within Azure Compute Virtual Machine Scale Sets. As a DevOps engineer, explore network interface-specific details through this table, including the IP configuration, network security group association, and subnet details. Utilize it to uncover information about network interfaces, such as their private and public IP addresses, MAC address, and the states of IP forwarding and accelerated networking. The schema presents a range of attributes of the network interfaces for your analysis, like the network interface ID, IP configuration, network security group, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure virtual machine scale sets by understanding the provisioning state and location. This can be beneficial in managing resources and optimizing your cloud infrastructure. ```sql select @@ -19,6 +29,7 @@ from ``` ### List network interfaces with IP forwarding rule enabled +Explore the configuration of network interfaces that have the IP forwarding rule enabled. This can be useful in identifying network instances that may allow for IP packet forwarding, which can be critical for understanding network traffic flow and potential security implications. ```sql select @@ -33,6 +44,7 @@ where ``` ### List network interfaces with accelerated networking enabled +Explore which network interfaces have the accelerated networking feature enabled. This can be particularly useful for identifying areas where network performance can be improved. ```sql select @@ -47,6 +59,7 @@ where ``` ### Get scale set virtual machine details for scale set network interface +Analyze the details of virtual machine scale sets to understand the associated network interfaces. This is beneficial in managing the configuration and performance of your network resources in a large-scale cloud environment. ```sql select @@ -60,4 +73,4 @@ from azure_compute_virtual_machine_scale_set_vm as v where i.virtual_machine ->> 'id' = v.id; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_scale_set_vm.md b/docs/tables/azure_compute_virtual_machine_scale_set_vm.md index 347ae295..220f1129 100644 --- a/docs/tables/azure_compute_virtual_machine_scale_set_vm.md +++ b/docs/tables/azure_compute_virtual_machine_scale_set_vm.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_scale_set_vm +--- +title: "Steampipe Table: azure_compute_virtual_machine_scale_set_vm - Query Azure Compute Virtual Machine Scale Sets using SQL" +description: "Allows users to query Azure Compute Virtual Machine Scale Sets" +--- -You can scale the number of virtual machines in the scale set manually, or define rules to autoscale based on resource usage like CPU, memory demand, or network traffic. An Azure load balancer then distributes traffic to the virtual machine instances in the scale set. +# Table: azure_compute_virtual_machine_scale_set_vm - Query Azure Compute Virtual Machine Scale Sets using SQL + +Azure Compute is a cloud computing service that provides on-demand, high-scale compute capacity for applications and workloads. One of its resources, Virtual Machine Scale Sets, allows for the creation, management, and scaling of a set of identical, load-balanced VMs. This service is ideal for building large-scale services, such as big data, containerized applications, and distributed systems. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_scale_set_vm' table provides insights into Virtual Machine Scale Sets within Azure Compute. As a DevOps engineer, explore specific details through this table, including the status, location, and configuration of each VM in the scale set. Utilize it to uncover information about VMs, such as their operating system, network profile, and associated metadata. The schema presents a range of attributes of the VM for your analysis, like the VM ID, instance ID, virtual network, and associated tags. ## Examples ### Basic info +Explore which virtual machines are part of your Azure scale set to manage resources effectively. This can help in identifying instances where resources are underutilized or overprovisioned, ensuring optimal resource allocation and cost management. ```sql select @@ -20,6 +30,7 @@ from ``` ### List Standard tier scale set virtual machine +Explore which scale set virtual machines operate on the 'Standard' tier. This query is useful for understanding the distribution and usage of different tiered resources within your Azure environment. ```sql select @@ -35,6 +46,7 @@ where ``` ### List all virtual machines under a specific scale set +Explore which virtual machines are part of a specific set to understand the scale and tier of your Azure computing resources. This aids in resource management and capacity planning. ```sql select @@ -50,6 +62,7 @@ where ``` ### View Network Security Group Rules for a virtual machine +Determine the security rules applied to a specific virtual machine within your network. This is useful for assessing the security measures in place and identifying any potential vulnerabilities. ```sql select diff --git a/docs/tables/azure_container_group.md b/docs/tables/azure_container_group.md index cde851eb..3e6c74c8 100644 --- a/docs/tables/azure_container_group.md +++ b/docs/tables/azure_container_group.md @@ -1,10 +1,20 @@ -# Table: azure_container_group +--- +title: "Steampipe Table: azure_container_group - Query Azure Container Instances using SQL" +description: "Allows users to query Azure Container Groups." +--- -An Azure Container Group is a specific type of Azure Container Instances resource that allows you to group multiple containers together and run them as a single unit. A container group can contain one or more containers that are tightly coupled and need to be deployed and managed together. For example, you may have a microservices-based application that consists of multiple containers, such as a front-end container, a back-end container, and a database container. You can create an Azure Container Group to deploy and manage all these containers as a single entity. +# Table: azure_container_group - Query Azure Container Instances using SQL + +Azure Container Instances offers the fastest and simplest way to run a container in Azure, without having to provision any virtual machines and without having to adopt a higher-level service. It is a solution for any scenario that can operate in isolated containers, without orchestration. Run event-driven applications, quickly deploy from your container development pipelines, and run data processing and build jobs. + +## Table Usage Guide + +The 'azure_container_group' table provides insights into Container Groups within Azure Container Instances. As a DevOps engineer, explore Container Group-specific details through this table, including the containers within the group, the image they are using, the commands they are running, and associated metadata. Utilize it to uncover information about Container Groups, such as their current state, the events that have occurred within them, and the configurations they have been given. The schema presents a range of attributes of the Container Group for your analysis, like the group name, creation date, associated containers, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure Container Groups to understand their provisioning states and restart policies. This is useful for assessing the performance and management of your resources across different regions. ```sql select @@ -19,6 +29,7 @@ from ``` ### Get encryption details of each group +Uncover the details of encryption for each group within your Azure Container service. This will help you assess the security measures in place and ensure that each group is properly protected. ```sql select @@ -32,6 +43,7 @@ from ``` ### List groups that have restart policy set to `OnFailure` +Discover the segments that have their restart policy set to 'OnFailure' in the Azure Container Group. This can be useful in assessing system resilience and planning for potential system failures. ```sql select @@ -46,6 +58,7 @@ where ``` ### Count groups by operation type +Analyze the distribution of Azure container groups based on their operating system type. This can provide insights into the predominant OS types used within your container groups, aiding in system optimization and resource planning. ```sql select @@ -58,6 +71,7 @@ group by ``` ### Get IP address details of each group +Explore which containers in your Azure environment are associated with specific IP addresses. This can help you manage your network configuration and identify potential bottlenecks or security risks. ```sql select @@ -72,6 +86,7 @@ from ``` ### Get image registry credential details of each group +Explore the authentication details for image registries used by different container groups. This can be useful to ensure proper security measures are in place and to manage access to your image repositories. ```sql select @@ -87,6 +102,7 @@ from ``` ### Get DNS configuration details of each group +Explore the DNS configuration details for each container group in Azure. This can help you understand how your container groups are configured for network communication, aiding in network troubleshooting and optimization. ```sql select @@ -97,4 +113,4 @@ select dns_config ->> 'Options' as options from azure_container_group; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_container_registry.md b/docs/tables/azure_container_registry.md index e5514fe9..5c4b533c 100644 --- a/docs/tables/azure_container_registry.md +++ b/docs/tables/azure_container_registry.md @@ -1,10 +1,20 @@ -# Table: azure_container_registry +--- +title: "Steampipe Table: azure_container_registry - Query Azure Container Registries using SQL" +description: "Allows users to query Azure Container Registries for detailed information about their configuration, status, and associated metadata." +--- -The Azure container registry is Microsoft's own hosting platform for Docker images. It is a private registry where you can store and manage private docker container images and other related artifacts. These images can then be pulled and run locally or used for container-based deployments to hosting platforms. +# Table: azure_container_registry - Query Azure Container Registries using SQL + +Azure Container Registry is a managed Docker registry service provided by Microsoft Azure for storing and managing private Docker container images and related artifacts. It allows you to build, store, and manage container images and artifacts in a private registry for all types of container deployments. This service also integrates well with existing container development and deployment pipelines. + +## Table Usage Guide + +The 'azure_container_registry' table provides insights into Container Registries within Microsoft Azure. As a DevOps engineer, explore registry-specific details through this table, including SKU, login server, creation date, and associated metadata. Utilize it to uncover information about registries, such as those with admin user enabled, the network rule set, and the encryption status. The schema presents a range of attributes of the Container Registry for your analysis, like the registry name, resource group, region, and associated tags. ## Examples ### Basic info +Explore the status and details of your Azure Container Registry. This query can help you assess the creation date, region, and the tier of your registry, providing insights into your resource usage and allocation. ```sql select @@ -19,6 +29,7 @@ from ``` ### List registries not encrypted with a customer-managed key +Explore which Azure container registries are not encrypted with a customer-managed key. This is useful for identifying potential security vulnerabilities in your Azure cloud environment. ```sql select @@ -30,6 +41,7 @@ from ``` ### List registries not configured with virtual network service endpoint +Analyze the settings to understand which Azure Container Registries are not configured with a virtual network service endpoint. This is useful to pinpoint potential security gaps where data might be exposed to untrusted networks. ```sql select @@ -44,6 +56,7 @@ where ``` ### List registries with admin user account enabled +Discover the segments where the admin user account is enabled in the Azure container registry. This is useful for identifying potential security risks and ensuring the proper configuration of user permissions. ```sql select @@ -54,4 +67,4 @@ from azure_container_registry where admin_user_enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_cosmosdb_account.md b/docs/tables/azure_cosmosdb_account.md index 221dd1c7..c03a1f76 100644 --- a/docs/tables/azure_cosmosdb_account.md +++ b/docs/tables/azure_cosmosdb_account.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_account +--- +title: "Steampipe Table: azure_cosmosdb_account - Query Azure Cosmos DB Accounts using SQL" +description: "Allows users to query Azure Cosmos DB Accounts to obtain key information such as account name, resource group, location, and more. The table provides a comprehensive view of these resources, including the account's offer type, IP rules, and virtual network rules." +--- -Azure Cosmos DB is a fully managed NoSQL database service for modern app development. +# Table: azure_cosmosdb_account - Query Azure Cosmos DB Accounts using SQL + +Azure Cosmos DB is a fully managed NoSQL database service for modern app development with guaranteed single-digit millisecond response times and 99.999-percent availability backed by SLAs, automatic and instant scalability, and open source APIs for MongoDB and Cassandra. It offers multi-mastering feature by automatically indexing all data and allowing massively parallel operations. Azure Cosmos DB provides native support for NoSQL and OSS APIs, including MongoDB, Cassandra, Gremlin, et al. + +## Table Usage Guide + +The 'azure_cosmosdb_account' table provides insights into Azure Cosmos DB Accounts. As a DevOps engineer, explore account-specific details through this table, including the account's offer type, IP rules, and virtual network rules. Utilize it to uncover information about accounts, such as their locations, enabled capabilities, and associated tags. The schema presents a range of attributes of the Azure Cosmos DB Account for your analysis, like the account name, resource group, read and write locations, and more. ## Examples ### List of database accounts where automatic failover is not enabled +Discover the segments that have automatic failover disabled in their database accounts, which can be critical in maintaining seamless service during unexpected outages. This could be useful in identifying potential vulnerabilities in your database setup. ```sql select @@ -19,6 +29,7 @@ where ``` ### List of database accounts which allows traffic from all networks, including the public Internet. +Determine the areas in which database accounts are potentially vulnerable by identifying those that allow traffic from all networks, including the public internet. This can help in enhancing security by restricting access to specific networks. ```sql select @@ -32,6 +43,7 @@ where ``` ### List of database accounts where multiple write location is not enabled +Discover the segments that have not enabled multiple write locations within their Azure CosmosDB accounts. This can be useful in identifying potential areas of risk or inefficiency, as enabling multiple write locations can increase data redundancy and availability. ```sql select @@ -45,6 +57,7 @@ where ``` ### Failover policy info for the database accounts +Gain insights into the priority and location details of failover policies for your Azure CosmosDB accounts. This helps in strategizing disaster recovery and business continuity plans. ```sql select @@ -57,6 +70,7 @@ from ``` ### Consistency policy info for each account +Analyze the consistency policy details of each account to understand the maximum interval, staleness prefix, account offer type, and default consistency level. This aids in optimizing data consistency and performance in Azure Cosmos DB accounts. ```sql select @@ -70,6 +84,7 @@ from ``` ### Get backup policy for accounts having periodic backups enabled +Determine the areas in which Azure CosmosDB accounts have periodic backups enabled to assess their backup policies. This is useful for understanding the frequency of backups and the retention period, ensuring data safety and compliance with data retention policies. ```sql select @@ -85,6 +100,7 @@ where ``` ### Get private endpoint connection details for each account +Explore the status and details of private endpoint connections for each account to understand the connection type, actions required, and current state. This is useful for managing and troubleshooting your private network connections in Azure Cosmos DB. ```sql select @@ -102,6 +118,7 @@ from ``` ### Get details of accounts restored from backup +Identify instances where Azure CosmosDB accounts have been restored from backup. This is useful to track restoration activities and ensure data integrity. ```sql select diff --git a/docs/tables/azure_cosmosdb_mongo_collection.md b/docs/tables/azure_cosmosdb_mongo_collection.md index 8c8d337d..7b3b8ed5 100644 --- a/docs/tables/azure_cosmosdb_mongo_collection.md +++ b/docs/tables/azure_cosmosdb_mongo_collection.md @@ -1,12 +1,20 @@ -# Table: azure_cosmosdb_mongo_collection +--- +title: "Steampipe Table: azure_cosmosdb_mongo_collection - Query Azure Cosmos DB Mongo Collections using SQL" +description: "Allows users to query Azure Cosmos DB Mongo Collections." +--- -An Azure Cosmos DB container is where data is stored. Unlike most relational databases which scale up with larger VM sizes, Azure Cosmos DB scales out. A collection is a grouping of MongoDB documents. +# Table: azure_cosmosdb_mongo_collection - Query Azure Cosmos DB Mongo Collections using SQL -**You must specify the CosmosDB Mongo Database Name** in the `where` clause (`where database_name=''`). +Azure Cosmos DB is a globally distributed, multi-model database service for managing data at scale. It provides native support for NoSQL and OSS APIs, including MongoDB, Cassandra, Gremlin, et al. Azure Cosmos DB Mongo Collections are part of the MongoDB API, which allows users to build and manage MongoDB applications quickly and efficiently in Azure Cosmos DB. + +## Table Usage Guide + +The 'azure_cosmosdb_mongo_collection' table provides insights into Mongo Collections within Azure Cosmos DB. As a database administrator, explore collection-specific details through this table, including sharding, indexing, and associated metadata. Utilize it to uncover information about collections, such as their partition key, default time to live, and indexing policy. The schema presents a range of attributes of the Mongo Collection for your analysis, like the resource ID, name, type, and associated tags. ## Examples ### Basic info +Explore which Azure CosmosDB MongoDB collections are associated with certain databases. This can help in managing resources, identifying potential bottlenecks, and optimizing database performance. ```sql select @@ -25,6 +33,7 @@ where ``` ### Collection count by cosmos DB database name +Gain insights into the number of collections associated with each Cosmos DB database in Azure. This can be useful for understanding the distribution of collections across databases. ```sql select @@ -40,6 +49,7 @@ group by ``` ### Get throughput settings for each collection +Assess the elements within each collection to understand the throughput settings. This allows you to manage resources more efficiently by identifying the maximum and minimum throughput, providing insights into the performance and scalability of your Azure Cosmos DB Mongo Database. ```sql select @@ -59,6 +69,7 @@ where ``` ### Get index keys in each collection +Explore which index keys are present in each collection within your Azure Cosmos DB MongoDB databases. This can help you optimize your database queries and improve overall performance. ```sql select diff --git a/docs/tables/azure_cosmosdb_mongo_database.md b/docs/tables/azure_cosmosdb_mongo_database.md index c207c88a..0c76b60f 100644 --- a/docs/tables/azure_cosmosdb_mongo_database.md +++ b/docs/tables/azure_cosmosdb_mongo_database.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_mongo_database +--- +title: "Steampipe Table: azure_cosmosdb_mongo_database - Query Azure Cosmos DB Mongo Databases using SQL" +description: "Allows users to query Azure Cosmos DB Mongo Databases." +--- -MongoDB is a cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas. +# Table: azure_cosmosdb_mongo_database - Query Azure Cosmos DB Mongo Databases using SQL + +Azure Cosmos DB is a globally distributed, multi-model database service for managing data at planet-scale. It's designed to allow customers to elastically and independently scale throughput and storage across any number of geographical regions. Mongo Database is a type of API that can be used with Azure Cosmos DB to work with data. + +## Table Usage Guide + +The 'azure_cosmosdb_mongo_database' table provides insights into Mongo Databases within Azure Cosmos DB. As a DevOps engineer, explore database-specific details through this table, including the resource group, account name, and associated metadata. Utilize it to uncover information about databases, such as their provisioned throughput, the offer type, and the verification of their properties. The schema presents a range of attributes of the Mongo Database for your analysis, like the ID, name, and type. ## Examples ### Basic info +Explore the configuration of your Azure CosmosDB Mongo databases to understand their throughput and autoscale settings. This can help in optimizing resource allocation and managing costs effectively. ```sql select @@ -20,6 +30,7 @@ from ### Database count by cosmosdb account name +Explore which Azure Cosmos DB accounts have the highest number of databases. This can aid in understanding resource allocation and potential cost implications. ```sql select @@ -32,6 +43,7 @@ group by ``` ### Get throughput settings for each database +Assess the elements within each database to understand their throughput settings, which provide insights into the performance and capacity management of your Azure Cosmos DB's MongoDB databases. This will help in optimizing the resources for improved performance and cost efficiency. ```sql select diff --git a/docs/tables/azure_cosmosdb_restorable_database_account.md b/docs/tables/azure_cosmosdb_restorable_database_account.md index f5125449..c54e354d 100644 --- a/docs/tables/azure_cosmosdb_restorable_database_account.md +++ b/docs/tables/azure_cosmosdb_restorable_database_account.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_restorable_database_account +--- +title: "Steampipe Table: azure_cosmosdb_restorable_database_account - Query Azure Cosmos DB Restorable Database Accounts using SQL" +description: "Allows users to query Azure Cosmos DB Restorable Database Accounts" +--- -Azure Cosmos DB restorable account helps to recover a Cosmos DB account from an accidental write, delete operation, or to restore data into any region. +# Table: azure_cosmosdb_restorable_database_account - Query Azure Cosmos DB Restorable Database Accounts using SQL + +Azure Cosmos DB is a globally distributed, multi-model database service designed for scalable and high performance modern applications. It is a fully managed NoSQL database service built for fast and predictable performance, high availability, elastic scaling, global distribution, and ease of development. A restorable database account represents a Cosmos DB account that can be restored to any point in time within its retention period. + +## Table Usage Guide + +The 'azure_cosmosdb_restorable_database_account' table provides insights into restorable database accounts within Azure Cosmos DB. As a DevOps engineer, explore account-specific details through this table, including locations, enabled capabilities, and associated metadata. Utilize it to uncover information about accounts, such as those with specific capabilities, the locations of accounts, and the verification of failover policies. The schema presents a range of attributes of the restorable database account for your analysis, like the account name, creation date, enabled capabilities, and associated tags. ## Examples ### Basic Info +Explore which Azure Cosmos DB accounts are available for restoration, along with their associated details such as region, account name, and creation time. This is particularly useful for assessing recovery options and planning for potential disaster recovery scenarios. ```sql select @@ -18,6 +28,7 @@ from ``` ### Get the regions that the database accounts can be restored from +Explore which regions your database accounts can be restored from to ensure business continuity and disaster recovery. This query aids in identifying the locations where your database backups are stored, helping you plan your restoration strategy effectively. ```sql select @@ -31,6 +42,7 @@ from ``` ### Get the accounts having point-in-time recovery enabled +Discover the segments that have point-in-time recovery enabled for Azure CosmosDB accounts. This query can be useful in instances where you need to analyze the safety measures of your data, ensuring that it can be restored to a specific point in time if needed. ```sql select @@ -47,6 +59,7 @@ where ``` ### Get the restorable account count per api type +Analyze the settings to understand the distribution of restorable accounts across different API types in Azure CosmosDB. This can be beneficial for assessing the balance of your account types and identifying any potential vulnerabilities or over-reliances. ```sql select diff --git a/docs/tables/azure_cosmosdb_sql_database.md b/docs/tables/azure_cosmosdb_sql_database.md index 44fe87da..6d1d6801 100644 --- a/docs/tables/azure_cosmosdb_sql_database.md +++ b/docs/tables/azure_cosmosdb_sql_database.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_sql_database +--- +title: "Steampipe Table: azure_cosmosdb_sql_database - Query Azure Cosmos DB SQL Databases using SQL" +description: "Allows users to query Azure Cosmos DB SQL Databases" +--- -Azure Cosmos DB is a global distributed, multi-model database that is used in a wide range of applications and use cases. +# Table: azure_cosmosdb_sql_database - Query Azure Cosmos DB SQL Databases using SQL + +Azure Cosmos DB is a globally distributed, multi-model database service for managing data at large scale. It provides elastic scalability, high availability, and low latency required for modern applications. SQL API, one of the APIs provided by Azure Cosmos DB, allows you to work with data using SQL queries. + +## Table Usage Guide + +The 'azure_cosmosdb_sql_database' table provides insights into SQL Databases within Azure Cosmos DB. As a database administrator, explore database-specific details through this table, including the provisioned throughput, partition key path, and associated metadata. Utilize it to uncover information about databases, such as those with high throughput, the partitioning scheme, and the indexing policy. The schema presents a range of attributes of the SQL Database for your analysis, like the database ID, resource group, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure CosmosDB SQL databases to gain insights into their associated account names, user databases, regions, and resource groups. This can help you manage your resources more effectively and understand where potential issues may arise. ```sql select @@ -19,6 +29,7 @@ from ### Database count per cosmosdb accounts +Identify the number of databases within each Azure Cosmos DB account. This information can be useful for managing resources and understanding the distribution of databases across different accounts. ```sql select @@ -32,6 +43,7 @@ group by ### List of sql databases without application tag key +Identify Azure Cosmos DB SQL databases that are missing an 'application' tag. This can be useful in scenarios where you want to ensure all databases are properly tagged for better management and organization. ```sql select diff --git a/docs/tables/azure_data_factory.md b/docs/tables/azure_data_factory.md index 238ad115..75ca9afc 100644 --- a/docs/tables/azure_data_factory.md +++ b/docs/tables/azure_data_factory.md @@ -1,10 +1,20 @@ -# Table: azure_data_factory +--- +title: "Steampipe Table: azure_data_factory - Query Azure Data Factory Pipelines using SQL" +description: "Allows users to query Azure Data Factory Pipelines." +--- -Azure Data Factory is the platform that solves such data scenarios. It is the cloud-based ETL and data integration service that allows to create data-driven workflows for orchestrating data movement and transforming data at scale. +# Table: azure_data_factory - Query Azure Data Factory Pipelines using SQL + +Azure Data Factory is a cloud-based data integration service that orchestrates and automates the movement and transformation of data. It allows users to create data-driven workflows for orchestrating data movement and transforming data at scale. Using Azure Data Factory, you can create and schedule data-driven workflows (called pipelines) that can ingest data from disparate data stores. + +## Table Usage Guide + +The 'azure_data_factory' table provides insights into Pipelines within Azure Data Factory. As a Data Engineer, explore Pipeline-specific details through this table, including activities, datasets, linked services, and associated metadata. Utilize it to uncover information about Pipelines, such as those with specific activities, the relationships between datasets, and the verification of linked services. The schema presents a range of attributes of the Pipeline for your analysis, like the name, region, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which data factories are currently being provisioned in your Azure environment. This allows you to monitor and manage resource distribution more effectively. ```sql select @@ -19,6 +29,7 @@ from ### List system assigned identity type factories +Determine the areas in which Azure Data Factories have system-assigned identities. This query is useful for understanding which factories are using this specific type of identity, helping to manage access control and security. ```sql select @@ -34,6 +45,7 @@ where ### List factories with public network access enabled +Explore which factories have public network access enabled. This is useful for identifying potential security risks and ensuring that your network configurations adhere to best practices. ```sql select @@ -45,4 +57,4 @@ from azure_data_factory where public_network_access = 'Enabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_data_factory_dataset.md b/docs/tables/azure_data_factory_dataset.md index 29519202..6b827bb1 100644 --- a/docs/tables/azure_data_factory_dataset.md +++ b/docs/tables/azure_data_factory_dataset.md @@ -1,10 +1,20 @@ -# Table: azure_data_factory_dataset +--- +title: "Steampipe Table: azure_data_factory_dataset - Query Azure Data Factory Datasets using SQL" +description: "Allows users to query Azure Data Factory Datasets." +--- -Azure Data Factory datasets identify data within different data stores, such as tables, files, folders, and documents. +# Table: azure_data_factory_dataset - Query Azure Data Factory Datasets using SQL + +Azure Data Factory is a cloud-based data integration service that composes data storage, movement, and processing services into automated data pipelines. A dataset in Azure Data Factory represents data structure within the data store, which simply points or references to the data you want to use in your activities as inputs or outputs. It could be an Excel file, a table in Azure SQL Database, or a blob in Azure Blob Storage. + +## Table Usage Guide + +The 'azure_data_factory_dataset' table provides insights into datasets within Azure Data Factory. As a data engineer, explore dataset-specific details through this table, including the type of dataset, linked service, folder, and other related properties. Utilize it to uncover information about datasets, such as those with specific linked services, the relationships between datasets, and the verification of dataset properties. The schema presents a range of attributes of the dataset for your analysis, like the dataset ID, name, type, linked service, and associated parameters. ## Examples ### Basic info +Explore which Azure Data Factory datasets are available and determine their types to better manage resources and understand your data landscape. ```sql select @@ -17,6 +27,7 @@ from ``` ### List relational table type datasets +Determine the areas in which Azure Data Factory datasets are of the 'RelationalTable' type. This is useful for assessing the elements within your data architecture that involve relational table datasets. ```sql select diff --git a/docs/tables/azure_data_factory_pipeline.md b/docs/tables/azure_data_factory_pipeline.md index 790f3671..e577a96f 100644 --- a/docs/tables/azure_data_factory_pipeline.md +++ b/docs/tables/azure_data_factory_pipeline.md @@ -1,10 +1,20 @@ -# Table: azure_data_factory_pipeline +--- +title: "Steampipe Table: azure_data_factory_pipeline - Query Azure Data Factory Pipelines using SQL" +description: "Allows users to query Azure Data Factory Pipelines." +--- -A Data Factory pipeline is a logical grouping of activities that together perform a task. The activities in a pipeline define actions to perform on data. +# Table: azure_data_factory_pipeline - Query Azure Data Factory Pipelines using SQL + +Azure Data Factory is a hybrid data integration service that allows you to create, schedule and manage data pipelines. It provides a serverless approach to data integration and can be used to ingest, prepare, transform, and analyze data from various on-premises and cloud data sources. Pipelines in Azure Data Factory are a logical grouping of activities that together perform a task. + +## Table Usage Guide + +The 'azure_data_factory_pipeline' table provides insights into Pipelines within Azure Data Factory. As a Data Engineer, explore pipeline-specific details through this table, including activities, parameters, and associated metadata. Utilize it to uncover information about pipelines, such as those with specific activities, the relationships between different activities, and the verification of pipeline parameters. The schema presents a range of attributes of the pipeline for your analysis, like the pipeline name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Data Factory pipelines are currently in use. This can help you understand the types and names of pipelines, providing a clearer overview of your data processing infrastructure. ```sql select @@ -15,4 +25,4 @@ select etag from azure_data_factory_pipeline; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_data_lake_analytics_account.md b/docs/tables/azure_data_lake_analytics_account.md index 690cf909..6ece9e90 100644 --- a/docs/tables/azure_data_lake_analytics_account.md +++ b/docs/tables/azure_data_lake_analytics_account.md @@ -1,10 +1,20 @@ -# Table: azure_data_lake_analytics_account +--- +title: "Steampipe Table: azure_data_lake_analytics_account - Query Azure Data Lake Analytics Accounts using SQL" +description: "Allows users to query Azure Data Lake Analytics Accounts" +--- -Azure Data Lake Analytics is an on-demand analytics job service that simplifies big data. Instead of deploying, configuring, and tuning hardware, you write queries to transform your data and extract valuable insights. The analytics service can handle jobs of any scale instantly by setting the dial for how much power you need. You only pay for your job when it is running, making it cost-effective. +# Table: azure_data_lake_analytics_account - Query Azure Data Lake Analytics Accounts using SQL + +Azure Data Lake Analytics is an on-demand analytics job service that simplifies big data. It allows you to focus on writing, running and managing jobs, rather than operating distributed infrastructure. Instead of deploying, configuring and tuning hardware, you write queries to transform your data and extract valuable insights. + +## Table Usage Guide + +The 'azure_data_lake_analytics_account' table provides insights into Azure Data Lake Analytics Accounts. As a data analyst or a big data engineer, explore account-specific details through this table, including account status, creation date, last modified date, and associated metadata. Utilize it to uncover information about accounts, such as those with specific firewall states, the maximum degree of parallelism per job, and the maximum job count. The schema presents a range of attributes of the Azure Data Lake Analytics Account for your analysis, like the account ID, name, type, and associated tags. ## Examples ### Basic info +Explore which Azure Data Lake Analytics accounts are currently provisioned to gain insights into your active data processing resources. This can help you manage your resources efficiently and plan for future capacity needs. ```sql select @@ -17,6 +27,7 @@ from ``` ### List suspended data lake analytics accounts +Identify instances where data lake analytics accounts are suspended to enable proactive management and prevent potential disruptions in data processing. ```sql select @@ -32,6 +43,7 @@ where ``` ### List data lake analytics accounts with firewall disabled +Identify instances where Azure Data Lake analytics accounts have their firewall disabled. This query is useful for assessing potential security vulnerabilities in your system. ```sql select @@ -43,4 +55,4 @@ from azure_data_lake_analytics_account where firewall_state = 'Disabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_data_lake_store.md b/docs/tables/azure_data_lake_store.md index 095bbb0e..860c670b 100644 --- a/docs/tables/azure_data_lake_store.md +++ b/docs/tables/azure_data_lake_store.md @@ -1,10 +1,20 @@ -# Table: azure_data_lake_store +--- +title: "Steampipe Table: azure_data_lake_store - Query Azure Data Lake Store using SQL" +description: "Allows users to query Azure Data Lake Stores" +--- -Azure Data Lake Storage is an enterprise-wide hyper-scale repository for big data analytic workloads. Azure Data Lake enables you to capture data of any size, type, and ingestion speed in one single place for operational and exploratory analytics. +# Table: azure_data_lake_store - Query Azure Data Lake Stores using SQL + +Azure Data Lake Store is a scalable and secure data lake that allows you to store and analyze large amounts of data. It is built to handle high volumes of small writes at low latency and is optimized for analytics. Azure Data Lake Store supports standard Hadoop Distributed File System (HDFS) interfaces. + +## Table Usage Guide + +The 'azure_data_lake_store' table provides insights into Data Lake Stores within Azure. As a Data Engineer, explore store-specific details through this table, including encryption settings, firewall rules, and associated metadata. Utilize it to uncover information about stores, such as those with specific firewall rules, the encryption type used, and the verification of virtual network rules. The schema presents a range of attributes of the Data Lake Store for your analysis, like the store name, creation date, encryption settings, and associated tags. ## Examples ### Basic info +Explore which Azure Data Lake stores are currently provisioned to gain insights into your data storage utilization and management. This can help you identify instances where resources may be underutilized or over-provisioned, aiding in efficient resource allocation. ```sql select @@ -17,6 +27,7 @@ from ``` ### List data lake stores with encryption disabled +This query helps identify Azure Data Lake stores where encryption is disabled, allowing you to pinpoint potential security vulnerabilities and take necessary measures to enhance data protection. It's a practical tool for maintaining the integrity of your stored data and ensuring compliance with data security standards. ```sql select @@ -31,6 +42,7 @@ where ``` ### List data lake stores with firewall disabled +Explore which Azure Data Lake stores have their firewall disabled. This is crucial for identifying potential security vulnerabilities within your system. ```sql select @@ -42,4 +54,4 @@ from azure_data_lake_store where firewall_state = 'Disabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_databox_edge_device.md b/docs/tables/azure_databox_edge_device.md index 68b021e1..b959958e 100644 --- a/docs/tables/azure_databox_edge_device.md +++ b/docs/tables/azure_databox_edge_device.md @@ -1,10 +1,20 @@ -# Table: azure_databox_edge_device +--- +title: "Steampipe Table: azure_databox_edge_device - Query Azure Databox Edge Devices using SQL" +description: "Allows users to query Azure Databox Edge Devices." +--- -Azure Data Box Gateway is a storage solution that enables you to seamlessly send data to Azure. This article provides you an overview of the Azure Data Box Gateway solution, benefits, key capabilities, and the scenarios where you can deploy this device. +# Table: azure_databox_edge_device - Query Azure Databox Edge Devices using SQL + +Azure Databox Edge is a physical network appliance, shipped by Microsoft, that brings compute, storage, and intelligence to the edge. It is designed to analyze, transform, and filter data at the edge, before it is transferred to Azure. This device is ideal for locations with limited or no network connectivity, and for reducing data transfer costs. + +## Table Usage Guide + +The 'azure_databox_edge_device' table provides insights into Databox Edge Devices within Azure. As a DevOps engineer, explore device-specific details through this table, including the device model, status, and associated metadata. Utilize it to uncover information about devices, such as those with high capacity, the network connectivity between devices, and the verification of transfer costs. The schema presents a range of attributes of the Databox Edge Device for your analysis, like the device name, serial number, model description, and associated tags. ## Examples ### Basic info +Explore the status and regional distribution of your Azure Databox Edge devices to gain insights into their operational efficiency and geographical spread. This can help in managing resources and enhancing data access performance. ```sql select @@ -18,6 +28,7 @@ from ``` ### List offline data box edge devices +Discover the segments that are offline in your Azure Data Box Edge devices. This helps in identifying devices that may require attention or troubleshooting for connectivity issues. ```sql select @@ -29,4 +40,4 @@ from azure_databox_edge_device where data_box_edge_device_status = 'Offline'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_databricks_workspace.md b/docs/tables/azure_databricks_workspace.md index 03024402..517afff7 100644 --- a/docs/tables/azure_databricks_workspace.md +++ b/docs/tables/azure_databricks_workspace.md @@ -1,10 +1,20 @@ -# Table: azure_databricks_workspace +--- +title: "Steampipe Table: azure_databricks_workspace - Query Azure Databricks Workspaces using SQL" +description: "Allows users to query Azure Databricks Workspaces." +--- -A workspace is an environment for accessing all of your Azure Databricks assets. A workspace organizes objects (notebooks, libraries, dashboards, and experiments) into folders and provides access to data objects and computational resources. +# Table: azure_databricks_workspace - Query Azure Databricks Workspaces using SQL + +Azure Databricks is an Apache Spark-based analytics platform optimized for the Microsoft Azure cloud services platform. It provides a collaborative environment for data scientists, data engineers, and business analysts to work together. Azure Databricks allows you to build, train, and deploy AI solutions at scale. + +## Table Usage Guide + +The 'azure_databricks_workspace' table provides insights into Databricks Workspaces within Azure Databricks. As a data scientist or engineer, explore workspace-specific details through this table, including configurations, locations, and associated metadata. Utilize it to uncover information about workspaces, such as those with specific configurations, the relationships between workspaces, and the verification of workspace settings. The schema presents a range of attributes of the Databricks Workspace for your analysis, like the workspace ID, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore the basic information about Azure Databricks workspaces, such as their names and IDs. This can be useful to understand the distribution and usage of workspaces across your Azure environment. ```sql select @@ -19,6 +29,7 @@ from ``` ### List workspaces created in the last 30 days +Explore which workspaces have been established within the past month. This is useful for keeping track of recent additions and understanding the growth of your workspace environment. ```sql select @@ -35,6 +46,7 @@ where ``` ### List failed workspaces +Discover the segments that have experienced unsuccessful provisioning in Azure Databricks to understand where issues might have occurred. This is useful in identifying potential problems in your setup that may need troubleshooting. ```sql select @@ -51,6 +63,7 @@ where ``` ### List all encrypted workspaces +Discover the segments that utilize encrypted workspaces in Azure Databricks. This is beneficial in assessing the security measures in place within your organization's data processing environment. ```sql select @@ -67,6 +80,7 @@ where ``` ### List workspaces that allow public IP +Identify the Azure Databricks workspaces that are configured to allow public IP access. This can be useful for assessing potential security risks and ensuring compliance with company policies. ```sql select @@ -80,4 +94,4 @@ from azure_databricks_workspace where parameters -> 'enableNoPublicIp' ->> 'value' = 'false'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_diagnostic_setting.md b/docs/tables/azure_diagnostic_setting.md index 8392b812..17224e96 100644 --- a/docs/tables/azure_diagnostic_setting.md +++ b/docs/tables/azure_diagnostic_setting.md @@ -1,10 +1,20 @@ -# Table: azure_diagnostic_setting +--- +title: "Steampipe Table: azure_diagnostic_setting - Query Azure Monitor Diagnostic Settings using SQL" +description: "Allows users to query Azure Monitor Diagnostic Settings" +--- -Azure diagnostic settings are used to send platform logs and metrics to different destinations. +# Table: azure_diagnostic_setting - Query Azure Monitor Diagnostic Settings using SQL + +Azure Monitor Diagnostic Settings is a feature within Microsoft Azure that enables the streaming of log data from an Azure service to a storage account, event hub, or Azure Monitor logs. It provides a unified way to route detailed telemetry for specific Azure resources. This feature aids in auditing, debugging, and archival purposes, enhancing the monitoring and troubleshooting of Azure resources. + +## Table Usage Guide + +The 'azure_diagnostic_setting' table provides insights into the diagnostic settings of Azure Monitor. As a DevOps engineer, explore setting-specific details through this table, including the destination of the diagnostic data, the categories of logs and metrics, and associated metadata. Utilize it to uncover information about settings, such as those with enabled logs, the categories of logs and metrics, and the verification of event hub authorization rules. The schema presents a range of attributes of the diagnostic setting for your analysis, like the storage account ID, event hub name, log enabled status, and associated tags. ## Examples ### Basic info +Explore which diagnostic settings are in use within your Azure environment. This can help you maintain a clear overview of your configurations and ensure they are set up as desired. ```sql select @@ -16,6 +26,7 @@ from ``` ### List diagnostic settings that capture Alert category logs +Identify the diagnostic settings that are set to capture logs categorized as 'Alert'. This is useful in monitoring and troubleshooting activities as it allows you to track and analyze alerts in your system. ```sql select @@ -31,6 +42,7 @@ where ``` ### List diagnostic settings that capture Security category logs +Discover the segments that have diagnostic settings enabled for capturing security category logs. This can be particularly useful in identifying potential security vulnerabilities and maintaining robust security measures. ```sql select @@ -46,6 +58,7 @@ where ``` ### List diagnostic settings that capture Policy category logs +Explore the diagnostic settings that are actively capturing logs under the 'Policy' category. This can be useful for monitoring policy compliance and identifying potential issues in your Azure environment. ```sql select @@ -61,6 +74,7 @@ where ``` ### List diagnostic settings that capture Administrative category logs +Discover the segments that have diagnostic settings enabled for capturing Administrative category logs. This can be useful for administrators to understand and manage the specific settings that are actively logging administrative activities. ```sql select @@ -73,4 +87,4 @@ from where l ->> 'category' = 'Administrative' and l ->> 'enabled' = 'true'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_dns_zone.md b/docs/tables/azure_dns_zone.md index 399c31c8..319be076 100644 --- a/docs/tables/azure_dns_zone.md +++ b/docs/tables/azure_dns_zone.md @@ -1,10 +1,20 @@ -# Table: azure_dns_zone +--- +title: "Steampipe Table: azure_dns_zone - Query Azure DNS Zones using SQL" +description: "Allows users to query Azure DNS Zones, providing detailed information about each DNS zone in the Azure account." +--- -Azure DNS zone is used to host the DNS records for a particular domain. Please note that this table only retrieves public DNS zones, use the `azure_private_dns_zone` table for private DNS zones. +# Table: azure_dns_zone - Query Azure DNS Zones using SQL + +Azure DNS Zones is a service within Microsoft Azure that allows you to host your DNS domain in Azure. It provides name resolution using Microsoft Azure infrastructure, and you can use it to manage and resolve domain names in a virtual network. Azure DNS Zones is globally distributed, highly available, and designed to handle millions of queries per second. + +## Table Usage Guide + +The 'azure_dns_zone' table delivers comprehensive insights into DNS Zones within Microsoft Azure. As a network administrator, you can leverage this table to explore detailed information about each DNS zone, including its properties, record sets, and associated metadata. The table is particularly useful for understanding the configuration of DNS zones, such as which record sets are associated with each zone, the number of record sets in each zone, and the type of each record set. The schema presents a wide range of attributes of the DNS zone for your analysis, such as the zone name, resource group name, record set count, and associated tags. ## Examples ### Basic info +Explore which resource groups in your Azure DNS Zone are tagged for specific purposes. This allows for efficient management and organization of resources within your network. ```sql select @@ -16,6 +26,7 @@ from ``` ### List public DNS zones with record sets +Determine the areas in which public DNS zones have more than one record set in Azure. This can help in understanding the complexity of your DNS configuration and identify potential areas for consolidation or simplification. ```sql select @@ -28,6 +39,7 @@ where ``` ### List public DNS zones with delegated name servers +Explore the public DNS zones that have been delegated to non-Azure name servers, which can be essential in assessing the distribution of your DNS management responsibilities. This query can help identify potential areas of risk or inefficiency in your current DNS management strategy. ```sql select @@ -39,4 +51,4 @@ from where zone_type = 'Public' and ns not like '%.azure-dns.%.'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_eventgrid_domain.md b/docs/tables/azure_eventgrid_domain.md index c22e6acc..2162d852 100644 --- a/docs/tables/azure_eventgrid_domain.md +++ b/docs/tables/azure_eventgrid_domain.md @@ -1,10 +1,20 @@ -# Table: azure_eventgrid_domain +--- +title: "Steampipe Table: azure_eventgrid_domain - Query Azure Event Grid Domains using SQL" +description: "Allows users to query Azure Event Grid Domains" +--- -An event domain is a management tool for large numbers of Event Grid topics related to the same application. You can think of it as a meta-topic that can have thousands of individual topics. +# Table: azure_eventgrid_domain - Query Azure Event Grid Domains using SQL + +Azure Event Grid Domain is an Azure service that simplifies event routing and delivery from source to destination. It is a management and organization layer for event publishing, allowing you to route events from many sources to many destinations. Azure Event Grid Domains provide a single service for managing routing of events from various sources, all with the same security and authentication model. + +## Table Usage Guide + +The 'azure_eventgrid_domain' table provides insights into Event Grid Domains within Azure Event Grid. As a DevOps engineer, explore domain-specific details through this table, including endpoint, provision state, and associated metadata. Utilize it to uncover information about domains, such as those with specific input schema, the provisioning state, and the endpoint. The schema presents a range of attributes of the Event Grid Domain for your analysis, like the domain name, resource group, and associated tags. ## Examples ### Basic info +Explore the status and types of your EventGrid Domains in Azure. This can help you manage and organize your resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List domains not configured with private endpoint connections +Uncover the details of domains lacking private endpoint connections within the Azure EventGrid. This query is useful for identifying potential security vulnerabilities and ensuring proper configuration for secure data transmission. ```sql select @@ -31,6 +42,7 @@ where ``` ### List domains with local authentication disabled +This query helps identify domains where local authentication has been disabled, providing a quick way to review security settings and ensure proper access control measures are in place. This can be particularly useful in large-scale environments where manual review would be time-consuming. ```sql select @@ -42,4 +54,4 @@ from azure_eventgrid_domain where disable_local_auth; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_eventgrid_topic.md b/docs/tables/azure_eventgrid_topic.md index 6457672f..e1b69515 100644 --- a/docs/tables/azure_eventgrid_topic.md +++ b/docs/tables/azure_eventgrid_topic.md @@ -1,10 +1,20 @@ -# Table: azure_eventgrid_topic +--- +title: "Steampipe Table: azure_eventgrid_topic - Query Azure Event Grid Topics using SQL" +description: "Allows users to query Azure Event Grid Topics." +--- -The event grid topic provides an endpoint where the source sends events. The publisher creates the event grid topic, and decides whether an event source needs one topic or more than one topic. A topic is used for a collection of related events. To respond to certain types of events, subscribers decide which topics to subscribe to. +# Table: azure_eventgrid_topic - Query Azure Event Grid Topics using SQL + +Azure Event Grid is a service within Microsoft Azure that allows you to build applications with event-based architectures. It provides a centralized way to manage and react to events from various Azure resources, such as Blob Storage, Resource Groups, and Subscriptions. Azure Event Grid helps you stay informed about the status changes and take appropriate actions when certain conditions are met. + +## Table Usage Guide + +The 'azure_eventgrid_topic' table provides insights into Event Grid Topics within Azure Event Grid. As a DevOps engineer, explore topic-specific details through this table, including endpoint details, provisioning state, and associated metadata. Utilize it to uncover information about topics, such as those with specific endpoint types, the provisioning state of topics, and the verification of endpoint details. The schema presents a range of attributes of the Event Grid Topic for your analysis, like the topic name, id, type, provisioning state, and associated tags. ## Examples ### Basic info +Explore which Azure Event Grid topics are currently active. This can be useful in assessing the state of your event-driven applications and ensuring they are functioning as expected. ```sql select @@ -17,6 +27,7 @@ from ``` ### List domains not configured with private endpoint connections +Discover the segments that are lacking private endpoint connections within the Azure EventGrid topic. This allows for pinpointing potential security vulnerabilities in your network configuration. ```sql select @@ -31,6 +42,7 @@ where ``` ### List domains with local authentication disabled +Analyze the settings to understand which domains have local authentication disabled in your Azure EventGrid topic. This can help enhance security by identifying potential vulnerabilities and ensuring appropriate authentication measures are in place. ```sql select @@ -42,4 +54,4 @@ from azure_eventgrid_topic where disable_local_auth; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_eventhub_namespace.md b/docs/tables/azure_eventhub_namespace.md index 19eec8ad..8c1b0820 100644 --- a/docs/tables/azure_eventhub_namespace.md +++ b/docs/tables/azure_eventhub_namespace.md @@ -1,10 +1,20 @@ -# Table: azure_eventhub_namespace +--- +title: "Steampipe Table: azure_eventhub_namespace - Query Azure Event Hubs Namespaces using SQL" +description: "Allows users to query Azure Event Hubs Namespaces." +--- -An Event Hubs namespace provides DNS integrated network endpoints and a range of access control and network integration management features such as IP filtering, virtual network service endpoint, and Private Link and is the management container for one of multiple Event Hub instances (or topics, in Kafka parlance). +# Table: azure_eventhub_namespace - Query Azure Event Hubs Namespaces using SQL + +Azure Event Hubs is a big data streaming platform and event ingestion service, capable of receiving and processing millions of events per second. Event Hubs can process and analyze the data produced by connected devices and applications. A namespace is a container for all messaging components, multiple event hubs can reside within a single namespace, and namespaces are used as a way to isolate different sets of messaging components in separate environments. + +## Table Usage Guide + +The 'azure_eventhub_namespace' table provides insights into Azure Event Hubs Namespaces. As a DevOps engineer, explore namespace-specific details through this table, including the SKU name, capacity, tier, and associated metadata. Utilize it to uncover information about namespaces, such as their maximum throughput units, whether auto-inflate is enabled, and the network rules set. The schema presents a range of attributes of the namespace for your analysis, like the resource group, region, subscription ID, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Eventhub namespaces, including their names, IDs, types, and provisioning states. This allows you to gain insights into their creation dates and current operational status for effective management and monitoring. ```sql select @@ -18,6 +28,7 @@ from ``` ### List namespaces not configured to use virtual network service endpoint +Determine the areas in which Azure EventHub namespaces are not making use of the virtual network service endpoint. This can be useful to identify potential network security gaps in your Azure environment. ```sql select @@ -32,6 +43,7 @@ where ``` ### List unencrypted namespaces +Explore which Azure EventHub namespaces are unencrypted. This is useful for identifying potential security vulnerabilities within your Azure EventHub configuration. ```sql select @@ -46,6 +58,7 @@ where ``` ### List namespaces with auto-inflate disabled +Identify Azure EventHub namespaces where the auto-inflate feature is disabled. This can be useful for optimizing resource usage and managing costs. ```sql select @@ -60,6 +73,7 @@ where ``` ### List private endpoint connection details +Explore the details of private endpoint connections within your Azure EventHub Namespace. This can be useful in assessing the security and connectivity status of your system. ```sql select @@ -74,4 +88,4 @@ select from azure_eventhub_namespace, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_express_route_circuit.md b/docs/tables/azure_express_route_circuit.md index 71357c30..2689af94 100644 --- a/docs/tables/azure_express_route_circuit.md +++ b/docs/tables/azure_express_route_circuit.md @@ -1,10 +1,20 @@ -# Table: azure_express_route_circuit +--- +title: "Steampipe Table: azure_express_route_circuit - Query Azure ExpressRoute Circuits using SQL" +description: "Allows users to query Azure ExpressRoute Circuits" +--- -An ExpressRoute circuit represents a logical connection between your on-premises infrastructure and Microsoft cloud services through a connectivity provider. You can order multiple ExpressRoute circuits. Each circuit can be in the same or different regions, and can be connected to your premises through different connectivity providers. +# Table: azure_express_route_circuit - Query Azure ExpressRoute Circuits using SQL + +Azure ExpressRoute is a cloud integration solution for creating private data connections between your on-premises infrastructure and Microsoft Azure. These connections do not go over the public Internet, providing higher security, reliability, and speeds with lower latencies than typical connections over the Internet. ExpressRoute connections are ideal for data migration, replication for business continuity, disaster recovery, and other high-availability strategies. + +## Table Usage Guide + +The 'azure_express_route_circuit' table provides insights into ExpressRoute Circuits within Azure Networking. As a network engineer, explore circuit-specific details through this table, including peering locations, service provider details, and associated metadata. Utilize it to uncover information about circuits, such as those with high bandwidth usage, the peering relationships between circuits, and the verification of service key. The schema presents a range of attributes of the ExpressRoute Circuit for your analysis, like the circuit ARN, creation date, attached peering locations, and associated tags. ## Examples ### Basic info +Explore which Azure Express Route Circuits allow classic operations and analyze their provisioning states to understand their current status and configuration. This can be useful for identifying any circuits that may require updates or changes. ```sql select @@ -17,6 +27,7 @@ from ``` ### List express route circuits with global reach enabled +Analyze the settings to understand which Azure Express Route Circuits have global reach enabled. This can be useful to determine the areas in which your network traffic can extend globally, thus optimizing your network strategy. ```sql select @@ -30,6 +41,7 @@ where ``` ### List premium express route circuits +Discover the segments that are using premium tier Express Route Circuits in Azure. This can be beneficial for assessing the distribution of resources and optimizing cost management within your cloud infrastructure. ```sql select @@ -40,4 +52,4 @@ from azure_express_route_circuit where sku_tier = 'Premium'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_firewall.md b/docs/tables/azure_firewall.md index e4716814..1b7157d6 100644 --- a/docs/tables/azure_firewall.md +++ b/docs/tables/azure_firewall.md @@ -1,10 +1,20 @@ -# Table: azure_firewall +--- +title: "Steampipe Table: azure_firewall - Query Azure Network Firewalls using SQL" +description: "Allows users to query Azure Network Firewalls for detailed information about their configuration, status, rules, and more." +--- -Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. +# Table: azure_firewall - Query Azure Network Firewalls using SQL + +Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. + +## Table Usage Guide + +The 'azure_firewall' table provides insights into Network Firewalls within Azure Networking. As a network administrator, explore firewall-specific details through this table, including network rules, application rules, and associated metadata. Utilize it to uncover information about firewalls, such as rules with broad coverage, the relationships between different rules, and the verification of application rules. The schema presents a range of attributes of the Network Firewall for your analysis, like the firewall name, resource group, subscription ID, and associated tags. ## Examples ### Azure firewall location and availability zone count info +Explore the distribution of Azure firewalls across different regions and gain insights into their availability zone count to optimize network security and resource allocation. ```sql select @@ -16,6 +26,7 @@ from ``` ### Basic IP configuration info +Determine the configuration of IP addresses in your Azure firewall. This query allows you to identify private and public IP addresses, their allocation methods, and the virtual network they're associated with, helping you maintain an overview of your network's structure and security. ```sql select @@ -34,6 +45,7 @@ from ``` ### List the premium category firewalls +Explore which firewalls fall under the premium category in Azure. This is beneficial for assessing your current security infrastructure and planning future upgrades or budget allocation. ```sql select @@ -47,6 +59,7 @@ where ``` ### List of firewalls where threat intel mode is off +Discover the segments that have their firewall's threat intelligence mode turned off. This could be useful for identifying potential security gaps in your Azure services. ```sql select @@ -56,4 +69,4 @@ from azure_firewall where threat_intel_mode = 'Off'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_firewall_policy.md b/docs/tables/azure_firewall_policy.md index 1247b26a..91cf8a84 100644 --- a/docs/tables/azure_firewall_policy.md +++ b/docs/tables/azure_firewall_policy.md @@ -1,10 +1,20 @@ -# Table: azure_firewall_policy +--- +title: "Steampipe Table: azure_firewall_policy - Query Azure Firewall Policies using SQL" +description: "Allows users to query Azure Firewall Policies" +--- -Azure Firewall Policy is the recommended method to configure your Azure Firewall. It's a global resource that can be used across multiple Azure Firewall instances in Secured Virtual Hubs and Hub Virtual Networks. Policies work across regions and subscriptions. +# Table: azure_firewall_policy - Query Azure Firewall Policies using SQL + +Azure Firewall Policy is a configuration schema for Azure Firewall that can be used across multiple instances. It provides threat intelligence, service tags, application rules, and network rules as top level properties. Firewall policies can be managed independently from firewall instances, allowing for centralized management of your firewall security rules. + +## Table Usage Guide + +The 'azure_firewall_policy' table provides insights into Firewall Policies within Azure Firewall. As a security engineer, explore policy-specific details through this table, including threat intelligence, service tags, application rules, and network rules. Utilize it to uncover information about policies, such as those associated with specific firewall instances, the rules they enforce, and their overall configuration. The schema presents a range of attributes of the Firewall Policy for your analysis, like the policy ID, name, type, subscription ID, and associated tags. ## Examples ### Basic info +Explore which firewall policies are currently active within your Azure environment. This can help you assess your security measures and identify any areas that may need additional coverage or modifications. ```sql select @@ -21,6 +31,7 @@ from ``` ### List policies that are in failed state +Identify the firewall policies that are currently in a failed state. This can assist in troubleshooting and maintaining the overall health of your Azure firewall policies. ```sql select @@ -35,6 +46,7 @@ where ``` ### Get firewall details of each policy +Determine the details of each firewall policy in Azure, including the number of public IP addresses each firewall has. This is useful for understanding the scope and scale of your firewall protection. ```sql select @@ -52,6 +64,7 @@ where ``` ### Get DNS setting details of each policy +Explore the DNS settings of each policy to understand whether a proxy is enabled or required for network rules. This can be useful for analyzing and managing network security configurations. ```sql select @@ -65,6 +78,7 @@ from ``` ### List threat intel whitelist IP addresses of firewall policies +Explore the firewall policies that have specific IP addresses whitelisted, aiding in the understanding of threat intelligence and enhancing security measures. ```sql select @@ -77,6 +91,7 @@ from ``` ### List threat intel whitelist FQDNs of firewall policies +Explore the whitelist domain names of firewall policies to understand potential safe sources of traffic in your Azure environment. This can help you maintain a secure network by identifying trusted entities. ```sql select diff --git a/docs/tables/azure_frontdoor.md b/docs/tables/azure_frontdoor.md index c4a7d315..5cef9d52 100644 --- a/docs/tables/azure_frontdoor.md +++ b/docs/tables/azure_frontdoor.md @@ -1,10 +1,20 @@ -# Table: azure_frontdoor +--- +title: "Steampipe Table: azure_frontdoor - Query Azure Front Door Services using SQL" +description: "Allows users to query Azure Front Door Services." +--- -Azure Front Door is a global, scalable entry-point that uses the Microsoft global edge network to create fast, secure, and widely scalable web applications. With Front Door, you can transform your global consumer and enterprise applications into robust, high-performing personalized modern applications with contents that reach a global audience through Azure. +# Table: azure_frontdoor - Query Azure Front Door Services using SQL + +Azure Front Door is a scalable and secure entry point for fast delivery of your global web applications. It provides global load balancing and site acceleration service for fast and reliable application delivery at global scale. It offers SSL offload, path-based routing, fast failover, and many more capabilities. + +## Table Usage Guide + +The 'azure_frontdoor' table provides insights into Front Door Services within Azure. As a DevOps engineer, explore service-specific details through this table, including routing rules, backend pools, frontend endpoints, and associated metadata. Utilize it to uncover information about services, such as those with specific routing rules, the health probes between backend pools, and the verification of frontend endpoints. The schema presents a range of attributes of the Front Door Service for your analysis, like the service ID, creation date, enabled state, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Front Door service to understand its current state and type. This can help you assess the overall setup and configuration for effective resource management. ```sql select @@ -18,6 +28,7 @@ from ``` ### List backend pools settings details +Explore the configuration settings of backend pools in an Azure Front Door service. This allows you to assess security measures, like enforcing certificate name checks, and performance parameters, such as send/receive timeout durations. ```sql select @@ -30,6 +41,7 @@ from ``` ### List routing rules details +Determine the specific details of routing rules, such as their enabled state, resource state, accepted protocols, and associated endpoints. This can assist in understanding how traffic is being directed and managed within your Azure Front Door service. ```sql select @@ -49,6 +61,7 @@ from ``` ### List load balancing settings details +Explore the specifics of load balancing settings to assess their properties and understand their configuration, which is crucial for managing traffic distribution and ensuring efficient resource utilization. ```sql select @@ -66,6 +79,7 @@ from ``` ### List frontend endpoints details +Explore the details of frontend endpoints to gain insights into their properties such as host name, session affinity enabled state, and resource state. This can be useful in understanding and managing the configuration of these endpoints, especially in terms of their security settings like the web application firewall policy link. ```sql select @@ -84,6 +98,7 @@ from ``` ### List health probe settings details +Explore the configuration of health probe settings to understand how they are set up and functioning. This can help in assessing the performance and reliability of your network connections. ```sql select @@ -100,4 +115,4 @@ select from azure_frontdoor, jsonb_array_elements(health_probe_settings) as setting; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_hdinsight_cluster.md b/docs/tables/azure_hdinsight_cluster.md index a71a46c1..c1ca89ef 100644 --- a/docs/tables/azure_hdinsight_cluster.md +++ b/docs/tables/azure_hdinsight_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_hdinsight_cluster +--- +title: "Steampipe Table: azure_hdinsight_cluster - Query Azure HDInsight Clusters using SQL" +description: "Allows users to query Azure HDInsight Clusters." +--- -Azure HDInsight is a managed, full-spectrum, open-source analytics service in the cloud for enterprises. You can use open-source frameworks such as Hadoop, Apache Spark, Apache Hive, LLAP, Apache Kafka, Apache Storm, R, and more. +# Table: azure_hdinsight_cluster - Query Azure HDInsight Clusters using SQL + +Azure HDInsight is a cloud distribution of the Hadoop components from the Hortonworks Data Platform (HDP). Azure HDInsight makes it easy, fast, and cost-effective to process massive amounts of data. You can use the most popular open-source frameworks such as Hadoop, Spark, Hive, LLAP, Kafka, Storm, R, and more. + +## Table Usage Guide + +The 'azure_hdinsight_cluster' table provides insights into HDInsight Clusters within Azure HDInsight. As a DevOps engineer, you can explore cluster-specific details through this table, including the cluster type, version, state, and associated metadata. Utilize it to uncover information about clusters, such as the number of worker nodes, the type of storage used, and the networking configurations. The schema presents a range of attributes of the HDInsight Cluster for your analysis, like the cluster ID, creation date, tier, and associated tags. ## Examples ### Basic info +Explore the status and details of your Azure HDInsight clusters to understand their configuration and performance. This can help in maintaining optimal cluster health and efficiency. ```sql select @@ -22,6 +32,7 @@ from ``` ### List clusters with encryption in transit enabled +Assess the elements within your Azure HDInsight clusters to identify those with enabled encryption in transit. This can be useful to ensure data security and compliance with your organization's security policies. ```sql select @@ -35,6 +46,7 @@ where ``` ### List disk encryption details +Explore the encryption specifics of your disk resources to better understand your data's security. This query could be used to assess the encryption methods and algorithms in place, helping to identify potential vulnerabilities or areas for improvement. ```sql select @@ -51,6 +63,7 @@ from ``` ### List connectivity endpoint details +Explore the connectivity details of your Azure HDInsight clusters to understand their communication protocols, locations, and private IP addresses. This information can be useful in managing network configurations and optimizing data transfer between various clusters. ```sql select @@ -64,4 +77,4 @@ select from azure_hdinsight_cluster, jsonb_array_elements(connectivity_endpoints) as endpoint; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_healthcare_service.md b/docs/tables/azure_healthcare_service.md index 45311ec4..32af84ce 100644 --- a/docs/tables/azure_healthcare_service.md +++ b/docs/tables/azure_healthcare_service.md @@ -1,10 +1,20 @@ -# Table: azure_healthcare_service +--- +title: "Steampipe Table: azure_healthcare_service - Query Azure Healthcare Services using SQL" +description: "Allows users to query Azure Healthcare Services." +--- -Azure Healthcare APIs provides pipelines that help you manage protected health information (PHI) data at scale. +# Table: azure_healthcare_service - Query Azure Healthcare Services using SQL + +Azure Healthcare Service is a managed service that provides built-in support for industry standard health data protocols and data types. It enables health organizations to ingest, manage, and persist health information in the cloud. This service supports the FHIR (Fast Healthcare Interoperability Resources) standard for exchanging healthcare information electronically. + +## Table Usage Guide + +The 'azure_healthcare_service' table provides insights into Azure Healthcare Services. As a DevOps engineer, explore service-specific details through this table, including the service type, provisioning state, access policies, and associated metadata. Utilize it to uncover information about services, such as those with public network access, the kind of service, and the provisioning state. The schema presents a range of attributes of the Azure Healthcare Service for your analysis, like the service name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore the fundamental characteristics of your Azure healthcare services. This query helps you understand the types of services you have, their authorities, and whether they allow credentials, providing insights into your overall healthcare service configuration. ```sql select @@ -20,6 +30,7 @@ from ``` ### List healthcare services of fhir-R4 kind +Explore which healthcare services utilize the 'fhir-R4' type in Azure. This can be useful in identifying and managing services that employ this specific standard. ```sql select @@ -34,6 +45,7 @@ where ``` ### List private endpoint connection details for healthcare service +Explore the status and details of private connections for a healthcare service. This can be useful in managing and securing network connections within a healthcare service infrastructure. ```sql select @@ -49,6 +61,7 @@ from ``` ### List diagnostic settings for healthcare service +Analyze the settings to understand the diagnostic configurations for a healthcare service. This is useful for managing and monitoring the health of the service. ```sql select @@ -64,6 +77,7 @@ from ``` ### List Cosmos DB configuration settings +Review the configuration for Azure's Cosmos DB to determine the key vault key URI and offer throughput, which can be useful for assessing database performance and security settings. ```sql select @@ -73,4 +87,4 @@ select cosmos_db_configuration -> 'offerThroughput' as offer_throughput from azure_healthcare_service; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_hpc_cache.md b/docs/tables/azure_hpc_cache.md index 3773e3af..dcb6574d 100644 --- a/docs/tables/azure_hpc_cache.md +++ b/docs/tables/azure_hpc_cache.md @@ -1,10 +1,20 @@ -# Table: azure_hpc_cache +--- +title: "Steampipe Table: azure_hpc_cache - Query Azure Storage Cache using SQL" +description: "Allows users to query Azure Storage Caches" +--- -Azure HPC Cache speeds access to your data for high-performance computing (HPC) tasks. By caching files in Azure, Azure HPC Cache brings the scalability of cloud computing to your existing workflow. This service can be used even for workflows where your data is stored across WAN links, such as in your local datacenter network-attached storage (NAS) environment. +# Table: azure_hpc_cache - Query Azure Storage Cache using SQL + +Azure HPC Cache is a service that provides low-latency, high-throughput access to data located in Azure Blob storage. It creates a caching layer between compute clusters and storage to help you run more jobs, more iterations, and get results faster. It is designed to support high-performance computing (HPC) scenarios where data is read from and written to Azure Blob storage. + +## Table Usage Guide + +The 'azure_hpc_cache' table provides insights into the Azure HPC Cache within Azure Storage. As a DevOps engineer, explore cache-specific details through this table, including cache size, health, provisioning state, and associated metadata. Utilize it to uncover information about caches, such as their network settings, subnet ID, and usage model. The schema presents a range of attributes of the Azure HPC Cache for your analysis, like the cache ID, creation time, health, provisioning state, and associated tags. ## Examples ### Basic info +Explore which High Performance Computing (HPC) caches are currently active in your Azure environment and understand their types and provisioning states. This can help in assessing their performance and managing resources efficiently. ```sql select @@ -18,6 +28,7 @@ from ``` ### List network settings details +Explore the network settings of your Azure HPC Cache to gain insights into configurations such as DNS search domain, MTU, NTP server, DNS servers, and utility addresses. This can help you understand and manage your network's performance, security, and reliability. ```sql select @@ -33,6 +44,7 @@ from ``` ### List encryption settings details +Explore the encryption settings of your Azure HPC Cache to understand the configuration of your key encryption and network settings. This can be useful for maintaining security standards and ensuring proper data protection. ```sql select @@ -43,4 +55,4 @@ select network_settings -> 'rotationToLatestKeyVersionEnabled' as rotation_to_latest_key_version_enabled from azure_hpc_cache; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_hybrid_compute_machine.md b/docs/tables/azure_hybrid_compute_machine.md index 1ed52353..145d7978 100644 --- a/docs/tables/azure_hybrid_compute_machine.md +++ b/docs/tables/azure_hybrid_compute_machine.md @@ -1,10 +1,20 @@ -# Table: azure_hybrid_compute_machine +--- +title: "Steampipe Table: azure_hybrid_compute_machine - Query Azure Hybrid Compute Machines using SQL" +description: "Allows users to query Azure Hybrid Compute Machines" +--- -Azure Arc enables you to manage servers running outside of Azure using Azure Resource Manager. Each server is represented in Azure as a hybrid compute machine resource. Once a server is managed with Azure Arc, you can deploy agents, scripts, or configurations to the machine using extensions. The Hybrid Compute API allows you to create, list, update and delete your Azure Arc enabled servers and any extensions associated with them. +# Table: azure_hybrid_compute_machine - Query Azure Hybrid Compute Machines using SQL + +Azure Hybrid Compute Machines are a part of the Azure Arc service that extends Azure management and services to any infrastructure. It allows you to manage and govern Windows and Linux machines hosted outside of Azure, on your corporate network, or other cloud provider. This service simplifies complex and distributed environments across on-premises, edge, and multi-cloud into a unified central point. + +## Table Usage Guide + +The 'azure_hybrid_compute_machine' table provides insights into Hybrid Compute Machines within Azure Arc. As a DevOps engineer, explore machine-specific details through this table, including machine properties, operating system details, and associated metadata. Utilize it to uncover information about machines, such as their status, location, and the version of the Azure Arc agent installed on them. The schema presents a range of attributes of the Hybrid Compute Machine for your analysis, like the machine's ID, name, location, and operating system. ## Examples ### Basic info +Explore which machines in your Azure hybrid environment are active and where they are located. This can assist in managing resources and understanding the distribution of your infrastructure. ```sql select @@ -18,6 +28,7 @@ from ``` ### List disconnected machines +Identify instances where machines in the Azure hybrid compute environment are disconnected. This can be useful in diagnosing network issues or managing system availability. ```sql select diff --git a/docs/tables/azure_hybrid_kubernetes_connected_cluster.md b/docs/tables/azure_hybrid_kubernetes_connected_cluster.md index 9e67b678..c56f65f8 100644 --- a/docs/tables/azure_hybrid_kubernetes_connected_cluster.md +++ b/docs/tables/azure_hybrid_kubernetes_connected_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_hybrid_kubernetes_connected_cluster +--- +title: "Steampipe Table: azure_hybrid_kubernetes_connected_cluster - Query Azure Kubernetes Service Connected Clusters using SQL" +description: "Allows users to query Azure Kubernetes Service Connected Clusters" +--- -Hybrid Kubernetes Service allows you to manage your on-premise kubernetes clusters from azure by onboarding them to Azure Arc. The Hybrid Kubernetes API allows you to create, list, update and delete your Arc enabled kubernetes clusters. +# Table: azure_hybrid_kubernetes_connected_cluster - Query Azure Kubernetes Service Connected Clusters using SQL + +Azure Kubernetes Service (AKS) is a managed container orchestration service provided by Microsoft Azure. AKS simplifies the deployment, scaling, and operations of Kubernetes. The Connected Cluster feature allows users to bring their existing Kubernetes clusters running outside of Azure into the Azure Resource Model. + +## Table Usage Guide + +The 'azure_hybrid_kubernetes_connected_cluster' table provides insights into Connected Clusters within Azure Kubernetes Service (AKS). As a DevOps engineer, explore cluster-specific details through this table, including cluster versions, node counts, and associated metadata. Utilize it to uncover information about clusters, such as their provisioning states, the Kubernetes versions they are running, and their network profiles. The schema presents a range of attributes of the Connected Cluster for your analysis, like the cluster ID, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore which Azure Hybrid Kubernetes clusters are provisioned and their respective connectivity statuses to understand their operational readiness across different regions. This is particularly useful in managing resources and ensuring optimal cluster performance. ```sql select @@ -18,6 +28,7 @@ from ``` ### List expired clusters +Explore which hybrid Kubernetes clusters in your Azure environment have expired. This is useful in maintaining optimal resource allocation and ensuring all active clusters are in good health. ```sql select @@ -31,4 +42,4 @@ from azure_hybrid_kubernetes_connected_cluster where connectivity_status = 'Expired'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_iothub.md b/docs/tables/azure_iothub.md index bc0f7b4e..cdb04ce0 100644 --- a/docs/tables/azure_iothub.md +++ b/docs/tables/azure_iothub.md @@ -1,10 +1,20 @@ -# Table: azure_iothub +--- +title: "Steampipe Table: azure_iothub - Query Azure IoT Hub using SQL" +description: "Allows users to query Azure IoT Hubs" +--- -Azure IoT Hub is Microsoft’s Internet of Things connector to the cloud. It’s a fully managed cloud service that enables reliable and secure bi-directional communications between millions of IoT devices and a solution back end. +# Table: azure_iothub - Query Azure IoT Hub using SQL + +Azure IoT Hub is a managed service, hosted in the cloud, that acts as a central message hub for bi-directional communication between your IoT application and the devices it manages. You can use Azure IoT Hub to build IoT solutions with reliable and secure communications between millions of IoT devices and a cloud-hosted solution backend. It supports communications both from the device to the cloud and from the cloud to the device. + +## Table Usage Guide + +The 'azure_iothub' table provides insights into IoT Hubs within Azure IoT Hub. As a DevOps engineer, explore hub-specific details through this table, including the status, SKU, tier, and associated metadata. Utilize it to uncover information about IoT Hubs, such as their location, the number of devices connected, and the verification of their properties. The schema presents a range of attributes of the IoT Hub for your analysis, like the resource group, subscription ID, public network access, and associated tags. ## Examples ### Basic info +Analyze the settings of your Azure IoT Hub to understand its geographical distribution and types. This can help in managing resources and improving the efficiency of IoT devices across different regions. ```sql select @@ -17,6 +27,7 @@ from ``` ### List hubs which are not active +Determine the areas in which inactive IoT hubs exist within the Azure platform. This can be beneficial in identifying potential issues or inefficiencies related to unused resources. ```sql select @@ -28,4 +39,4 @@ from azure_iothub where state <> 'Active'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_iothub_dps.md b/docs/tables/azure_iothub_dps.md index df15850a..20bb945a 100644 --- a/docs/tables/azure_iothub_dps.md +++ b/docs/tables/azure_iothub_dps.md @@ -1,10 +1,20 @@ -# Table: azure_iothub_dps +--- +title: "Steampipe Table: azure_iothub_dps - Query Azure IoT Hub Device Provisioning Services using SQL" +description: "Allows users to query Azure IoT Hub Device Provisioning Services." +--- -The IoT Hub Device Provisioning Service (DPS) is a helper service for IoT Hub that enables zero-touch, just-in-time provisioning to the right IoT hub without requiring human intervention, allowing customers to provision millions of devices in a secure and scalable manner. +# Table: azure_iothub_dps - Query Azure IoT Hub Device Provisioning Services using SQL + +Azure IoT Hub Device Provisioning Service is a helper service for IoT Hub that enables zero-touch, just-in-time provisioning to the right IoT hub without requiring human intervention, enabling customers to provision millions of devices in a secure and scalable manner. It brings the scalability, security, and reliability of Azure IoT Hub and Device Provisioning Service to your on-premises Internet of Things (IoT) applications. The service supports provisioning of both Azure IoT Edge devices and IoT devices running on other operating systems. + +## Table Usage Guide + +The 'azure_iothub_dps' table provides insights into Device Provisioning Services within Azure IoT Hub. As a DevOps engineer, explore service-specific details through this table, including the provisioning state, IoT Hub linked with the service, and associated metadata. Utilize it to uncover information about services, such as those with specific provisioning states, the IoT Hubs associated with the services, and the verification of the service operations monitoring level. The schema presents a range of attributes of the IoT Hub Device Provisioning Service for your analysis, like the service name, provisioning state, IoT Hub Device ID, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure IoT Hub Device Provisioning Services (DPS) to understand their locations and types. This can be useful to manage and organize your IoT devices across different regions. ```sql select @@ -17,6 +27,7 @@ from ``` ### List iot hub dps which are not active +Explore which IoT Hub Device Provisioning Services are not currently active, to potentially identify any issues or areas requiring attention. This could be beneficial in maintaining optimal network performance and avoiding potential service disruptions. ```sql select @@ -28,4 +39,4 @@ from azure_iothub_dps where state <> 'Active'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault.md b/docs/tables/azure_key_vault.md index 2097f42c..91ef8cc4 100644 --- a/docs/tables/azure_key_vault.md +++ b/docs/tables/azure_key_vault.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault +--- +title: "Steampipe Table: azure_key_vault - Query Azure Key Vault using SQL" +description: "Allows users to query Azure Key Vaults" +--- -Azure Key Vault is a cloud service used to manage keys, secrets, and certificates. +# Table: azure_key_vault - Query Azure Key Vault using SQL + +Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. Azure Key Vault handles the storage and management of these secrets in a secure and scalable manner, reducing the chances of accidental secret leakage. + +## Table Usage Guide + +The 'azure_key_vault' table provides insights into Key Vaults within Azure Key Vault service. As a security engineer, explore details specific to each Key Vault through this table, including the vault's URI, resource group, subscription, and location. Utilize it to uncover information about Key Vaults' properties, such as enabled for deployment, disk encryption, template deployment, and soft delete. The schema presents a range of attributes of the Key Vault for your analysis, like the tenant ID, SKU name, family, vault URI, access policies, and associated tags. ## Examples ### List of key vaults where soft deletion is not enabled +Determine the areas in which soft deletion is not enabled within key vaults. This query can be useful for identifying potential security risks and ensuring data recovery options are in place. ```sql select @@ -20,6 +30,7 @@ where ### List of key vaults where soft deletion retention period is less than 30 days +Determine the areas in which your Azure Key Vaults have a soft deletion retention period of less than 30 days. This is useful to ensure that your data retention policies are in line with your organization's security standards. ```sql select @@ -35,6 +46,7 @@ where ### Key vaults access information +Explore which Azure Key Vaults are enabled for deployment, disk encryption, and template deployment. This is useful for assessing your security configurations and identifying potential vulnerabilities. ```sql select @@ -49,6 +61,7 @@ from ### List of premium category key vaults +Explore which key vaults fall under the premium category. This can be beneficial for understanding your usage and cost distribution in Azure. ```sql select @@ -64,6 +77,7 @@ where ### Key vaults access policies details for certificates, keys and secrets +Explore the access policies for certificates, keys, and secrets within your Azure Key Vaults. This can help you understand the permissions set up in your environment, ensuring the right access controls are in place. ```sql select @@ -78,6 +92,7 @@ from ### List vaults with logging enabled +Discover the segments of your Azure Key Vaults where logging is enabled. This can be useful for auditing and compliance purposes, as it allows you to track and retain important security and access data. ```sql select @@ -95,4 +110,4 @@ where and (log ->> 'enabled')::boolean and log ->> 'category' = 'AuditEvent' and (log -> 'retentionPolicy' ->> 'days')::integer > 0; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_deleted_vault.md b/docs/tables/azure_key_vault_deleted_vault.md index 42397844..0e647afe 100644 --- a/docs/tables/azure_key_vault_deleted_vault.md +++ b/docs/tables/azure_key_vault_deleted_vault.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_deleted_vault +--- +title: "Steampipe Table: azure_key_vault_deleted_vault - Query Azure Key Vault Deleted Vaults using SQL" +description: "Allows users to query Azure Key Vault Deleted Vaults for detailed information." +--- -Azure Key Vault's soft-delete feature allows recovery of the deleted vaults and deleted key vault objects. +# Table: azure_key_vault_deleted_vault - Query Azure Key Vault Deleted Vaults using SQL + +Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. Azure Key Vault Deleted Vaults are vaults that have been deleted but are still recoverable for a certain period of time. + +## Table Usage Guide + +The 'azure_key_vault_deleted_vault' table provides insights into deleted vaults within Azure Key Vault. As a security analyst or DevOps engineer, explore deleted vault-specific details through this table, including deletion date, recovery level, and scheduled purge date. Utilize it to uncover information about deleted vaults, such as those scheduled for permanent deletion or those still recoverable. The schema presents a range of attributes of the deleted vault for your analysis, like the vault name, location, deletion date, and scheduled purge date. ## Examples ### Basic info +Explore which Azure Key Vault resources have been deleted and when they are scheduled for permanent removal. This can be useful for auditing purposes or to recover resources before they are permanently purged. ```sql select @@ -18,6 +28,7 @@ from ``` ### List deleted vaults with scheduled purge date more than 1 day +Identify instances where Azure Key Vaults have been deleted and are scheduled for purging in more than a day. This can be useful in assessing data cleanup strategies and preventing accidental loss of important keys. ```sql select @@ -30,4 +41,4 @@ from azure_key_vault_deleted_vault where scheduled_purge_date > (current_date - interval '1' day); -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_key.md b/docs/tables/azure_key_vault_key.md index a68dd9b5..7b5ebeaa 100644 --- a/docs/tables/azure_key_vault_key.md +++ b/docs/tables/azure_key_vault_key.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_key +--- +title: "Steampipe Table: azure_key_vault_key - Query Azure Key Vault Keys using SQL" +description: "Allows users to query Azure Key Vault Keys." +--- -Azure Key Vault Keys are 'Cryptographic keys' used to encrypt information without releasing the private key to the consumer. It acts like a black box to encrypt and decrypt content using the RSA algorithm. The RSA algorithm, involves a public key and private key. +# Table: azure_key_vault_key - Query Azure Key Vault Keys using SQL + +Azure Key Vault is a service that safeguards cryptographic keys and secrets used by cloud applications and services. It provides secure key management, ensures that keys are available when needed, and prevents unauthorized access. Azure Key Vault Keys are the keys that are stored in the Azure Key Vault for use in applications and services. + +## Table Usage Guide + +The 'azure_key_vault_key' table provides insights into keys within Azure Key Vault. As a security engineer, explore key-specific details through this table, including the key type, key state, and associated metadata. Utilize it to uncover information about keys, such as those that are disabled, the verification of key attributes, and the creation and expiry dates. The schema presents a range of attributes of the Key Vault key for your analysis, like the key ID, creation date, updated date, and vault details. ## Examples ### Basic info +This query allows you to review the details of your Azure Key Vault keys. It is particularly useful in auditing and managing these keys by providing information such as their status, creation and modification dates, and location. ```sql select @@ -20,6 +30,7 @@ from ``` ### List disabled keys +Explore which keys in your Azure Key Vault are currently disabled. This can help in maintaining security by identifying and managing inactive keys. ```sql select @@ -33,6 +44,7 @@ where ``` ### List keys with no expiration time set +Explore which keys in the Azure Key Vault have no expiration time set. This can help in identifying potential security risks, as keys without an expiration can be misused if they fall into the wrong hands. ```sql select @@ -46,6 +58,7 @@ where ``` ### List keys which have never been updated +Explore which keys in Azure Key Vault are active but have never been modified since their creation. This helps in identifying unused or potentially obsolete keys, aiding in better security management. ```sql select @@ -61,6 +74,7 @@ where ``` ### Count the number of keys by key vault +Explore which Azure Key Vault has the most keys, providing a useful overview of your key distribution and aiding in the management and organization of your security assets. ```sql select @@ -70,4 +84,4 @@ from azure_key_vault_key group by vault_name; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_key_version.md b/docs/tables/azure_key_vault_key_version.md index 138054cc..47275434 100644 --- a/docs/tables/azure_key_vault_key_version.md +++ b/docs/tables/azure_key_vault_key_version.md @@ -1,10 +1,21 @@ -# Table: azure_key_vault_key_version +--- +title: "Steampipe Table: azure_key_vault_key_version - Query Azure Key Vault Keys using SQL" +description: "Allows users to query versions of Azure Key Vault Keys." +--- + +# Table: azure_key_vault_key_version - Query Azure Key Vault Keys using SQL + +Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. Key Vault service supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value keys. + +## Table Usage Guide + +The 'azure_key_vault_key_version' table provides insights into versions of keys within Azure Key Vault. As a security analyst, explore key-specific details through this table, including key type, key size, and key state. Utilize it to uncover information about keys, such as their creation date, update date, and the recovery level. The schema presents a range of attributes of the key for your analysis, like the key ID, enabled status, expiration date, and associated tags. -Azure Key Vault Keys are 'Cryptographic keys' used to encrypt information without releasing the private key to the consumer. It acts like a black box to encrypt and decrypt content using the RSA algorithm. The RSA algorithm, involves a public key and private key. They can roll to a new version of the key, back it up, and do related tasks. ## Examples ### Basic info +Explore the settings of Azure Key Vault keys to understand their status and configuration. This is useful for assessing security measures and ensuring proper key management. ```sql select @@ -20,6 +31,7 @@ from ``` ### List disabled key versions +Discover the segments that contain disabled key versions in Azure Key Vault. This is useful for assessing security configurations and maintaining proper access controls. ```sql select @@ -34,6 +46,7 @@ where ``` ### List keys versions with no expiration time set +Explore which versions of keys in Azure Key Vault lack a set expiration time. This query is useful for identifying potential security risks, as keys without expiration times can be misused if they fall into the wrong hands. ```sql select @@ -47,6 +60,7 @@ where ``` ### Count the number of versions by key +Explore the distribution of different key versions within your Azure Key Vault. This is useful for assessing the overall version management and understanding if certain keys are being updated more frequently than others. ```sql select @@ -56,4 +70,4 @@ from azure_key_vault_key_version group by key_name; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_managed_hardware_security_module.md b/docs/tables/azure_key_vault_managed_hardware_security_module.md index 2fa2cf5f..b0b5979b 100644 --- a/docs/tables/azure_key_vault_managed_hardware_security_module.md +++ b/docs/tables/azure_key_vault_managed_hardware_security_module.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_managed_hardware_security_module +--- +title: "Steampipe Table: azure_key_vault_managed_hardware_security_module - Query Azure Key Vault Managed Hardware Security Modules using SQL" +description: "Allows users to query Azure Key Vault Managed Hardware Security Modules." +--- -Azure Key Vault Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs. +# Table: azure_key_vault_managed_hardware_security_module - Query Azure Key Vault Managed Hardware Security Modules using SQL + +A Managed Hardware Security Module (HSM) is a service offered by Azure Key Vault that provides cryptographic key storage in Azure. It provides secure, FIPS 140-2 Level 3 validated, cryptographic key storage and operations using Azure Key Vault. It is designed to meet the stringent requirements of highly regulated industries that process, store, and use sensitive data. + +## Table Usage Guide + +The 'azure_key_vault_managed_hardware_security_module' table provides insights into Managed Hardware Security Modules within Azure Key Vault. As a security or DevOps engineer, explore module-specific details through this table, including its cryptographic keys, key operations, and associated metadata. Utilize it to uncover information about modules, such as their key identifiers, enabled status, and creation time. The schema presents a range of attributes of the Managed Hardware Security Module for your analysis, like the resource ID, name, type, and location. ## Examples ### Basic info +Analyze the settings to understand the configuration of your Azure Key Vault Managed Hardware Security Module. This query can help you assess the elements within your system, such as its name, ID, type, and region, as well as whether the soft delete option is enabled. ```sql select @@ -19,6 +29,7 @@ from ``` ### List soft delete disabled hsm managed key vaults +Identify instances where Azure Key Vault Managed Hardware Security Modules do not have the soft delete feature enabled. This is useful for ensuring data protection and recovery in case of accidental deletion. ```sql select diff --git a/docs/tables/azure_key_vault_secret.md b/docs/tables/azure_key_vault_secret.md index 9b99a729..9f11423d 100644 --- a/docs/tables/azure_key_vault_secret.md +++ b/docs/tables/azure_key_vault_secret.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_secret +--- +title: "Steampipe Table: azure_key_vault_secret - Query Azure Key Vault Secrets using SQL" +description: "Allows users to query Azure Key Vault Secrets." +--- -Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. +# Table: azure_key_vault_secret - Query Azure Key Vault Secrets using SQL + +Azure Key Vault is a service in Microsoft Azure that allows you to securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. It provides a centralized way to manage application secrets and control their distribution. Azure Key Vault helps you control your applications' secrets by keeping them off the code and allowing secure access to them. + +## Table Usage Guide + +The 'azure_key_vault_secret' table provides insights into secrets within Azure Key Vault. As a security engineer, explore secret-specific details through this table, including secret versions, enabled status, and associated metadata. Utilize it to uncover information about secrets, such as those with expirations, the recovery level of each secret, and the verification of content types. The schema presents a range of attributes of the Azure Key Vault secret for your analysis, like the secret name, vault name, enabled status, and creation date. ## Examples ### Basic info +Discover the secrets stored in your Azure Key Vault by examining the details such as name, ID, vault name, and status. This can help you manage and track your secrets, ensuring they are enabled and updated as needed. ```sql select @@ -20,6 +30,7 @@ from ``` ### List disabled secrets +Discover the segments that contain disabled secrets within your Azure Key Vault, allowing you to assess potential security vulnerabilities or areas requiring further management. This is particularly useful for maintaining the integrity of your system by identifying inactive or unused secrets. ```sql select @@ -33,6 +44,7 @@ where ``` ### List secrets that do not expire +Discover the segments that contain secrets in your Azure Key Vault that do not have an expiration date set. This can help in identifying potential security risks and ensuring that all secrets are managed according to best practices. ```sql select @@ -46,6 +58,7 @@ where ``` ### List enabled secrets that have never been updated +Discover the segments that consist of active secrets within your Azure Key Vault that have remained unchanged since their creation. This is beneficial for maintaining good security practices, as it allows you to identify and update stagnant secrets. ```sql select @@ -61,6 +74,7 @@ where ``` ### Count the number of secrets by vault +Determine the quantity of secrets stored in each Azure Key Vault. This can help in managing and monitoring the distribution of secrets across your vaults. ```sql select @@ -70,4 +84,4 @@ from azure_key_vault_secret group by vault_name; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_kubernetes_cluster.md b/docs/tables/azure_kubernetes_cluster.md index c22050cc..993382e9 100644 --- a/docs/tables/azure_kubernetes_cluster.md +++ b/docs/tables/azure_kubernetes_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_kubernetes_cluster +--- +title: "Steampipe Table: azure_kubernetes_cluster - Query Azure Kubernetes Services using SQL" +description: "Allows users to query Azure Kubernetes Services" +--- -Azure Kubernetes orchestrates clusters of virtual machines and schedules containers to run on those virtual machines based on their available compute resources and the resource requirements of each container. +# Table: azure_kubernetes_cluster - Query Azure Kubernetes Services using SQL + +Azure Kubernetes Service (AKS) is a managed container orchestration service provided by Microsoft Azure. AKS simplifies the deployment, scaling, and operations of Kubernetes. It provides an integrated developer experience for building, deploying, and scaling containerized applications. + +## Table Usage Guide + +The 'azure_kubernetes_cluster' table provides insights into Kubernetes clusters within Azure Kubernetes Service (AKS). As a DevOps engineer, explore cluster-specific details through this table, including version, node count, and associated metadata. Utilize it to uncover information about clusters, such as those with specific configurations, the relationships between clusters, and the verification of cluster settings. The schema presents a range of attributes of the Kubernetes cluster for your analysis, like the cluster ID, creation date, attached network policies, and associated tags. ## Examples ### Basic Info +Explore which Azure Kubernetes clusters are available, by identifying their names, IDs, locations, types, and SKU details. This can help in managing resources and understanding the distribution of clusters across different locations and types. ```sql select @@ -19,6 +29,7 @@ from ### List clusters with a system assigned identity +Determine the areas in which clusters with a system-assigned identity are located. This query is useful to understand the distribution and arrangement of these clusters across different regions. ```sql select @@ -36,6 +47,7 @@ where ### List clusters that have role-based access control (RBAC) disabled +Determine the areas in which role-based access control (RBAC) is disabled on clusters. This is useful for identifying potential security vulnerabilities within your Azure Kubernetes clusters. ```sql select @@ -54,6 +66,7 @@ where ### List clusters with an undesirable version (older than 1.20.5) +Discover clusters that are running on an outdated version, specifically older than 1.20.5. This is useful for identifying potential security risks and planning necessary updates to maintain optimal performance. ```sql select @@ -66,4 +79,4 @@ from azure_kubernetes_cluster where kubernetes_version < '1.20.5'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_kubernetes_service_version.md b/docs/tables/azure_kubernetes_service_version.md index 95be7988..760bed0b 100644 --- a/docs/tables/azure_kubernetes_service_version.md +++ b/docs/tables/azure_kubernetes_service_version.md @@ -1,12 +1,20 @@ -# Table: azure_kubernetes_service_version +--- +title: "Steampipe Table: azure_kubernetes_service_version - Query Azure Kubernetes Services using SQL" +description: "Allows users to query Azure Kubernetes Service Versions." +--- -Azure AKS (Azure Kubernetes Service) orchestrator is a managed container orchestration service provided by Microsoft Azure. It simplifies the deployment, management, and scaling of containerized applications using Kubernetes. AKS allows you to deploy and manage containerized applications without the need to manage the underlying infrastructure. It provides automated Kubernetes upgrades, built-in monitoring and diagnostics, and seamless integration with other Azure services. AKS enables developers and DevOps teams to focus on application development and deployment, while Azure takes care of the underlying Kubernetes infrastructure. +# Table: azure_kubernetes_service_version - Query Azure Kubernetes Services using SQL -**Note:** You need to pass the `location` in the where clause to query this table. +Azure Kubernetes Service (AKS) is a managed container orchestration service provided by Microsoft Azure. AKS simplifies the deployment, scaling, and operations of Kubernetes by hosting the Kubernetes environment on Azure. With AKS, you can easily manage and scale your applications using Kubernetes, without the complexities of handling the underlying infrastructure. + +## Table Usage Guide + +The 'azure_kubernetes_service_version' table provides insights into the versions of Azure Kubernetes Services (AKS). As a DevOps engineer, explore version-specific details through this table, including the release date, Kubernetes version, and whether it's a preview version. Utilize it to uncover information about the availability of different versions, their status, and the upgrade paths. The schema presents a range of attributes of the AKS version for your analysis, like the version name, release date, and whether it's a default version. ## Examples ### Basic info +Explore which versions of Azure Kubernetes Service are available in the 'eastus2' location. This could be useful when planning deployments or upgrades in that specific region. ```sql select @@ -22,6 +30,7 @@ where ``` ### List major kubernetes versions +Explore major versions of Kubernetes services deployed in the 'eastus2' region of Azure. This can help you understand the types of Kubernetes orchestrators used and their versions for better management and updates. ```sql select @@ -38,6 +47,7 @@ and ``` ### List kubernetes orchestrator type +Determine the areas in which Kubernetes is used as the orchestrator type within the Azure Kubernetes service in the East US 2 region to understand its prevalence and preview status. ```sql select @@ -55,6 +65,7 @@ and ``` ### List kubernetes versions that are not in preview +Explore the various versions of Kubernetes that are fully released and available for use in the East US 2 region. This can be useful for planning and implementing your Kubernetes deployments in that specific region. ```sql select @@ -72,6 +83,7 @@ and ``` ### Get upgrade details of each kubernetes version +Explore the details of each Kubernetes upgrade, including the orchestrator type and version, and understand whether it is a preview version. This is particularly useful for managing and planning upgrades in the 'eastus2' location. ```sql select @@ -84,4 +96,4 @@ from jsonb_array_elements(upgrades) as u where location = 'eastus2'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_kusto_cluster.md b/docs/tables/azure_kusto_cluster.md index 8e3aab8e..c538a79f 100644 --- a/docs/tables/azure_kusto_cluster.md +++ b/docs/tables/azure_kusto_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_kusto_cluster +--- +title: "Steampipe Table: azure_kusto_cluster - Query Azure Data Explorer Clusters using SQL" +description: "Allows users to query Azure Data Explorer Clusters." +--- -An Azure Data Explorer cluster (Previously known as Kusto) is a pair of engine and data management clusters which uses several Azure resources such as Azure Linux VM’s and Storage. The applicable VMs, Azure Storage, Azure Networking and Azure Load balancer costs are billed directly to the customer subscriptions, applications, websites, etc. +# Table: azure_kusto_cluster - Query Azure Data Explorer Clusters using SQL + +Azure Data Explorer, also known as Kusto, is a fast and scalable data exploration service for analyzing large volumes of diverse data from any data source, such as websites, applications, IoT devices, and more. A cluster in Azure Data Explorer is a set of compute resources, and it is the most basic resource you create when getting started with the service. It provides the basic resources and computing power required to run data explorations and carry out operations on the data. + +## Table Usage Guide + +The 'azure_kusto_cluster' table provides insights into Azure Data Explorer Clusters. As a data analyst or data scientist, you can explore cluster-specific details through this table, including cluster capacity, SKU name, and associated metadata. Utilize it to uncover information about clusters, such as their provisioning state, capacity, and SKU tier. The schema presents a range of attributes of the Azure Data Explorer Cluster for your analysis, like the cluster ID, name, type, location, and tags. ## Examples ### Basic Info +Explore which Azure Kusto clusters are present in your environment to understand their locations and types, helping you manage and optimize your resources effectively. ```sql select @@ -19,6 +29,7 @@ from ``` ### List kusto clusters with standard sku tier +Explore which Kusto clusters are operating under the standard SKU tier. This is useful for understanding your resource utilization and optimizing costs within your Azure environment. ```sql select @@ -34,6 +45,7 @@ where ``` ### List running kusto clusters +Explore which Kusto clusters are currently active in your Azure environment. This is useful for managing resources and ensuring optimal performance. ```sql select @@ -47,6 +59,7 @@ where ``` ### List the kusto clusters with system-assigned identity +Uncover the details of Kusto clusters that are using a system-assigned identity. This can be particularly useful to understand the state of your clusters and to ensure that the identity assignment aligns with your security and management policies. ```sql select diff --git a/docs/tables/azure_lb.md b/docs/tables/azure_lb.md index 99e826e8..d2179e21 100644 --- a/docs/tables/azure_lb.md +++ b/docs/tables/azure_lb.md @@ -1,10 +1,20 @@ -# Table: azure_lb +--- +title: "Steampipe Table: azure_lb - Query Azure Load Balancers using SQL" +description: "Allows users to query Azure Load Balancers." +--- -Azure Load Balancer operates at layer 4 of the Open Systems Interconnection (OSI) model. It's the single point of contact for clients. Load balancer distributes inbound flows that arrive at the load balancer's front end to backend pool instances. These flows are according to configured load-balancing rules and health probes. The backend pool instances can be Azure Virtual Machines or instances in a virtual machine scale set. +# Table: azure_lb - Query Azure Load Balancers using SQL + +Azure Load Balancers support the distribution of network traffic across Azure resources in a manner that is scalable and highly available. They provide low latency and high throughput, making applications highly responsive and robust. Load Balancers can be configured to provide public or private network access, and support both inbound and outbound scenarios. + +## Table Usage Guide + +The 'azure_lb' table provides insights into Load Balancers within Azure. As a DevOps engineer, explore Load Balancer-specific details through this table, including SKU, type, and associated metadata. Utilize it to uncover information about Load Balancers, such as those with specific provisioning states, the IP configurations, and the verification of backend address pools. The schema presents a range of attributes of the Load Balancer for your analysis, like the resource group name, subscription ID, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Load Balancer to understand its operational state and location. This could be useful for assessing the load distribution and performance optimization in your network. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed load balancers +Identify instances where Azure load balancers have failed to provision correctly. This can help in diagnosing issues and ensuring optimal system performance. ```sql select diff --git a/docs/tables/azure_lb_backend_address_pool.md b/docs/tables/azure_lb_backend_address_pool.md index 3f4ce930..d1be93a7 100644 --- a/docs/tables/azure_lb_backend_address_pool.md +++ b/docs/tables/azure_lb_backend_address_pool.md @@ -1,10 +1,20 @@ -# Table: azure_lb_backend_address_pool +--- +title: "Steampipe Table: azure_lb_backend_address_pool - Query Azure Load Balancer Backend Address Pools using SQL" +description: "Allows users to query Azure Load Balancer Backend Address Pools" +--- -An Azure load balancer's backend address pool consists of IP addresses associated with the virtual machine NICs. This pool is used to distribute traffic to the virtual machines behind the load balancer. +# Table: azure_lb_backend_address_pool - Query Azure Load Balancer Backend Address Pools using SQL + +A Backend Address Pool is a part of Azure Load Balancer, which contains IP addresses for the backend servers. Azure Load Balancer distributes inbound flows that arrive at the load balancer's front end to backend pool instances. These flows are according to configured load balancing rules and health probes. + +## Table Usage Guide + +The 'azure_lb_backend_address_pool' table provides insights into Backend Address Pools within Azure Load Balancer. As a DevOps engineer, explore details specific to Backend Address Pools through this table, including the backend IP configurations, load balancing rules, and associated metadata. Utilize it to uncover information about Backend Address Pools, such as their health probe settings, load balancing rules, and the verification of backend IP configurations. The schema presents a range of attributes of the Backend Address Pool for your analysis, like the name, ID, type, region, and associated tags. ## Examples ### Basic info +Discover the segments that are part of your Azure load balancer's backend address pool. This query can help you assess the elements within your infrastructure, particularly useful in understanding the provisioning state and types of your resources for better resource management. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer backend address pools +Identify instances where load balancer backend address pools in Azure have failed to provision. This can help in troubleshooting and ensuring optimal resource allocation. ```sql select @@ -29,4 +40,4 @@ from azure_lb_backend_address_pool where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_lb_nat_rule.md b/docs/tables/azure_lb_nat_rule.md index 5ac1f80f..fde97a19 100644 --- a/docs/tables/azure_lb_nat_rule.md +++ b/docs/tables/azure_lb_nat_rule.md @@ -1,10 +1,20 @@ -# Table: azure_lb_nat_rule +--- +title: "Steampipe Table: azure_lb_nat_rule - Query Azure Load Balancer NAT Rules using SQL" +description: "Allows users to query Azure Load Balancer NAT Rules." +--- -An inbound NAT rule forwards incoming traffic sent to frontend IP address and port combination. The traffic is sent to a specific virtual machine or instance in the backend pool. Port forwarding is done by the same hash-based distribution as load balancing. +# Table: azure_lb_nat_rule - Query Azure Load Balancer NAT Rules using SQL + +Azure Load Balancer is a high-performance, ultra low-latency Layer 4 load-balancing service (inbound and outbound) for all UDP and TCP protocols. Load Balancer NAT Rules are resources within Azure Load Balancer that allow you to control IP address translations. NAT rules use source network address translation (SNAT) and destination network address translation (DNAT) to translate IP addresses and ports. + +## Table Usage Guide + +The 'azure_lb_nat_rule' table provides insights into NAT rules within Azure Load Balancer. As a network administrator, explore NAT rule-specific details through this table, including inbound and outbound IP address translations, associated front-end IP configurations, and protocol types. Utilize it to uncover information about NAT rules, such as those with specific IP address translations, the associated load balancer, and the verification of protocol types. The schema presents a range of attributes of the NAT rule for your analysis, like the rule ID, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Load Balancer Network Address Translation (NAT) rules are currently in use. This can help in understanding the provisioning state and type of each rule for better management and optimization of network resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer nat rules +Explore which load balancer NAT rules in Azure have failed to provision, allowing you to identify potential issues and take corrective action. ```sql select @@ -32,6 +43,7 @@ where ``` ### List load balancer nat rules order by idle timeout +Determine the areas in which load balancer NAT rules are prioritized based on their idle timeout duration. This helps in managing and optimizing network traffic flow by identifying rules that are inactive for longer periods. ```sql select diff --git a/docs/tables/azure_lb_outbound_rule.md b/docs/tables/azure_lb_outbound_rule.md index 4564abf6..2c454b58 100644 --- a/docs/tables/azure_lb_outbound_rule.md +++ b/docs/tables/azure_lb_outbound_rule.md @@ -1,10 +1,20 @@ -# Table: azure_lb_outbound_rule +--- +title: "Steampipe Table: azure_lb_outbound_rule - Query Azure Load Balancer Outbound Rules using SQL" +description: "Allows users to query Azure Load Balancer Outbound Rules" +--- -Outbound rules allow you to explicitly define SNAT(source network address translation) for a public standard load balancer. This configuration allows you to use the public IP(s) of your load balancer to provide outbound internet connectivity for your backend instances. +# Table: azure_lb_outbound_rule - Query Azure Load Balancer Outbound Rules using SQL + +An Azure Load Balancer is a network performance utility within Microsoft Azure that enables you to manage network traffic to your applications. It operates at layer four of the Open Systems Interconnection (OSI) model and provides high availability by distributing incoming traffic among healthy service instances in cloud services or virtual machines in a load balancer set. Outbound Rules in Azure Load Balancer are used to control outbound connectivity for virtual machines (VMs) in your virtual network. + +## Table Usage Guide + +The 'azure_lb_outbound_rule' table provides insights into Outbound Rules within Azure Load Balancer. As a network administrator, explore rule-specific details through this table, including protocol type, backend pool, frontend IP configuration, and associated metadata. Utilize it to uncover information about outbound rules, such as those with specific protocols, the associated backend pool, and the configured frontend IP. The schema presents a range of attributes of the Outbound Rule for your analysis, like the rule id, provisioning state, protocol type, and associated tags. ## Examples ### Basic info +Explore which outbound rules are currently being provisioned within your Azure load balancer. This query allows you to keep track of the state of your rules, ensuring that your network traffic is being managed effectively. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer outbound rules +Identify instances where load balancer outbound rules have failed in Azure. This can be beneficial in troubleshooting and understanding the network issues that might be affecting your services. ```sql select @@ -32,6 +43,7 @@ where ``` ### List load balancer outbound rules order by idle timeout +Explore which load balancer outbound rules have the longest idle timeouts to optimize resource allocation and efficiency. This could help in identifying areas where resources might be underutilized and could be better deployed elsewhere. ```sql select diff --git a/docs/tables/azure_lb_probe.md b/docs/tables/azure_lb_probe.md index f69b41e8..acfb43bc 100644 --- a/docs/tables/azure_lb_probe.md +++ b/docs/tables/azure_lb_probe.md @@ -1,10 +1,20 @@ -# Table: azure_lb_probe +--- +title: "Steampipe Table: azure_lb_probe - Query Azure Load Balancer Probes using SQL" +description: "Allows users to query Azure Load Balancer Probes." +--- -When using load-balancing rules with Azure Load Balancer, you need to specify health probes to allow Load Balancer to detect the backend endpoint status. The configuration of the health probe and probe responses determine which backend pool instances will receive new flows. You can use health probes to detect the failure of an application on a backend endpoint. +# Table: azure_lb_probe - Query Azure Load Balancer Probes using SQL + +Azure Load Balancer is a high-performance, ultra low-latency Layer 4 load-balancing service for all UDP and TCP protocols. Probes in Azure Load Balancer monitor the health of the resources in your load balancer's backend pool. They automatically detect failures and take steps to ensure that traffic only goes to healthy resources. + +## Table Usage Guide + +The 'azure_lb_probe' table provides insights into the probes within Azure Load Balancer. As a DevOps engineer, explore probe-specific details through this table, including protocol, port, request path, and associated metadata. Utilize it to uncover information about probes, such as their interval and timeout settings, the number of unhealthy responses before marking a resource as "unhealthy", and the load balancer that each probe is associated with. The schema presents a range of attributes of the probe for your analysis, like the probe's ID, name, and type, as well as the resource group and subscription it belongs to. ## Examples ### Basic info +Explore which Azure load balancer probes are currently active. This can help in determining the operational status and managing the load balancing configuration effectively. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed load balancer probes +Discover the segments that have failed load balancer probes to identify potential issues with your Azure load balancer setup. This could help in troubleshooting and enhancing the overall performance and reliability of your network infrastructure. ```sql select @@ -33,6 +44,7 @@ where ``` ### List load balancer probes order by interval +Analyze the settings to understand the frequency of load balancer probes within your Azure environment. This can help optimize network performance by identifying probes with unusually high or low intervals. ```sql select diff --git a/docs/tables/azure_lb_rule.md b/docs/tables/azure_lb_rule.md index a0186e3a..51c2e3d1 100644 --- a/docs/tables/azure_lb_rule.md +++ b/docs/tables/azure_lb_rule.md @@ -1,10 +1,20 @@ -# Table: azure_lb_rule +--- +title: "Steampipe Table: azure_lb_rule - Query Azure Load Balancer Rules using SQL" +description: "Allows users to query Azure Load Balancer Rules." +--- -A load balancer rule is used to define how traffic is distributed to the VMs. You define the front-end IP configuration for the incoming traffic and the back-end IP pool to receive the traffic, along with the required source and destination port. +# Table: azure_lb_rule - Query Azure Load Balancer Rules using SQL + +Azure Load Balancer is a highly available network performance utility that distributes incoming network traffic across many servers. It ensures the delivery of network traffic to various services in the Microsoft Azure public cloud, virtual machines (VMs) and other operations. Azure Load Balancer supports inbound and outbound scenarios, provides low latency and high throughput, and scales up to millions of flows for all Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) applications. + +## Table Usage Guide + +The 'azure_lb_rule' table provides insights into Load Balancer Rules within Azure Load Balancer. As a network administrator, explore rule-specific details through this table, including protocol type, frontend and backend port, and associated metadata. Utilize it to uncover information about rules, such as the load distribution method, whether direct server return is enabled, and the idle timeout in minutes. The schema presents a range of attributes of the Load Balancer Rule for your analysis, like the rule ID, provisioning state, and associated tags. ## Examples ### Basic info +Analyze the settings of your Azure load balancer rules to understand their current state and type. This can be beneficial for assessing your network traffic management and ensuring it aligns with your intended configuration. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer rules +Analyze the settings to understand which load balancer rules have failed in their setup process, providing insights to troubleshoot and rectify the issues. ```sql select @@ -32,6 +43,7 @@ where ``` ### List load balancer rules order by idle timeout +Pinpoint the specific load balancer rules based on their idle timeout duration. This can help in optimizing system performance and managing resource allocation effectively. ```sql select diff --git a/docs/tables/azure_location.md b/docs/tables/azure_location.md index 6ecacdcf..47c57f52 100644 --- a/docs/tables/azure_location.md +++ b/docs/tables/azure_location.md @@ -1,10 +1,20 @@ -# Table: azure_location +--- +title: "Steampipe Table: azure_location - Query Azure Locations using SQL" +description: "Allows users to query Azure Locations" +--- -Azure offers the scale and data residency options you need to bring your apps closer to your users around the world. +# Table: azure_location - Query Azure Locations using SQL + +Azure Locations represent the regional presence of Azure resources. These locations are datacenters that are geographically dispersed and cater to specific geopolitical regions. They provide users with the flexibility to deploy Azure resources where they need them. + +## Table Usage Guide + +The 'azure_location' table provides insights into Azure Locations within Microsoft Azure. As a DevOps engineer, explore location-specific details through this table, including the name of the location, the region type, and the geographical information. Utilize it to uncover information about locations, such as those that are paired with other locations, the regions that are available for resource deployment, and the verification of geographical data. The schema presents a range of attributes of the Azure Location for your analysis, like the location name, region type, and geographical data. ## Examples ### Display name of each azure location +Explore the different Azure locations by identifying their names. This can help in understanding the distribution of your resources across different geographic regions. ```sql select @@ -16,6 +26,7 @@ from ### Latitude and Longitude of the azure locations +Discover the geographical coordinates of your Azure locations. This is useful for pinpointing the exact global positions of your resources, aiding in strategic planning and decision making. ```sql select diff --git a/docs/tables/azure_log_alert.md b/docs/tables/azure_log_alert.md index b8b7834e..2523ee83 100644 --- a/docs/tables/azure_log_alert.md +++ b/docs/tables/azure_log_alert.md @@ -1,10 +1,20 @@ -# Table: azure_log_alert +--- +title: "Steampipe Table: azure_log_alert - Query Azure Monitor Log Alerts using SQL" +description: "Allows users to query Azure Monitor Log Alerts." +--- -Activity log alerts are the alerts that get activated when a new activity log event occurs that matches the conditions specified in the alert. +# Table: azure_log_alert - Query Azure Monitor Log Alerts using SQL + +Azure Monitor Log Alerts is a feature within Microsoft Azure Monitor that enables the detection of specific conditions in the logs collected and stored in Azure Monitor Logs. It allows users to create alert rules based on log search queries where an alert is fired when the results of the query match particular criteria. This feature is beneficial for identifying issues across applications and infrastructure, automating responses, and taking appropriate actions when predefined conditions are met. + +## Table Usage Guide + +The 'azure_log_alert' table provides insights into Log Alerts within Azure Monitor. As a DevOps engineer, explore alert-specific details through this table, including alert rules, severity, and associated metadata. Utilize it to uncover information about alerts, such as those with high severity, the frequency of alerts, and the verification of alert rules. The schema presents a range of attributes of the Log Alert for your analysis, like the alert rule, creation date, alert severity, and associated tags. ## Examples ### Basic info +Explore which Azure log alerts are currently active. This can help in identifying potential areas of concern and ensuring that all necessary alerts are functioning as expected. ```sql select @@ -17,6 +27,7 @@ from ``` ### List log alerts that check for create policy assignment events +Determine the areas in which log alerts are monitoring for policy assignment creation events within the Azure environment. This can be useful for managing security and compliance, by ensuring that policy changes are being adequately tracked. ```sql select @@ -28,4 +39,4 @@ from jsonb_array_elements(condition -> 'allOf') as l where l ->> 'equals' = 'Microsoft.Authorization/policyAssignments/write'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_log_profile.md b/docs/tables/azure_log_profile.md index fb674de5..9e36e6b6 100644 --- a/docs/tables/azure_log_profile.md +++ b/docs/tables/azure_log_profile.md @@ -1,10 +1,20 @@ -# Table: azure_log_profile +--- +title: "Steampipe Table: azure_log_profile - Query Azure Management Activity Logs using SQL" +description: "Allows users to query Azure Management Activity Logs." +--- -Log profiles are the legacy method for sending the Activity log to Azure storage or event hubs. Use the following procedure to continue working with a log profile or to disable it in preparation for migrating to a diagnostic setting. +# Table: azure_log_profile - Query Azure Management Activity Logs using SQL + +Azure Log Profiles are a key aspect of Azure Monitor Logs, providing a way to route system and resource logs for an Azure subscription. They provide valuable insights into the operation of your Azure resources. Log Profiles are used to control how your Activity Log is exported to Azure Event Hubs, Azure Storage Accounts, and Log Analytics Workspaces. + +## Table Usage Guide + +The 'azure_log_profile' table provides insights into log profiles within Azure Monitor Logs. As a DevOps engineer, explore log profile-specific details through this table, including retention policy, and associated storage account ID. Utilize it to uncover information about log profiles, such as those with longer retention policies, the storage account associated with the log profile, and the categories of logs collected. The schema presents a range of attributes of the log profile for your analysis, like the log profile name, categories, locations, and retention policy. ## Examples ### Basic info +Explore which Azure log profiles are associated with specific storage accounts and service bus rules. This can be particularly useful for managing and monitoring your Azure resources. ```sql select diff --git a/docs/tables/azure_logic_app_workflow.md b/docs/tables/azure_logic_app_workflow.md index d04ca1ca..cb3e475d 100644 --- a/docs/tables/azure_logic_app_workflow.md +++ b/docs/tables/azure_logic_app_workflow.md @@ -1,10 +1,20 @@ -# Table: azure_logic_app_workflow +--- +title: "Steampipe Table: azure_logic_app_workflow - Query Azure Logic Apps Workflows using SQL" +description: "Allows users to query Azure Logic Apps Workflows." +--- -Azure Logic Apps helps you simplify and implement scalable integrations and workflows in the cloud. You can model and automate your process visually as a series of steps known as a workflow in the Logic App Designer. +# Table: azure_logic_app_workflow - Query Azure Logic Apps Workflows using SQL + +Azure Logic Apps is a cloud service that helps you schedule, automate, and orchestrate tasks, business processes, and workflows when you need to integrate apps, data, systems, and services across enterprises or organizations. It provides a way to simplify and implement scalable integrations and workflows in the cloud. Logic Apps allows you to develop and deliver powerful integration solutions with ease. + +## Table Usage Guide + +The 'azure_logic_app_workflow' table provides insights into the workflows within Azure Logic Apps. As an engineer, you can explore workflow-specific details through this table, including workflow status, integration account, endpoints, and associated metadata. Utilize it to uncover information about workflows, such as those with enabled or disabled state, the integration account associated with the workflow, and the endpoints used by the workflow. The schema presents a range of attributes of the workflow for your analysis, like the workflow ID, creation date, state, and associated tags. ## Examples ### Basic info +Explore which Azure Logic App Workflows are currently active by identifying their names and types. This can help in assessing the elements within your Azure environment and managing your resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List disabled workflows +Identify instances where specific workflows in Azure Logic App have been disabled. This enables users to manage and rectify any potential disruptions in their workflow processes. ```sql select @@ -31,6 +42,7 @@ where ``` ### List suspended workflows +Uncover the details of workflows that are currently suspended within your Azure Logic App, allowing you to identify and address any potential issues or disruptions in your workflow processes. ```sql select @@ -42,4 +54,4 @@ from azure_logic_app_workflow where state = 'Suspended'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_machine_learning_workspace.md b/docs/tables/azure_machine_learning_workspace.md index c29130b2..a7bdd5a7 100644 --- a/docs/tables/azure_machine_learning_workspace.md +++ b/docs/tables/azure_machine_learning_workspace.md @@ -1,10 +1,20 @@ -# Table: azure_machine_learning_workspace +--- +title: "Steampipe Table: azure_machine_learning_workspace - Query Azure Machine Learning Workspaces using SQL" +description: "Allows users to query Azure Machine Learning Workspaces." +--- -The workspace is the top-level resource for Azure Machine Learning, providing a centralized place to work with all the artifacts you create when you use Azure Machine Learning. The workspace keeps a history of all training runs, including logs, metrics, output, and a snapshot of your scripts. You use this information to determine which training run produces the best model. +# Table: azure_machine_learning_workspace - Query Azure Machine Learning Workspaces using SQL + +Azure Machine Learning is a cloud-based service for creating and managing machine learning solutions. It's designed to help data scientists and developers to prepare data, develop experiments, and deploy models at cloud scale. The service supports a wide range of open-source machine learning frameworks like TensorFlow, PyTorch, and scikit-learn. + +## Table Usage Guide + +The 'azure_machine_learning_workspace' table provides insights into Machine Learning Workspaces within Azure Machine Learning. As a data scientist or developer, explore workspace-specific details through this table, including SKUs, identities, and associated metadata. Utilize it to uncover information about workspaces, such as their provisioning states, their associated application insights, and their linked storage accounts. The schema presents a range of attributes of the Machine Learning Workspace for your analysis, like the workspace name, creation time, and associated tags. ## Examples ### Basic info +Explore the status and types of your Azure Machine Learning workspaces to better understand your resource allocation and management. This can help you identify areas for optimization or reallocation to improve your machine learning workflows. ```sql select @@ -17,6 +27,7 @@ from ``` ### List system assigned identity type workspace +Gain insights into Azure Machine Learning Workspaces that are using system-assigned identities. This is beneficial for managing and auditing security and access controls within your Azure environment. ```sql select @@ -31,6 +42,7 @@ where ``` ### List key vault used by workspaces with soft deletion disabled +Explore which workspaces are using key vaults that have soft deletion disabled. This can help identify potential areas of risk and ensure data protection measures are in place. ```sql select diff --git a/docs/tables/azure_management_group.md b/docs/tables/azure_management_group.md index fb834008..fd70463a 100644 --- a/docs/tables/azure_management_group.md +++ b/docs/tables/azure_management_group.md @@ -1,12 +1,20 @@ -# Table: azure_management_group +--- +title: "Steampipe Table: azure_management_group - Query Azure Management Groups using SQL" +description: "Allows users to query Azure Management Groups" +--- -Management groups provide a governance scope above subscriptions. You organize subscriptions into management groups in the governance conditions you apply cascade by inheritance to all associated subscriptions. Management groups give you enterprise-grade management at a scale no matter what type of subscriptions you might have. However, all subscriptions within a single management group must trust the same Azure Active Directory (Azure AD) tenant. +# Table: azure_management_group - Query Azure Management Groups using SQL -Note: To query this table, you need to have at least read access to the specific management group. +Azure Management Groups provide a way to manage access, policies, and compliance across multiple Azure subscriptions. They offer the flexibility to manage the details of Azure resources, such as Azure subscriptions and policies, at a high level. Management groups are containers for managing access, policies, and compliance across multiple subscriptions. + +## Table Usage Guide + +The 'azure_management_group' table provides insights into Management Groups within Azure. As a DevOps engineer, explore group-specific details through this table, including group IDs, names, types, and associated metadata. Utilize it to uncover information about groups, such as the parent and children of each group, and the level of each group in the hierarchy. The schema presents a range of attributes of the Management Group for your analysis, like the group ID, name, type, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Management Groups to understand their types and update history. This information is useful for assessing your current Azure configurations and identifying any necessary changes. ```sql select @@ -20,6 +28,7 @@ from ``` ### List children for management groups +This query is used to examine the hierarchical structure of management groups within an Azure environment. It provides insights into which groups are nested within others and who last updated them, helping to understand the organization's resource management structure. ```sql select @@ -31,6 +40,7 @@ from ``` ### List parent details for management groups +Explore the details of parent groups within the management hierarchy to understand who made the most recent updates. This can be useful for tracking changes and maintaining organizational structure in Azure. ```sql select @@ -39,4 +49,4 @@ select jsonb_pretty(parent) as parent from azure_management_group; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_management_lock.md b/docs/tables/azure_management_lock.md index 791ef30c..f907afcc 100644 --- a/docs/tables/azure_management_lock.md +++ b/docs/tables/azure_management_lock.md @@ -1,10 +1,20 @@ -# Table: azure_management_lock +--- +title: "Steampipe Table: azure_management_lock - Query Azure Management Locks using SQL" +description: "Allows users to query Azure Management Locks." +--- -Management locks help you prevent accidental deletion or modification of your Azure resources. +# Table: azure_management_lock - Query Azure Management Locks using SQL + +Azure Management Locks are a feature in Microsoft Azure that provides the ability to apply a lock with different levels of access control to any resource in Azure. These locks help prevent accidental deletion or modification of your Azure resources. Management Locks can be applied to resource groups, subscriptions, and individual resources, providing a flexible and robust mechanism for safeguarding your critical cloud resources. + +## Table Usage Guide + +The 'azure_management_lock' table provides insights into Management Locks within Microsoft Azure. As a DevOps engineer, explore lock-specific details through this table, including the lock level, notes, and owners. Utilize it to uncover information about locks, such as those with 'CanNotDelete' or 'ReadOnly' access levels, the resources associated with each lock, and the lock's owners. The schema presents a range of attributes of the Management Lock for your analysis, like the lock name, id, type, and associated tags. ## Examples ### List of resources where the management locks are applied +Determine the areas in which management locks are applied within Azure resources. This query is beneficial for understanding where your resources are secured, helping to maintain and enhance your security posture. ```sql select @@ -17,6 +27,7 @@ from ### Resources and lock levels +Explore which resources in your Azure Management are locked and the level of these locks. This can help in understanding the security measures in place and aid in managing resource accessibility. ```sql select @@ -26,4 +37,4 @@ select lock_level from azure_management_lock; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mariadb_server.md b/docs/tables/azure_mariadb_server.md index 6814c417..08117899 100644 --- a/docs/tables/azure_mariadb_server.md +++ b/docs/tables/azure_mariadb_server.md @@ -1,10 +1,20 @@ -# Table: azure_mariadb_server +--- +title: "Steampipe Table: azure_mariadb_server - Query Azure MariaDB Servers using SQL" +description: "Allows users to query Azure MariaDB Servers." +--- -Azure Database for MariaDB is a relational database service based on the open-source MariaDB Server engine. It's a fully managed database as a service offering that can handle mission-critical workloads with predictable performance and dynamic scalability. +# Table: azure_mariadb_server - Query Azure MariaDB Servers using SQL + +Azure Database for MariaDB is a fully managed relational database service provided by Microsoft Azure. It's based on the open-source MariaDB Server engine and allows developers to leverage the capabilities of MariaDB for their applications. The service offers built-in high availability, automatic backups, and scaling of resources in minutes without application downtime. + +## Table Usage Guide + +The 'azure_mariadb_server' table provides insights into MariaDB servers within Azure Database for MariaDB. As a DevOps engineer, explore server-specific details through this table, including server configurations, performance tiers, and associated metadata. Utilize it to uncover information about servers, such as their performance characteristics, the storage capacity, and the server version. The schema presents a range of attributes of the MariaDB server for your analysis, like the server name, creation date, SKU name, and associated tags. ## Examples ### Basic info +Explore which MariaDB servers in your Azure environment are visible to users. This can help you manage your resources and understand the distribution of your servers across different regions and resource groups. ```sql select @@ -19,6 +29,7 @@ from ``` ### List servers with Geo-redundant backup disabled +Identify the servers that have their geo-redundant backup feature disabled. This can be useful to ensure all servers are adequately protected and to pinpoint any potential areas of risk. ```sql select @@ -33,6 +44,7 @@ where ``` ### List servers with SSL enabled +Determine the areas in which servers have SSL enabled to enhance security measures within your Azure MariaDB server environment. ```sql select @@ -47,6 +59,7 @@ where ``` ### List servers with backup retention days greater than 90 days +Identify Azure MariaDB servers that have a backup retention period of over 90 days. This could be useful in assessing long-term data storage and recovery strategies. ```sql select @@ -58,4 +71,4 @@ from azure_mariadb_server where backup_retention_days > 90; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_monitor_activity_log_event.md b/docs/tables/azure_monitor_activity_log_event.md index 00cd8bca..d669db3b 100644 --- a/docs/tables/azure_monitor_activity_log_event.md +++ b/docs/tables/azure_monitor_activity_log_event.md @@ -1,21 +1,20 @@ -# Table: azure_monitor_activity_log_event +--- +title: "Steampipe Table: azure_monitor_activity_log_event - Query Azure Monitor Activity Log Events using SQL" +description: "Allows users to query Azure Monitor Activity Log Events" +--- -Azure Monitor Activity Log is a service in Microsoft Azure that provides insights into the operations that have been performed on resources in your Azure subscription. It captures a comprehensive set of data about each operation, including who performed the operation, what resources were involved, what operation was performed, and when it occurred. This information is crucial for auditing, compliance, and troubleshooting purposes. +# Table: azure_monitor_activity_log_event - Query Azure Monitor Activity Log Events using SQL -**Important notes:** +Azure Monitor collects, analyzes, and acts on telemetry data from your Azure and on-premises environments. It helps you understand how your applications are performing and proactively identifies issues affecting them and the resources they depend on. Activity Log Events in Azure Monitor provides insight into subscription-level events that have occurred in Azure. -- This table can provide event details for the previous 90 days. -- For improved performance, it is advised that you use the optional qual `event_timestamp` to limit the result set to a specific time period. -- This table supports optional quals. Queries with optional quals are optimized to use Monitor Activity Log filters. Optional quals are supported for the following columns: - - `event_timestamp` - - `resource_group` - - `correlation_id` - - `resource_id` - - `resource_provider_name` +## Table Usage Guide + +The 'azure_monitor_activity_log_event' table provides insights into activity log events within Azure Monitor. As a DevOps engineer, explore event-specific details through this table, including event categories, event data, and associated metadata. Utilize it to uncover information about events, such as those related to service health, resource management, and security. The schema presents a range of attributes of the activity log event for your analysis, like the event timestamp, resource group, event ID, and associated tags. ## Examples ### Basic info +Explore the Azure Monitor activity log to gain insights into the events occurring in your Azure resources. This query can help you understand the scope and impact of each event, making it easier to manage your resources and respond to issues. ```sql select @@ -31,6 +30,7 @@ from ``` ### List events with event-level critical +Identify instances where critical events have occurred in your Azure Monitor activity log. This could be useful in troubleshooting and understanding the severity of issues within your Azure environment. ```sql select @@ -47,6 +47,7 @@ where ``` ### List events that occurred over the last five minutes +This query is used to monitor recent activities within a system, specifically events that have occurred in the last five minutes. It's useful for real-time tracking and immediate response to any critical changes or anomalies in the system. ```sql select @@ -63,6 +64,7 @@ where ``` ### List ordered events that occurred in the past five to ten minutes +Explore the sequence of events that happened in the recent past to understand any system changes or unusual activity. This allows for real-time monitoring and swift response to any unexpected events. ```sql select @@ -81,6 +83,7 @@ order by ``` ### Get authorization details for events +Determine the authorization details associated with specific events to gain insights into the actions, roles, and scopes involved. This can be beneficial for understanding the security context of activities within your Azure environment. ```sql select @@ -93,6 +96,7 @@ from ``` ### Get HTTP request details of events +Analyze the details of HTTP requests associated with specific events to understand their operational patterns and time-stamps. This can help in tracking the client's request ID, IP address, and the methods used, which could be beneficial in enhancing security and monitoring network traffic. ```sql select @@ -110,6 +114,7 @@ from ## Filter examples ### List evens by resource group +Explore the activities within a specific resource group in Azure Monitor, helping you understand the operations and status of resources for effective management and troubleshooting. ```sql select @@ -126,6 +131,7 @@ where ``` ### List events for a resource provider +Determine the areas in which specific events are occurring for a particular resource provider in Azure. This can help in analyzing the operation status and type of resources being used, which can be useful for optimizing resource allocation and troubleshooting issues. ```sql select @@ -143,6 +149,7 @@ where ``` ### List events for a particular resource +Explore the history of events tied to a specific resource within Azure Monitor. This is useful for tracking changes, troubleshooting issues, and auditing activities related to that resource. ```sql select @@ -156,4 +163,4 @@ from azure_monitor_activity_log_event where resource_id = '/subscriptions/hsjekr16-f95f-4771-bbb5-8237jsa349sl/resourceGroups/my_rg/providers/Microsoft.Network/publicIPAddresses/test-backup-ip'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mssql_elasticpool.md b/docs/tables/azure_mssql_elasticpool.md index 5c050e6e..1b3b5959 100644 --- a/docs/tables/azure_mssql_elasticpool.md +++ b/docs/tables/azure_mssql_elasticpool.md @@ -1,10 +1,20 @@ -# Table: azure_mssql_elasticpool +--- +title: "Steampipe Table: azure_mssql_elasticpool - Query Azure SQL Database Elastic Pools using SQL" +description: "Allows users to query Azure SQL Database Elastic Pools" +--- -Azure SQL Database elastic pools are a simple, cost-effective solution for managing and scaling multiple databases that have varying and unpredictable usage demands. +# Table: azure_mssql_elasticpool - Query Azure SQL Database Elastic Pools using SQL + +An Azure SQL Database Elastic Pool is a shared resource model that enables higher resource utilization efficiency. It allows for the management of multiple databases that have varying and unpredictable usage demands. The databases within an elastic pool are on a single Azure SQL Database server and share a set number of resources at a set price. + +## Table Usage Guide + +The 'azure_mssql_elasticpool' table provides insights into Elastic Pools within Azure SQL Database. As a database administrator, explore details specific to each Elastic Pool through this table, including the number of databases, storage limit, and associated metadata. Utilize it to uncover information about each Elastic Pool, such as the maximum and minimum data storage capacity, the number of databases it contains, and its resource usage statistics. The schema presents a range of attributes of the Elastic Pool for your analysis, like the pool's ID, name, type, region, and associated tags. ## Examples ### Basic info +Gain insights into the status and redundancy of your Microsoft SQL Server elastic pools in Azure. This can help you manage resources and ensure your databases are resilient and available. ```sql select @@ -18,6 +28,7 @@ from ``` ### List zone redundant elastic pools +Identify the state and capacity of your elastic pools in Azure SQL Database that are configured for zone redundancy. This can help ensure high availability and disaster recovery for your databases. ```sql select @@ -30,4 +41,4 @@ from azure_mssql_elasticpool where zone_redundant; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mssql_managed_instance.md b/docs/tables/azure_mssql_managed_instance.md index ed37f4b4..dac97048 100644 --- a/docs/tables/azure_mssql_managed_instance.md +++ b/docs/tables/azure_mssql_managed_instance.md @@ -1,10 +1,20 @@ -# Table: azure_mssql_managed_instance +--- +title: "Steampipe Table: azure_mssql_managed_instance - Query Azure Managed SQL Server Instances using SQL" +description: "Allows users to query Azure Managed SQL Server Instances." +--- -Azure SQL Managed Instance is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine compatibility with all the benefits of a fully managed and evergreen platform as a service. +# Table: azure_mssql_managed_instance - Query Azure Managed SQL Server Instances using SQL + +An Azure Managed SQL Server Instance is a fully managed relational database service provided by Microsoft Azure. It offers the broadest SQL Server engine compatibility and automates most of the database management functions such as upgrading, patching, backups, and monitoring. It also provides built-in intelligence that learns app patterns and adapts to maximize performance, reliability, and data protection. + +## Table Usage Guide + +The 'azure_mssql_managed_instance' table provides insights into Managed SQL Server Instances within Microsoft Azure. As a Database Administrator, explore instance-specific details through this table, including the instance's administrative settings, network settings, and associated metadata. Utilize it to uncover information about instances, such as their current state, the number of vCores, the maximum storage size, and the license type. The schema presents a range of attributes of the Managed SQL Server Instance for your analysis, like the instance's ID, name, type, location, and SKU. ## Examples ### Basic info +Explore the status and security settings of your managed instances in Azure's SQL service. This can be useful in assessing compliance with your organization's security policies. ```sql select @@ -18,6 +28,7 @@ from ``` ### List managed instances with public endpoint enabled +Discover the segments that have the public data endpoint enabled in your managed instances. This can help identify potential security vulnerabilities, as these instances can be accessed publicly. ```sql select @@ -33,6 +44,7 @@ where ``` ### List security alert policies of the managed instances +Explore the security alert policies of managed instances to understand their creation time, the alerts that have been disabled, and the email addresses linked to the policies. This can help in assessing the current security measures and making necessary improvements for better data protection. ```sql select @@ -52,4 +64,4 @@ select from azure_mssql_managed_instance, jsonb_array_elements(security_alert_policies) as policy; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mssql_virtual_machine.md b/docs/tables/azure_mssql_virtual_machine.md index 54c373e7..ab3039eb 100644 --- a/docs/tables/azure_mssql_virtual_machine.md +++ b/docs/tables/azure_mssql_virtual_machine.md @@ -1,10 +1,20 @@ -# Table: azure_mssql_virtual_machine +--- +title: "Steampipe Table: azure_mssql_virtual_machine - Query Azure SQL Server Virtual Machines using SQL" +description: "Allows users to query Azure SQL Server Virtual Machines." +--- -Azure SQL virtual machines are lift-and-shift ready for existing applications that require fast migration to the cloud with minimal changes or no changes. SQL virtual machines offer full administrative control over the SQL Server instance and underlying OS for migration to Azure. +# Table: azure_mssql_virtual_machine - Query Azure SQL Server Virtual Machines using SQL + +Azure SQL Server Virtual Machine is a service that offers the full control and features of a fully managed SQL Server instance. It provides the flexibility to choose the version, edition, and OS of SQL Server. You can also manage the VM size to meet your performance requirements. + +## Table Usage Guide + +The 'azure_mssql_virtual_machine' table provides insights into SQL Server Virtual Machines within Microsoft Azure. As a DevOps engineer, explore VM-specific details through this table, including the SQL Server version, edition, OS type, VM size, and associated metadata. Utilize it to uncover information about virtual machines, such as those with specific SQL Server versions or OS types, and the verification of SQL Server configurations. The schema presents a range of attributes of the SQL Server Virtual Machine for your analysis, like the VM ID, resource group, location, SQL Server license type, and associated tags. ## Examples ### Basic info +Explore the configuration and status of your Azure SQL virtual machines. This query is useful for gaining insights into the types of SQL images and licenses in use, as well as where these resources are located geographically. ```sql select @@ -20,6 +30,7 @@ from ``` ### List failed virtual machines +Explore which virtual machines have failed to provision in your Azure MSSQL environment, helping you to identify potential issues and take corrective action. ```sql select @@ -31,4 +42,4 @@ from azure_mssql_virtual_machine where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mysql_flexible_server.md b/docs/tables/azure_mysql_flexible_server.md index b6bbf799..0aa9474e 100644 --- a/docs/tables/azure_mysql_flexible_server.md +++ b/docs/tables/azure_mysql_flexible_server.md @@ -1,10 +1,20 @@ -# Table: azure_mysql_flexible_server +--- +title: "Steampipe Table: azure_mysql_flexible_server - Query Azure MySQL Flexible Servers using SQL" +description: "Allows users to query Azure MySQL Flexible Servers" +--- -Azure Database for MySQL Flexible Server is a fully managed MySQL database as a service offering that can handle mission-critical workloads with predictable performance and dynamic scalability. +# Table: azure_mysql_flexible_server - Query Azure MySQL Flexible Servers using SQL + +Azure MySQL Flexible Server is a fully managed database service with built-in high availability and the flexibility to adjust compute and storage resources on demand. It supports the diverse needs of your workloads requiring MySQL and allows you to choose the right compute and storage resources for your server. Azure MySQL Flexible Server also provides cost-effectiveness with stop/start capabilities and burstable compute tier. + +## Table Usage Guide + +The 'azure_mysql_flexible_server' table provides insights into MySQL Flexible Servers within Azure. As a DevOps engineer, explore server-specific details through this table, including server state, version, storage capacity, and associated metadata. Utilize it to uncover information about servers, such as those with high storage capacity, the administrator login name, and the verification of SSL enforcement. The schema presents a range of attributes of the MySQL Flexible Server for your analysis, like the server name, creation date, SKU name, and associated tags. ## Examples ### Basic info +Explore the settings of your Azure MySQL flexible servers to understand their locations, backup retention periods, storage IOPS, and public network access status. This helps in managing resources efficiently and ensuring optimal server configuration. ```sql select @@ -19,6 +29,7 @@ from ``` ### List servers with public network access disabled +Explore which servers have disabled public network access to ensure a higher level of security and prevent unauthorized access. This can be beneficial in maintaining data privacy and safeguarding sensitive information. ```sql select @@ -32,6 +43,7 @@ where ``` ### List servers with storage auto grow disabled +Identify servers where the automatic storage growth feature is turned off. This is useful for understanding which servers might run out of storage unexpectedly, potentially disrupting operations. ```sql select @@ -45,6 +57,7 @@ where ``` ### List servers with backup retention days greater than 90 days +Explore which servers in your Azure MySQL Flexible Server have a backup retention period exceeding 90 days. This is beneficial in understanding your organization's data retention practices and ensuring compliance with internal or regulatory data backup policies. ```sql select @@ -58,9 +71,10 @@ where ``` ### List server configuration details - +Explore the configuration details of your servers on Azure's MySQL Flexible Server. This can be useful to understand and manage the properties of your servers, such as identifying any unusual settings that may impact your server's performance. **Note:** `Flexible Server configurations` is the same as `Server parameters` as shown in Azure MySQL Flexible Server console + ```sql select name as server_name, @@ -73,6 +87,7 @@ from ``` ### Current state of audit_log_enabled parameter for the servers +Analyze the settings to understand the status of the audit log enablement feature across your Azure MySQL flexible servers. This can help ensure that audit logs are active for security and compliance monitoring. ```sql select @@ -88,6 +103,7 @@ where ``` ### List servers with slow_query_log parameter enabled +Discover the segments that have the 'slow_query_log' parameter enabled on Azure MySQL Flexible servers. This can be useful for identifying servers that may be experiencing performance issues due to slow queries. ```sql select @@ -104,6 +120,7 @@ where ``` ### List servers with log_output parameter set to file +Discover the segments that have the 'log_output' parameter set to 'FILE' within Azure's MySQL Flexible Server. This is particularly useful when you need to identify servers that are logging output to files for auditing or troubleshooting purposes. ```sql select @@ -117,4 +134,4 @@ from where configurations ->'ConfigurationProperties' ->> 'value' = 'FILE' and configurations ->> 'Name' = 'log_output'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mysql_server.md b/docs/tables/azure_mysql_server.md index 32870cb1..eca8812a 100644 --- a/docs/tables/azure_mysql_server.md +++ b/docs/tables/azure_mysql_server.md @@ -1,10 +1,20 @@ -# Table: azure_mysql_server +--- +title: "Steampipe Table: azure_mysql_server - Query Azure MySQL Servers using SQL" +description: "Allows users to query Azure MySQL Servers, fetching detailed information about the configuration and status of these database servers." +--- -Azure Database for MySQL Server is a fully managed database service designed to provide more granular control and flexibility over database management functions and configuration settings. +# Table: azure_mysql_server - Query Azure MySQL Servers using SQL + +Azure MySQL Server is a fully managed database service that makes it easy to set up, maintain, manage, and administer your MySQL relational databases on the cloud. It provides built-in high availability with no additional cost and you can scale up or down quickly to meet your workload needs. Azure MySQL Server also supports connecting your MySQL databases to popular analytics tools for comprehensive insights and business intelligence. + +## Table Usage Guide + +The 'azure_mysql_server' table provides insights into MySQL servers within Azure. As a DevOps engineer, explore server-specific details through this table, including server name, location, resource group, SKU name, and associated metadata. Utilize it to uncover information about servers, such as the version of MySQL running, SSL enforcement status, and storage auto-grow settings. The schema presents a range of attributes of the MySQL server for your analysis, like the server ID, creation date, administrator login name, and more. ## Examples ### Basic info +Explore the settings of your Azure MySQL server to understand its location and security enforcement policies, such as SSL enforcement and the minimum TLS version. This is useful for ensuring your server is properly configured for secure data transmission. ```sql select @@ -18,6 +28,7 @@ from ``` ### List servers with SSL enabled +Explore which servers in your Azure MySQL Server have SSL enforcement enabled. This is useful for ensuring that your servers are secure and adhering to best practices for data protection. ```sql select @@ -32,6 +43,7 @@ where ``` ### List servers with public network access disabled +Explore which servers within your Azure MySQL setup have public network access disabled. This can help enhance security by identifying servers that are not exposed to potential external threats. ```sql select @@ -45,6 +57,7 @@ where ``` ### List servers with storage profile auto growth disabled +Identify instances where Azure MySQL servers have their storage profile auto growth feature disabled. This is useful to manage storage and avoid unexpected database growth. ```sql select @@ -58,6 +71,7 @@ where ``` ### List servers with 'backup_retention_days' greater than 90 days +Analyze the settings to understand which servers have their backup retention period set for more than 90 days. This is useful for ensuring data retention compliance and managing storage costs. ```sql select @@ -71,6 +85,7 @@ where ``` ### List servers with minimum TLS version lower than 1.2 +Discover the servers that are potentially vulnerable due to lower than recommended TLS versions. This is useful in identifying and addressing security risks in your Azure MySQL server configurations. ```sql select @@ -85,6 +100,7 @@ where ``` ### List private endpoint connection details +Determine the areas in which private endpoint connections are needed for your Azure MySQL server. This query helps you understand the state of these connections, including any actions required, providing valuable insights for managing and optimizing your server's security. ```sql select @@ -102,6 +118,7 @@ from ``` ### List server keys +This query is used to examine the keys associated with each server in your Azure MySQL database. It's useful for understanding the types and creation dates of these keys, which can aid in managing security and access controls. ```sql select @@ -120,9 +137,10 @@ from ``` ### List server configuration details - +Explore the configuration details of your servers to gain insights into their set-up and manage them effectively. This query is particularly useful for understanding and managing the settings of your Azure MySQL servers. **Note:** `Server configurations` is the same as `Server parameters` as shown in Azure MySQL server console + ```sql select name as server_name, @@ -135,6 +153,7 @@ from ``` ### Current state of audit_log_enabled parameter for the servers +Analyze the settings to understand the current status of the audit log feature for your servers. This can be useful for ensuring compliance with security protocols and maintaining a record of server activity. ```sql select @@ -150,6 +169,7 @@ where ``` ### List servers with slow_query_log parameter enabled +Determine the areas in which certain servers have the 'slow_query_log' parameter enabled. This can be useful to identify potential performance issues and optimize server configurations accordingly. ```sql select @@ -166,6 +186,7 @@ where ``` ### List servers with log_output parameter set to file +Explore which Azure MySQL servers have their log output parameter set to a file. This is useful to identify servers that are storing their logs as files, which could potentially take up a lot of storage space. ```sql select @@ -182,6 +203,7 @@ where ``` ### Get VNET rules details of the server +Explore the configuration of a server to understand its Virtual Network (VNET) rules. This is useful for assessing network security and connectivity settings for your Azure MySQL server. ```sql select @@ -195,6 +217,7 @@ from ``` ### Get the security alert policy for a particular server +Analyze the settings to understand the security alert policy associated with a specific server in a given resource group. This is particularly useful when you need to assess the security configurations of your servers for compliance or auditing purposes. ```sql select diff --git a/docs/tables/azure_nat_gateway.md b/docs/tables/azure_nat_gateway.md index 760c5ec8..37b5ab5f 100644 --- a/docs/tables/azure_nat_gateway.md +++ b/docs/tables/azure_nat_gateway.md @@ -1,10 +1,20 @@ -# Table: azure_nat_gateway +--- +title: "Steampipe Table: azure_nat_gateway - Query Azure NAT Gateways using SQL" +description: "Allows users to query Azure NAT Gateways." +--- -NAT gateway provides outbound internet connectivity for one or more subnets of a virtual network. Once NAT gateway is associated to a subnet, NAT provides source network address translation (SNAT) for that subnet. NAT gateway specifies which static IP addresses virtual machines use when creating outbound flows. +# Table: azure_nat_gateway - Query Azure NAT Gateways using SQL + +Azure NAT (Network Address Translation) Gateway is a resource that provides outbound internet connectivity for virtual networks. The NAT gateway sends outbound traffic from a virtual network to the internet. It also enables you to configure a static, outbound public IP address, which can be used for the services in your virtual network. + +## Table Usage Guide + +The 'azure_nat_gateway' table provides insights into NAT Gateways within Azure Networking. As a Network Engineer, explore NAT Gateway-specific details through this table, including subnet details, IP configuration, and associated metadata. Utilize it to uncover information about NAT Gateways, such as those with specific IP configurations, the subnet relationships, and the verification of IP addresses. The schema presents a range of attributes of the NAT Gateway for your analysis, like the NAT Gateway ID, creation date, subnet count, and associated tags. ## Examples ### Basic info +Explore the basic information of your Azure NAT Gateway to understand its provisioning state and type. This can be useful in managing resources and troubleshooting potential issues. ```sql select @@ -18,6 +28,7 @@ from ``` ### List public IP address details for each nat gateway +This query aids in identifying the details of public IP addresses associated with each NAT gateway. It's useful for managing network traffic and ensuring secure and efficient data routing. ```sql select @@ -35,6 +46,7 @@ where ``` ### List subnet details associated with each nat gateway +Analyze the settings to understand the association between each NAT gateway and the related subnet details in your Azure environment. This can be beneficial in managing network topology and ensuring correct routing configurations. ```sql select @@ -47,4 +59,4 @@ from jsonb_array_elements(n.subnets) as sb where sb ->> 'id' = s.id; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_network_interface.md b/docs/tables/azure_network_interface.md index 075c70c2..05d98d80 100644 --- a/docs/tables/azure_network_interface.md +++ b/docs/tables/azure_network_interface.md @@ -1,10 +1,20 @@ -# Table: azure_network_interface +--- +title: "Steampipe Table: azure_network_interface - Query Azure Network Interfaces using SQL" +description: "Allows users to query Azure Network Interfaces." +--- -A network interface enables an Azure Virtual Machine to communicate with internet, Azure, and on-premises resources. +# Table: azure_network_interface - Query Azure Network Interfaces using SQL + +An Azure Network Interface is a virtual network interface card (NIC) in Azure that is attached to a virtual machine (VM). It enables Azure VMs to communicate with internet, Azure, and on-premises resources. Network Interfaces can include IP addresses, subnets, and network security groups. + +## Table Usage Guide + +The 'azure_network_interface' table offers insights into Network Interfaces within Azure. As a DevOps engineer, you can delve into interface-specific details via this table, including private and public IP addresses, network security group associations, and subnet information. Utilize it to uncover information about interfaces, such as their IP configurations, DNS settings, and associated subnets. The schema presents a range of attributes of the Network Interface for your analysis, like the interface ID, IP configurations, associated network security groups, and subnet details. ## Examples ### Basic IP address info +Explore network configurations by identifying the private IP addresses, their versions, and allocation methods in Azure. This can be beneficial in understanding the distribution and management of IP addresses within your Azure network interface. ```sql select @@ -19,6 +29,7 @@ from ``` ### Find all network interfaces with private IPs that are in a given subnet (10.66.0.0/16) +This query is useful for pinpointing specific network interfaces within a designated subnet that are utilizing private IP addresses. This can aid in network management and security by identifying potential areas of vulnerability or inefficiency. ```sql select @@ -33,6 +44,7 @@ where ``` ### Security groups attached to each network interface +Analyze the settings to understand the security groups linked with each network interface in your Azure network. This can be useful for assessing your network's security configuration and identifying potential vulnerabilities. ```sql select diff --git a/docs/tables/azure_network_security_group.md b/docs/tables/azure_network_security_group.md index b80ab466..08d459d9 100644 --- a/docs/tables/azure_network_security_group.md +++ b/docs/tables/azure_network_security_group.md @@ -1,10 +1,20 @@ -# Table: azure_network_security_group +--- +title: "Steampipe Table: azure_network_security_group - Query Azure Network Security Groups using SQL" +description: "Allows users to query Azure Network Security Groups" +--- -A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. +# Table: azure_network_security_group - Query Azure Network Security Groups using SQL + +An Azure Network Security Group is a feature in Microsoft Azure that provides inbound and outbound network traffic filtering for various types of Azure resources. It acts as a virtual firewall, offering a layer of security by enabling you to configure network traffic rules. Network Security Groups can be associated with subnets, network interfaces, or both, providing control over traffic flowing in and out of Azure resources within a virtual network. + +## Table Usage Guide + +The 'azure_network_security_group' table provides insights into Network Security Groups within Azure Networking. As a Network Administrator, explore specific details through this table, including security rules, default rules, and associated subnets. Utilize it to uncover information about Network Security Groups, such as those with open inbound or outbound rules, the associated resources, and the verification of rule priorities. The schema presents a range of attributes of the Network Security Group for your analysis, like the group name, location, type, and associated tags. ## Examples ### Subnets and network interfaces attached to the network security groups +Discover the segments that are linked to your network security groups by analyzing network interfaces and subnets. This allows you to better understand and assess your Azure network configuration and security posture. ```sql select @@ -19,6 +29,7 @@ from ``` ### List the network security groups whose inbound is not restricted from the internet +Determine the network security groups in your Azure environment that have unrestricted inbound access from the internet. This can help you identify potential security risks and take necessary actions to secure your network. ```sql select @@ -43,6 +54,7 @@ where ``` ### Default security group rules info +Gain insights into the default security rules of your Azure network security group. This query can help you understand the access, description, direction, priority, and protocol of each rule, which is crucial for maintaining network security and troubleshooting connectivity issues. ```sql select diff --git a/docs/tables/azure_network_watcher.md b/docs/tables/azure_network_watcher.md index 0270de88..a024be04 100644 --- a/docs/tables/azure_network_watcher.md +++ b/docs/tables/azure_network_watcher.md @@ -1,10 +1,20 @@ -# Table: azure_network_watcher +--- +title: "Steampipe Table: azure_network_watcher - Query Azure Network Watchers using SQL" +description: "Allows users to query Azure Network Watchers" +--- -Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level. +# Table: azure_network_watcher - Query Azure Network Watchers using SQL + +Azure Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Network diagnostic and visualization tools available with Network Watcher help you understand, diagnose, and gain insights to your network in Azure. Network Watcher is designed to monitor and repair the network health of IaaS (Infrastructure-as-a-Service) products, including virtual machines (VM) and virtual networks. + +## Table Usage Guide + +The 'azure_network_watcher' table provides insights into Azure Network Watchers within Azure Network Management. As a network administrator, explore Network Watcher-specific details through this table, including its status, location, and associated tags. Utilize it to uncover information about Network Watchers, such as those with problematic network scenarios, the diagnostic and visualization tools used, and the verification of network health. The schema presents a range of attributes of the Network Watcher for your analysis, like the ID, name, type, and provisioning state. ## Examples ### List of regions where network watcher is enabled +Explore which regions have the network watcher feature enabled. This is useful for maintaining security and performance monitoring within your Azure environment. ```sql select @@ -15,6 +25,7 @@ from ``` ### List of Network watcher without application tag key +Determine the areas in which Azure Network Watchers are not tagged with the 'application' key. This can help ensure proper organization and management of your resources. ```sql select diff --git a/docs/tables/azure_network_watcher_flow_log.md b/docs/tables/azure_network_watcher_flow_log.md index 5a156985..1106461a 100644 --- a/docs/tables/azure_network_watcher_flow_log.md +++ b/docs/tables/azure_network_watcher_flow_log.md @@ -1,10 +1,20 @@ -# Table: azure_network_watcher_flow_log +--- +title: "Steampipe Table: azure_network_watcher_flow_log - Query Azure Network Watcher Flow Logs using SQL" +description: "Allows users to query Azure Network Watcher Flow Logs." +--- -Network security group (NSG) flow logs is a feature of Azure Network Watcher that allows user to log information about IP traffic flowing through an NSG. Flow data is sent to Azure Storage accounts from where the user can access it. +# Table: azure_network_watcher_flow_log - Query Azure Network Watcher Flow Logs using SQL + +Azure Network Watcher is a service in Azure that provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. Flow logs are a feature of Network Watcher that allows users to view information about ingress and egress IP traffic on a network security group. These logs can be used to check for anomalies and gain insight into your network traffic flow. + +## Table Usage Guide + +The 'azure_network_watcher_flow_log' table provides insights into the flow logs within Azure Network Watcher. As a network administrator, you can explore detailed information about your network traffic through this table, including the source and destination IP addresses, ports, protocol, traffic flow, and associated metadata. Use it to uncover information about your network traffic, such as identifying potential security risks, analyzing traffic patterns, and troubleshooting network issues. The schema presents a range of attributes of the flow log for your analysis, like the network watcher name, flow log name, enabled status, traffic analytics configuration, and associated tags. ## Examples ### Basic info +Explore which network flow logs are enabled in Azure. This can assist in identifying potential security risks or network anomalies by pinpointing specific resources. ```sql select @@ -17,6 +27,7 @@ from ``` ### List disabled flow logs +Explore which flow logs in the Azure Network Watcher are currently disabled. This can help in identifying potential network monitoring gaps and ensuring comprehensive data collection. ```sql select @@ -31,6 +42,7 @@ where ``` ### List flow logs with a retention period less than 90 days +Explore the Azure network watcher flow logs that are enabled and have a retention period of less than 90 days. This is useful for identifying potential areas where data retention policies may need to be adjusted to meet organizational requirements. ```sql select @@ -45,6 +57,7 @@ where ``` ### Get storage account details for each flow log +Analyze the settings of each flow log to understand the specific storage account details associated with it. This is useful for managing and optimizing the storage resources in your Azure Network Watcher. ```sql select @@ -53,4 +66,4 @@ select storage_id from azure_network_watcher_flow_log; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_policy_assignment.md b/docs/tables/azure_policy_assignment.md index c8374ea2..5039b570 100644 --- a/docs/tables/azure_policy_assignment.md +++ b/docs/tables/azure_policy_assignment.md @@ -1,10 +1,20 @@ -# Table: azure_policy_assignment +--- +title: "Steampipe Table: azure_policy_assignment - Query Azure Policy Assignments using SQL" +description: "Allows users to query Azure Policy Assignments." +--- -Policy assignments are used by Azure Policy to define which resources are assigned which policies or initiatives in a subscription. +# Table: azure_policy_assignment - Query Azure Policy Assignments using SQL + +Azure Policy is a service in Azure that you use to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy meets this need by evaluating your resources for non-compliance with assigned policies. + +## Table Usage Guide + +The 'azure_policy_assignment' table provides insights into policy assignments within Azure Policy. As a DevOps engineer, explore policy-specific details through this table, including policy definition, scope, and associated metadata. Utilize it to uncover information about policy assignments, such as those with specific effects, the resource groups they are applied to, and the compliance state of your resources. The schema presents a range of attributes of the policy assignment for your analysis, like the assignment name, id, type, and associated parameters. ## Examples ### Basic info +Explore the specific policies applied within your Azure environment. This query can help you gain insights into policy assignments, which is beneficial for maintaining compliance and managing resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### Get SQL auditing and threat detection monitoring status for the subscription +Assess the status of SQL auditing and threat detection monitoring for a specific subscription. This can help improve your security measures by identifying areas that need attention or improvement. ```sql select @@ -29,6 +40,7 @@ from ``` ### Get SQL encryption monitoring status for the subscription +Explore the status of SQL encryption monitoring for your subscription. This allows you to assess the security measures in place and ensure that sensitive data is appropriately protected. ```sql select @@ -38,4 +50,4 @@ select parameters -> 'sqlEncryptionMonitoringEffect' -> 'value' as sqlEncryptionMonitoringEffect from azure_policy_assignment; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_policy_definition.md b/docs/tables/azure_policy_definition.md index 2db60338..48e6bed8 100644 --- a/docs/tables/azure_policy_definition.md +++ b/docs/tables/azure_policy_definition.md @@ -1,10 +1,20 @@ -# Table: azure_policy_definition +--- +title: "Steampipe Table: azure_policy_definition - Query Azure Policy Definitions using SQL" +description: "Allows users to query Azure Policy Definitions to gain insights into the policy definitions within Azure Policy service. The table provides details such as policy definition ID, name, type, mode, and metadata." +--- -Azure Policy establishes conventions for resources. Policy definitions describe resource compliance conditions and the effect to take if a condition is met. A condition compares a resource property field or a value to a required value. +# Table: azure_policy_definition - Query Azure Policy Definitions using SQL + +Azure Policy is a service in Azure that you use to create, assign and, manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy meets this need by evaluating your resources for non-compliance with assigned policies. + +## Table Usage Guide + +The 'azure_policy_definition' table provides insights into policy definitions within Azure Policy service. As a security engineer, explore policy-specific details through this table, including policy definition ID, name, type, mode, and metadata. Utilize it to uncover information about policies, such as their compliance status, the specific rules they enforce, and their effects on your resources. The schema presents a range of attributes of the policy definition for your analysis, like the policy definition ID, name, type, mode, and associated metadata. ## Examples ### Basic info +Explore policy definitions within your Azure environment to gain insights into their specific details such as ID, name, and type. This can be particularly useful for understanding and managing the rules and regulations applied to your resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### Get the policy definition by display name +Explore the policy definitions by their display names to understand their rules and types. This is particularly useful for managing and enforcing specific policies, such as enabling private endpoint connections on Batch accounts. ```sql select @@ -30,4 +41,4 @@ from azure_policy_definition where display_name = 'Private endpoint connections on Batch accounts should be enabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_postgresql_flexible_server.md b/docs/tables/azure_postgresql_flexible_server.md index 7597f12f..840e26b1 100644 --- a/docs/tables/azure_postgresql_flexible_server.md +++ b/docs/tables/azure_postgresql_flexible_server.md @@ -1,10 +1,20 @@ -# Table: azure_postgresql_flexible_server +--- +title: "Steampipe Table: azure_postgresql_flexible_server - Query Azure Database for PostgreSQL Flexible Servers using SQL" +description: "Allows users to query Azure Database for PostgreSQL Flexible Servers." +--- -Azure Database for PostgreSQL - Flexible Server is a fully managed database service designed to provide more granular control and flexibility over database management functions and configuration settings. The service generally provides more flexibility and server configuration customizations based on user requirements. The flexible server architecture allows users to collocate the database engine with the client tier for lower latency and choose high availability within a single availability zone and across multiple availability zones. Flexible servers also provide better cost optimization controls with the ability to stop/start your server and a burstable compute tier ideal for workloads that don't need full compute capacity continuously. +# Table: azure_postgresql_flexible_server - Query Azure Database for PostgreSQL Flexible Servers using SQL + +Azure Database for PostgreSQL Flexible Server is a fully managed database service designed for developers. It offers built-in high availability with no additional cost. It also provides the capability to scale compute resources up or down based on your application's need. + +## Table Usage Guide + +The 'azure_postgresql_flexible_server' table provides insights into PostgreSQL Flexible Servers within Azure Database for PostgreSQL. As a DevOps engineer, explore server-specific details through this table, including server version, state, and associated metadata. Utilize it to uncover information about servers, such as those with public network access, the backup retention period, and the geo-redundant backup setting. The schema presents a range of attributes of the PostgreSQL Flexible Server for your analysis, like the server name, creation date, SKU name, and associated tags. ## Examples ### Basic info +Discover the details of your Azure PostgreSQL Flexible Server configurations, including their names, IDs, and cloud environments. This can be particularly useful for understanding the geographic distribution of your servers and assessing their various configurations. ```sql select @@ -18,6 +28,7 @@ from ``` ### List SKU details of the flexible servers +Explore the specific details of your flexible servers, such as their SKU name and tier, to better understand and manage your resources within the Azure PostgreSQL environment. This can be particularly useful for resource allocation, cost management, and strategic planning. ```sql select @@ -30,6 +41,7 @@ from ``` ### List flexible servers that have geo-redundant backup enabled +Explore which flexible servers have geo-redundant backup enabled to ensure data security and continuity in case of a regional outage. This query is useful in identifying servers that have additional data protection measures in place. ```sql select @@ -46,6 +58,7 @@ where ``` ### List flexible servers configured in more than one availability zones +Explore which flexible servers are configured across multiple availability zones in Azure. This is particularly useful for ensuring high availability and disaster recovery, as it allows you to identify any servers that might be at risk due to being confined to a single zone. ```sql select diff --git a/docs/tables/azure_postgresql_server.md b/docs/tables/azure_postgresql_server.md index ade0800e..e5cacd64 100644 --- a/docs/tables/azure_postgresql_server.md +++ b/docs/tables/azure_postgresql_server.md @@ -1,10 +1,20 @@ -# Table: azure_postgresql_server +--- +title: "Steampipe Table: azure_postgresql_server - Query Azure Database for PostgreSQL Servers using SQL" +description: "Allows users to query Azure Database for PostgreSQL Servers." +--- -Azure Database for PostgreSQL is a relational database service based on the open-source Postgres database engine. It's a fully managed database-as-a-service that can handle mission-critical workloads with predictable performance, security, high availability, and dynamic scalability. +# Table: azure_postgresql_server - Query Azure Database for PostgreSQL Servers using SQL + +Azure Database for PostgreSQL is a fully managed database service provided by Microsoft Azure. It is built on the open-source PostgreSQL database engine and offers compatibility with PostgreSQL, which allows users to use familiar PostgreSQL tools and scripts. This service provides built-in high availability, automatic backups, and scaling of resources in minutes without application downtime. + +## Table Usage Guide + +The 'azure_postgresql_server' table provides insights into PostgreSQL servers within Azure Database for PostgreSQL. As a database administrator or DevOps engineer, explore server-specific details through this table, including configurations, network settings, and associated metadata. Utilize it to uncover information about servers, such as those with specific configurations, the networking rules applied to servers, and the verification of server statuses. The schema presents a range of attributes of the PostgreSQL server for your analysis, like the server name, resource group, region, version, SSL enforcement, and storage capacity. ## Examples ### Basic info +Explore the details of your Azure PostgreSQL servers, such as their names, IDs, and locations. This can be useful for managing and organizing your servers across various locations. ```sql select @@ -16,6 +26,7 @@ from ``` ### List servers with encryption disabled +Discover the segments that have encryption disabled on their servers. This is crucial for identifying potential security risks and ensuring data protection standards are upheld. ```sql select @@ -30,6 +41,8 @@ where ``` ### List servers that allow access to Azure services +1. Discover the segments that allow access to Azure services from any location, which could potentially indicate a security risk. +2. Identify instances where servers lack an assigned Active Directory admin, which could pose a management or security issue. ```sql select @@ -62,6 +75,7 @@ where ``` ### List servers with log checkpoints disabled +Explore which servers have disabled log checkpoints, which could potentially compromise data integrity and recovery. This can be useful for auditing server configurations and ensuring optimal data safety practices. ```sql select @@ -77,6 +91,7 @@ where ``` ### List servers with a logging retention period greater than 3 days +This query is useful for identifying servers that maintain logs for more than three days, which can be beneficial for organizations that need to keep track of server activities for extended periods for auditing or troubleshooting purposes. ```sql select @@ -92,6 +107,7 @@ where ``` ### List servers with geo-redundant backup storage disabled +Uncover the details of servers that have disabled geo-redundant backup storage, helping to highlight potential areas of risk in your Azure PostgreSQL Server setup. This is useful for ensuring data redundancy and disaster recovery planning. ```sql select @@ -106,6 +122,7 @@ where ``` ### List private endpoint connection details +Explore the status and details of private endpoint connections within a server. This can be useful to monitor and manage the connections' state and actions required for maintaining optimal server performance. ```sql select @@ -120,4 +137,4 @@ select from azure_postgresql_server, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_private_dns_zone.md b/docs/tables/azure_private_dns_zone.md index ed45fa13..c5316f7f 100644 --- a/docs/tables/azure_private_dns_zone.md +++ b/docs/tables/azure_private_dns_zone.md @@ -1,10 +1,20 @@ -# Table: azure_private_dns_zone +--- +title: "Steampipe Table: azure_private_dns_zone - Query Azure Private DNS Zones using SQL" +description: "Allows users to query Azure Private DNS Zones." +--- -Azure private DNS zone is used to host the DNS records for a particular domain. Please note that this table only retrieves private DNS zones, use the `azure_dns_zone` table for public DNS zones. +# Table: azure_private_dns_zone - Query Azure Private DNS Zones using SQL + +Azure Private DNS is a service that provides reliable resolution of domain names in a Virtual Network, without the need for you to create and manage custom DNS solution. This service supports Azure services like VMs and Azure Kubernetes Service (AKS) clusters within a virtual network to securely and privately resolve and connect to the services running in the virtual network. It provides name resolution for virtual machines (VMs) within a VNet and between VNets. + +## Table Usage Guide + +The 'azure_private_dns_zone' table provides insights into Private DNS Zones within Azure DNS. As a DevOps engineer, explore zone-specific details through this table, including record sets, virtual network links, and associated metadata. Utilize it to uncover information about zones, such as those with private DNS records, the virtual networks linked to the zones, and the verification of DNS records. The schema presents a range of attributes of the Private DNS Zone for your analysis, like the zone name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which private DNS zones are present in your Azure infrastructure, including their associated resource groups and any attached tags. This can help you track and manage your resources more effectively. ```sql select @@ -16,6 +26,7 @@ from ``` ### List private DNS zones with record sets +Analyze the configuration of your Azure private DNS zones to identify those with more than one record set. This can be useful in pinpointing specific locations where multiple resources might be sharing the same DNS zone. ```sql select @@ -28,6 +39,7 @@ where ``` ### List private DNS zones linked to no virtual networks +Explore which private DNS zones in Azure are not linked to any virtual networks. This can help identify potential areas for optimization or detect configuration errors. ```sql select @@ -37,4 +49,4 @@ from azure_private_dns_zone where number_of_virtual_network_links_with_registration = 0; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_provider.md b/docs/tables/azure_provider.md index 9dd32da8..aeac6728 100644 --- a/docs/tables/azure_provider.md +++ b/docs/tables/azure_provider.md @@ -1,10 +1,20 @@ -# Table: azure_provider +--- +title: "Steampipe Table: azure_provider - Query Azure Resource Providers using SQL" +description: "Allows users to query Azure Resource Providers." +--- -A Azure Resource Provider (RP, for short) is simply an HTTPS RESTful API contract that Add-on owners will implement so a trusted Azure endpoint can provision, delete, and manage services on a user's behalf. +# Table: azure_provider - Query Azure Resource Providers using SQL + +Azure Resource Providers are services that supply the resources you can deploy and manage through Resource Manager. Each resource provider offers operations for working with the resources that are deployed. Some common resource providers are Microsoft.Compute, which supplies the virtual machine resource, Microsoft.Storage, which supplies the storage account resource, and Microsoft.Web, which supplies resources related to web apps. + +## Table Usage Guide + +The 'azure_provider' table provides insights into Resource Providers within Microsoft Azure. As a DevOps engineer, explore provider-specific details through this table, including the provider's namespace, registration state, and resource types. Utilize it to uncover information about providers, such as those that are registered or unregistered, the resources they supply, and their capabilities. The schema presents a range of attributes of the Resource Provider for your analysis, like the provider ID, registration state, and resource types. ## Examples ### Basic info +Explore the registration status of your Azure provider to understand its operational state and ensure it's properly configured. This can be useful in maintaining the efficiency of your cloud infrastructure. ```sql select @@ -16,6 +26,7 @@ from ``` ### List of azure providers which are not registered for use +Explore which Azure providers are not registered for use. This can be particularly useful in identifying potential gaps in your Azure services setup, helping to ensure all necessary providers are correctly registered and operational. ```sql select @@ -25,4 +36,4 @@ from azure_provider where registration_state = 'NotRegistered'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_public_ip.md b/docs/tables/azure_public_ip.md index 8230d04c..984f051e 100644 --- a/docs/tables/azure_public_ip.md +++ b/docs/tables/azure_public_ip.md @@ -1,10 +1,20 @@ -# Table: azure_public_ip +--- +title: "Steampipe Table: azure_public_ip - Query Azure Public IP Addresses using SQL" +description: "Allows users to query Azure Public IP Addresses." +--- -Public IP addresses enable Azure resources to communicate to Internet and public-facing Azure services. +# Table: azure_public_ip - Query Azure Public IP Addresses using SQL + +Azure Public IP Address is a resource within Microsoft Azure that allows you to assign public IP addresses to Azure resources such as virtual machines, Azure Load Balancers, and Azure VPN Gateways. These public IP addresses are used to communicate with internet resources, and can be either dynamic or static. Azure Public IP Addresses provide a reliable and secure connection to the internet for your Azure resources. + +## Table Usage Guide + +The 'azure_public_ip' table provides insights into Public IP Addresses within Microsoft Azure. As a Network Administrator, explore IP-specific details through this table, including the IP version, IP configuration, and associated metadata. Utilize it to uncover information about IP addresses, such as their allocation method, their assigned resource, and their location. The schema presents a range of attributes of the Public IP Address for your analysis, like the IP address, the SKU name, the domain name label, and the reverse FQDN. ## Examples ### List of unassociated elastic IPs +Explore which Azure public IP addresses are not associated with any IP configuration. This is useful to identify any unused resources that could potentially be costing you money. ```sql select @@ -17,6 +27,7 @@ where ``` ### List of IP addresses with corresponding associations +Explore which IP addresses are associated with specific resources in your Azure environment. This can help you manage your network configuration and identify potential issues or inefficiencies. ```sql select @@ -29,6 +40,7 @@ from ``` ### List of dynamic IP addresses +Determine the areas in which Azure's public IP addresses are dynamically allocated to gain insights into the flexibility and scalability of your network resources. ```sql select @@ -38,4 +50,4 @@ from azure_public_ip where public_ip_allocation_method = 'Dynamic'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_recovery_services_backup_job.md b/docs/tables/azure_recovery_services_backup_job.md index f2fc5a45..da7d477b 100644 --- a/docs/tables/azure_recovery_services_backup_job.md +++ b/docs/tables/azure_recovery_services_backup_job.md @@ -1,10 +1,20 @@ -# Table: azure_recovery_services_backup_job +--- +title: "Steampipe Table: azure_recovery_services_backup_job - Query Azure Recovery Services Backup Jobs using SQL" +description: "Allows users to query Azure Recovery Services Backup Jobs." +--- -An Azure Backup job is a task that you can define and run to perform data protection operations on your Azure resources. These jobs are typically used to back up and restore data from various Azure services, such as virtual machines, databases, and files. +# Table: azure_recovery_services_backup_job - Query Azure Recovery Services Backup Jobs using SQL + +Azure Recovery Services is a service within Microsoft Azure that provides data protection and disaster recovery capabilities. It enables backup and restore functionalities for Azure Virtual Machines, SQL workloads, and on-premises Windows Servers. Azure Recovery Services helps maintain data availability and ensures business continuity during planned and unplanned outages. + +## Table Usage Guide + +The 'azure_recovery_services_backup_job' table provides insights into backup jobs within Azure Recovery Services. As a DevOps engineer, explore job-specific details through this table, including job status, start and end times, and associated metadata. Utilize it to uncover information about jobs, such as those with errors, the duration of jobs, and the verification of backup items. The schema presents a range of attributes of the backup job for your analysis, like the job ID, backup management type, duration, and associated tags. ## Examples ### Basic info +Analyze the settings to understand the specifics of backup jobs in a particular Azure recovery services vault. This can help in evaluating the backup strategy and ensuring data recovery measures are in line with your organization's policies. ```sql select @@ -20,6 +30,7 @@ where ``` ### Get job properties of jobs +Explore the specifics of different jobs, such as the type, associated activities, management methods, and operational status. This can provide insights into job performance and help identify areas for optimization. ```sql select @@ -35,4 +46,4 @@ select properties ->> 'Status' as Status from azure_recovery_services_backup_job; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_recovery_services_vault.md b/docs/tables/azure_recovery_services_vault.md index 4094d91d..9ef5fe66 100644 --- a/docs/tables/azure_recovery_services_vault.md +++ b/docs/tables/azure_recovery_services_vault.md @@ -1,10 +1,20 @@ -# Table: azure_recovery_services_vault +--- +title: "Steampipe Table: azure_recovery_services_vault - Query Azure Recovery Services Vaults using SQL" +description: "Allows users to query Azure Recovery Services Vaults" +--- -A Recovery Services vault is a storage entity in Azure that houses data. The data is typically copies of data, or configuration information for virtual machines (VMs), workloads, servers, or workstations. You can use Recovery Services vaults to hold backup data for various Azure services such as IaaS VMs (Linux or Windows) and Azure SQL databases. +# Table: azure_recovery_services_vault - Query Azure Recovery Services Vaults using SQL + +Azure Recovery Services vault is a management entity that stores recovery points created over time and provides an interface to perform backup related operations. These operations include taking on-demand backups, performing restores, and creating backup policies. It offers backup support for Azure virtual machines, SQL workloads, and on-premises VMware machines. + +## Table Usage Guide + +The 'azure_recovery_services_vault' table provides insights into Recovery Services Vaults within Azure Recovery Services. As a DevOps engineer, explore vault-specific details through this table, such as the vault's location, resource group, subscription ID, and associated tags. Utilize it to uncover information about each vault, including its storage redundancy and soft delete feature status. The schema presents a range of attributes of the Recovery Services Vault for your analysis, like the vault name, type, SKU name, and provisioning state. ## Examples ### Basic info +Explore the different types of recovery services vaults available in various regions of your Azure environment. This can help in managing and organizing your backup and disaster recovery resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List failed recovery service vaults +Discover the segments that have unsuccessful recovery service vaults in Azure. This is useful to pinpoint specific locations where the provisioning process failed, allowing for targeted troubleshooting and resolution. ```sql select @@ -29,4 +40,4 @@ from azure_recovery_services_vault where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_redis_cache.md b/docs/tables/azure_redis_cache.md index f2bc9a42..11a8b30d 100644 --- a/docs/tables/azure_redis_cache.md +++ b/docs/tables/azure_redis_cache.md @@ -1,10 +1,20 @@ -# Table: azure_redis_cache +--- +title: "Steampipe Table: azure_redis_cache - Query Azure Cache for Redis instances using SQL" +description: "Allows users to query Azure Cache for Redis instances." +--- -Azure Cache for Redis provides an in-memory data store based on the Redis software. Redis improves the performance and scalability of an application that uses backend data stores heavily. It's able to process large volumes of application requests by keeping frequently accessed data in the server memory, which can be written to and read from quickly. Redis brings a critical low-latency and high-throughput data storage solution to modern applications. +# Table: azure_redis_cache - Query Azure Cache for Redis instances using SQL + +Azure Cache for Redis is an in-memory data store that is used to power fast, scalable applications. It provides secure and dedicated Redis server instances and additional features like Azure Virtual Network, full Redis command-set support, and premium tier features like clustering, persistence, and virtual network support. + +## Table Usage Guide + +The 'azure_redis_cache' table provides insights into Azure Cache for Redis instances. As a DevOps engineer, explore instance-specific details through this table, including configuration, access keys, and associated metadata. Utilize it to uncover information about instances, such as configuration settings, the number of clients connected, and the memory usage. The schema presents a range of attributes of the Redis instances for your analysis, like the Redis version, creation date, SKU name, and associated tags. ## Examples ### Basic info +Explore the configuration and status of your Azure Redis Cache instances. This is useful for understanding the versions in use, their locations, and the state of provisioning to ensure optimal performance and resource allocation. ```sql select @@ -20,6 +30,7 @@ from ``` ### List cache servers not using latest TLS protocol +Explore which cache servers in your Azure Redis Cache are not utilizing the latest TLS protocol. This helps ensure optimal security by identifying areas where updates may be needed. ```sql select @@ -35,6 +46,7 @@ where ``` ### List cache servers with in-transit encryption disabled +Explore which cache servers in Azure have in-transit encryption disabled. This is useful to identify potential security risks and ensure that all your data is securely transmitted. ```sql select @@ -49,6 +61,7 @@ where ``` ### List premium cache servers +Explore which cache servers are of premium type in your Azure Redis Cache setup. This can help in managing resources and costs more effectively. ```sql select @@ -60,4 +73,4 @@ from azure_redis_cache where sku_name = 'Premium'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_resource_group.md b/docs/tables/azure_resource_group.md index e671fb38..40a96fb5 100644 --- a/docs/tables/azure_resource_group.md +++ b/docs/tables/azure_resource_group.md @@ -1,10 +1,20 @@ -# Table: azure_resource_group +--- +title: "Steampipe Table: azure_resource_group - Query Azure Resource Groups using SQL" +description: "Allows users to query Azure Resource Groups." +--- -A resource group is a container that holds related resources for an Azure solution. +# Table: azure_resource_group - Query Azure Resource Groups using SQL + +Azure Resource Groups are basic units in Azure that provide a logical grouping for resources deployed on Azure. These groups hold related resources for an Azure solution. Resource groups are used to manage and organize Azure resources so you can monitor, control access, provision and manage billing. + +## Table Usage Guide + +The 'azure_resource_group' table provides insights into Resource Groups within Azure. As a DevOps engineer, explore Resource Group-specific details through this table, including locations, managed_by details, and associated metadata. Utilize it to uncover information about Resource Groups, such as those with specific provisioning states, the tags associated with each group, and the time they were last updated. The schema presents a range of attributes of the Resource Group for your analysis, like the group ID, name, type, and associated tags. ## Examples ### List of resource groups with their locations +Explore which resource groups are located in different regions to better manage and organize your resources in Azure. This can help streamline operations and ensure resources are optimally allocated across various geographical locations. ```sql select @@ -15,6 +25,7 @@ from ``` ### List of resource groups without owner tag key +Identify the Azure resource groups that lack an 'owner' tag. This is useful for pinpointing potential areas of unaccountability or mismanagement within your resources. ```sql select diff --git a/docs/tables/azure_resource_link.md b/docs/tables/azure_resource_link.md index 1892c1ea..4b435adc 100644 --- a/docs/tables/azure_resource_link.md +++ b/docs/tables/azure_resource_link.md @@ -1,10 +1,20 @@ -# Table: azure_resource_link +--- +title: "Steampipe Table: azure_resource_link - Query Azure Resource Links using SQL" +description: "Allows users to query Azure Resource Links." +--- -Linking is a feature of the Resource Manager. It enables declaring relationships between resources even if they do not reside in the same resource group. +# Table: azure_resource_link - Query Azure Resource Links using SQL + +Azure Resource Links are a feature within Microsoft Azure that allows you to link resources across different resource groups and even across different subscriptions. This feature provides a way to visualize and manage the dependencies between resources, which can be helpful for tasks like application mapping and audit. It also enables you to set up and manage links for various Azure resources, including virtual machines, databases, web applications, and more. + +## Table Usage Guide + +The 'azure_resource_link' table provides insights into Resource Links within Microsoft Azure. As a DevOps engineer, explore link-specific details through this table, including the source and target of each link, as well as associated metadata. Utilize it to uncover information about the relationships between different resources, such as those spanning across different resource groups or subscriptions. The schema presents a range of attributes of the Resource Link for your analysis, like the link id, source id, target id, and notes. ## Examples ### Basic Info +Explore the connections between different Azure resources. This can be useful in understanding the structure of your Azure environment and identifying potential dependencies or bottlenecks. ```sql select @@ -18,6 +28,7 @@ from ``` ### List resource links with virtual machines +Explore the connections between various resources and virtual machines within your Azure environment. This query can be useful to understand the relationships and dependencies in your infrastructure, providing valuable insights for resource management and optimization. ```sql select @@ -29,4 +40,4 @@ from azure_resource_link where source_id LIKE '%virtualmachines%'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_role_assignment.md b/docs/tables/azure_role_assignment.md index 56832ade..2738c26f 100644 --- a/docs/tables/azure_role_assignment.md +++ b/docs/tables/azure_role_assignment.md @@ -1,10 +1,20 @@ -# Table: azure_role_assignment +--- +title: "Steampipe Table: azure_role_assignment - Query Azure Identity and Access Management Role Assignments using SQL" +description: "Allows users to query Azure Role Assignments" +--- -Azure role assignments is the authorization system to manage access to Azure resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope. +# Table: azure_role_assignment - Query Azure Identity and Access Management Role Assignments using SQL + +Azure Role Assignments are a security mechanism used within Microsoft Azure to manage access to Azure resources. They define the operations that a user, group, service principal, or managed identity can perform on a particular resource. Role assignments are crucial for effective access management and security in Azure. + +## Table Usage Guide + +The 'azure_role_assignment' table provides insights into role assignments within Azure Identity and Access Management (IAM). As a security administrator, explore role assignment-specific details through this table, including role definitions, principals, and scope. Utilize it to uncover information about role assignments, such as those with broad permissions, the relationships between principals and roles, and the scope of each role assignment. The schema presents a range of attributes of the role assignment for your analysis, like the role ID, principal ID, scope, and role definition ID. ## Examples ### Basic info +Explore the identities and types of principals assigned to roles in your Azure environment, enabling you to better manage access and permissions. This is particularly useful in maintaining security and ensuring only authorized users have access to specific resources. ```sql select @@ -17,6 +27,7 @@ from ``` ### List of role assignments which has permission at root level +Determine the areas in which certain role assignments have root-level permissions. This is useful for understanding the distribution of access rights within your Azure environment. ```sql select @@ -30,6 +41,7 @@ where ``` ### List of role assignments which has subscription level permission and full access to the subscription +Explore which users have full access and subscription level permissions in Azure. This is beneficial for managing user permissions and ensuring the security of your Azure resources. ```sql select @@ -42,4 +54,4 @@ from where ra.scope like '/subscriptions/%' and perm -> 'actions' = '["*"]'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_role_definition.md b/docs/tables/azure_role_definition.md index a112456c..8b860a9a 100644 --- a/docs/tables/azure_role_definition.md +++ b/docs/tables/azure_role_definition.md @@ -1,10 +1,20 @@ -# Table: azure_role_definition +--- +title: "Steampipe Table: azure_role_definition - Query Azure Active Directory Role Definitions using SQL" +description: "Allows users to query Azure Active Directory Role Definitions." +--- -A role definition lists the operations that can be performed, such as read, write, and delete. +# Table: azure_role_definition - Query Azure Active Directory Role Definitions using SQL + +Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. Role Definitions are a collection of permissions. It’s a template that defines the operations that can be performed, such as read, write, and delete. + +## Table Usage Guide + +The 'azure_role_definition' table provides insights into role definitions within Azure Active Directory. As a DevOps engineer, you can explore role-specific details through this table, including permissions and associated metadata. Utilize it to uncover information about role definitions, such as those with specific permissions. The schema presents a range of attributes of the role definition for your analysis, like the role name, id, description, and type. ## Examples ### List the custom roles +Explore the custom roles within your Azure environment to understand their configurations and purposes. This can help in managing access and permissions more effectively. ```sql select @@ -20,6 +30,7 @@ where ``` ### List of roles whose assignable scope is set to root('/') scope +Discover the roles within the Azure environment that have the highest level of access, specifically those set to the root ('/') scope. This can be useful for auditing purposes, allowing you to ensure only the appropriate roles have such broad permissions. ```sql select @@ -34,6 +45,7 @@ where ``` ### Permissions of all custom roles +Explore the permissions associated with all custom roles in an Azure environment. This can be useful to understand and manage access control, ensuring the right roles have the appropriate permissions. ```sql select @@ -49,4 +61,4 @@ from cross join jsonb_array_elements(permissions) as permission where role_type = 'CustomRole'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_route_table.md b/docs/tables/azure_route_table.md index 3885ab0b..ff562f86 100644 --- a/docs/tables/azure_route_table.md +++ b/docs/tables/azure_route_table.md @@ -1,10 +1,20 @@ -# Table: azure_route_table +--- +title: "Steampipe Table: azure_route_table - Query Azure Networking Route Tables using SQL" +description: "Allows users to query Azure Networking Route Tables." +--- -Azure Route Tables allows to create network routes so that CloudGen Firewall VM can handle the traffic both between the subnets and to the Internet. +# Table: azure_route_table - Query Azure Networking Route Tables using SQL + +Azure Networking Route Tables are a resource within Microsoft Azure that allow for control over the routing paths of network traffic. They provide a way to direct network traffic based on source, destination, and other key factors. This enables more granular control over network communication within and across Azure services. + +## Table Usage Guide + +The 'azure_route_table' table provides insights into Route Tables within Azure Networking. As a Network Administrator, explore route-specific details through this table, including associated routes, subnets, and related metadata. Utilize it to uncover information about the routing paths, such as those with specific next hops, the association between subnets and routes, and the verification of route properties. The schema presents a range of attributes of the Route Table for your analysis, like the route table ID, creation date, attached subnets, and associated tags. ## Examples ### List of subnets associated with route table +Explore the association between subnets and route tables within a specific region in Azure. This can help in understanding the network infrastructure and identifying potential issues related to network routing. ```sql select @@ -17,6 +27,7 @@ from ``` ### List of route tables where route propagation is enabled +Explore the route tables in your Azure network where route propagation is enabled. This can be useful in understanding how your network traffic is being directed and managed. ```sql select @@ -30,6 +41,7 @@ where ``` ### Route info of each routes table +Explore the details of each route within your Azure network to understand the direction of traffic flow. This can help in optimizing network performance and managing traffic effectively. ```sql select @@ -40,4 +52,4 @@ select from azure_route_table cross join jsonb_array_elements(routes) as route; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_search_service.md b/docs/tables/azure_search_service.md index 16453f6f..4f61ef8c 100644 --- a/docs/tables/azure_search_service.md +++ b/docs/tables/azure_search_service.md @@ -1,10 +1,20 @@ -# Table: azure_search_service +--- +title: "Steampipe Table: azure_search_service - Query Azure Search Services using SQL" +description: "Allows users to query Azure Search Services." +--- -Azure Cognitive Search is the only cloud search service with built-in AI capabilities that enrich all types of information to help you identify and explore relevant content at scale. Use cognitive skills for vision, language and speech or use custom machine learning models to uncover insights from all types of content. +# Table: azure_search_service - Query Azure Search Services using SQL + +Azure Search Service is a cloud-based search-as-a-service solution that delegates server and infrastructure management to Microsoft, leaving you with a ready-to-use service that you can populate with your data and then use to add search to your web or mobile application. Azure Search Service supports a wide variety of features to provide a rich search experience, including full-text search, filters and facets, typeaheads, hit highlighting, and suggestions. It also provides capabilities for tuning the relevance of search results and offers a simple query syntax for a wide range of query types. + +## Table Usage Guide + +The 'azure_search_service' table provides insights into Search Services within Azure. As a DevOps engineer, explore service-specific details through this table, including the service name, resource group, subscription ID, and associated metadata. Utilize it to uncover information about search services, such as the service tier, the number of replicas and partitions, and the verification of public network access. The schema presents a range of attributes of the Search Service for your analysis, like the service name, location, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Search services are currently active and assess their configuration, including the number of replicas. This is useful for managing resources and understanding the scale of your Azure Search services. ```sql select @@ -20,6 +30,7 @@ from ``` ### List publicly accessible search services +Discover the segments that have publicly accessible search services enabled within the Azure platform. This is useful for assessing potential security risks and ensuring appropriate access controls are in place. ```sql select diff --git a/docs/tables/azure_security_center_auto_provisioning.md b/docs/tables/azure_security_center_auto_provisioning.md index 3d075336..4581793f 100644 --- a/docs/tables/azure_security_center_auto_provisioning.md +++ b/docs/tables/azure_security_center_auto_provisioning.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_auto_provisioning +--- +title: "Steampipe Table: azure_security_center_auto_provisioning - Query Azure Security Center Auto Provisioning Settings using SQL" +description: "Allows users to query Azure Security Center Auto Provisioning Settings." +--- -Azure security center auto provisioning settings expose the auto provisioning settings of the subscriptions. +# Table: azure_security_center_auto_provisioning - Query Azure Security Center Auto Provisioning Settings using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not. Auto Provisioning settings in Azure Security Center enable you to control if security solutions are automatically deployed and provisioned for new resources. This feature is designed to ensure that as new resources are deployed, they are automatically onboarded to the security solutions and policies you have defined. + +## Table Usage Guide + +The 'azure_security_center_auto_provisioning' table provides insights into the auto provisioning settings within Azure Security Center. As a security administrator, explore setting-specific details through this table, including the current auto provisioning status and target resource type. Utilize it to uncover information about the auto provisioning settings, such as those that are currently active and the resource types they are applied to. The schema presents a range of attributes of the auto provisioning settings for your analysis, like the auto provisioning setting id, provisioning status, and target resource type. ## Examples ### Basic info +Discover the segments that have automatic provisioning enabled in your Azure Security Center to better manage your security policies and configurations. This is useful for maintaining security standards and ensuring consistent configurations across your environment. ```sql select @@ -17,6 +27,7 @@ from ``` ### List subscriptions that have automatic provisioning of VM monitoring agent enabled +Discover the subscriptions that have enabled automatic provisioning for their VM monitoring agent. This allows you to identify potential areas for increased security and efficiency. ```sql select @@ -28,4 +39,4 @@ from azure_security_center_auto_provisioning where auto_provision = 'On'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_automation.md b/docs/tables/azure_security_center_automation.md index 898574ed..906fce00 100644 --- a/docs/tables/azure_security_center_automation.md +++ b/docs/tables/azure_security_center_automation.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_automation +--- +title: "Steampipe Table: azure_security_center_automation - Query Azure Security Center Automations using SQL" +description: "Allows users to query Azure Security Center Automations, providing detailed information on their security automation configurations." +--- -Microsoft Defender for Cloud generates detailed security alerts and recommendations. You can view them in the portal or through programmatic tools. You might also need to export some or all of this information for tracking with other monitoring tools in your environment. +# Table: azure_security_center_automation - Query Azure Security Center Automations using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud. The Security Center Automations are part of this system, designed to provide automatic responses to specific security incidents. They offer an efficient way to remediate threats and misconfigurations, enabling a proactive approach to security management. + +## Table Usage Guide + +The 'azure_security_center_automation' table provides insights into the automations within Azure Security Center. As a security or DevOps engineer, explore automation-specific details through this table, including the associated resources, actions, and conditions. Utilize it to uncover information about automations, such as those related to specific security alerts, the actions taken in response, and the resources affected. The schema presents a range of attributes of the automation for your analysis, like the automation name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore the types and kinds of security automations set up in your Azure Security Center. This is useful for understanding the variety and scope of automated security measures currently in place. ```sql select @@ -17,6 +27,7 @@ from ``` ### List enabled continuously export microsoft defender for cloud data +Analyze the configuration of your Microsoft Defender for cloud data to identify which aspects are continuously exporting. This helps in keeping track of the data and ensuring that all necessary information is being exported as required. ```sql select @@ -31,6 +42,7 @@ where ``` ### List event source details for continuously export microsoft defender for cloud data +Determine the details of event sources for continuous data export in Microsoft Defender for Cloud. This is useful for understanding the configuration and operators of your security automation rules, as well as identifying expected values and property types. ```sql select diff --git a/docs/tables/azure_security_center_contact.md b/docs/tables/azure_security_center_contact.md index 2a4ecff4..f25bf8a3 100644 --- a/docs/tables/azure_security_center_contact.md +++ b/docs/tables/azure_security_center_contact.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_contact +--- +title: "Steampipe Table: azure_security_center_contact - Query Azure Security Center Contacts using SQL" +description: "Allows users to query Azure Security Center Contacts." +--- -Azure security center contact details for the subscription. +# Table: azure_security_center_contact - Query Azure Security Center Contacts using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud. It allows you to manage and enforce your security policies across your Azure environment, limit your exposure to threats, and detect and respond to attacks. A contact in Azure Security Center is an entity that contains the contact details for the security center. + +## Table Usage Guide + +The 'azure_security_center_contact' table provides insights into the contacts within Azure Security Center. As a security administrator, explore contact-specific details through this table, including email addresses, phone numbers, and alert notifications. Utilize it to uncover information about contacts, such as those who are set to receive security alerts, and the verification of alert notifications. The schema presents a range of attributes of the Security Center contact for your analysis, like the contact name, email, phone, and alert notifications. ## Examples ### Basic info +Analyze the settings to understand the alert preferences and email contact details in your Azure Security Center. This can help you ensure that alerts are being sent to the right people and that the notification settings are configured correctly. ```sql select @@ -17,6 +27,7 @@ from ``` ### List security center contacts not configured with email notifications +Discover the segments that have security center contacts without configured email notifications. This is useful to identify potential gaps in your alert system and ensure all relevant parties are receiving necessary security updates. ```sql select @@ -28,4 +39,4 @@ from azure_security_center_contact where email != ''; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_jit_network_access_policy.md b/docs/tables/azure_security_center_jit_network_access_policy.md index d1f5131e..af01bf70 100644 --- a/docs/tables/azure_security_center_jit_network_access_policy.md +++ b/docs/tables/azure_security_center_jit_network_access_policy.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_jit_network_access_policy +--- +title: "Steampipe Table: azure_security_center_jit_network_access_policy - Query Azure Security Center Just-In-Time Network Access Policies using SQL" +description: "Allows users to query Just-In-Time Network Access Policies in Azure Security Center." +--- -Azure Security Center's just-in-time (JIT) network access policy helps to lock down inbound traffic access to your virtual machines. This reduces exposure to attacks while providing easy access when you need to connect to a VM. +# Table: azure_security_center_jit_network_access_policy - Query Azure Security Center Just-In-Time Network Access Policies using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud. Just-In-Time Network Access Policies in Azure Security Center help you control access to your Azure Virtual Machines by providing a secure way to connect to a VM, reducing exposure to attacks while providing easy access to connect to VMs when needed. + +## Table Usage Guide + +The 'azure_security_center_jit_network_access_policy' table provides insights into Just-In-Time Network Access Policies within Azure Security Center. As a security engineer, explore policy-specific details through this table, including policy configurations, virtual machine details, and associated metadata. Utilize it to uncover information about policies, such as those with specific IP configurations, the access protocols allowed, and the verification of request status. The schema presents a range of attributes of the Just-In-Time Network Access Policy for your analysis, like the policy ID, provisioning state, location, and associated tags. ## Examples ### List virtual machines with JIT access enabled +Explore which virtual machines have Just-In-Time access enabled. This is particularly beneficial for enhancing security measures by only permitting access when needed. ```sql select @@ -17,4 +27,4 @@ from azure_compute_virtual_machine as vm where lower(vms ->> 'id') = lower(vm.id); -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_setting.md b/docs/tables/azure_security_center_setting.md index 9f386b88..34b381d8 100644 --- a/docs/tables/azure_security_center_setting.md +++ b/docs/tables/azure_security_center_setting.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_setting +--- +title: "Steampipe Table: azure_security_center_setting - Query Azure Security Center Settings using SQL" +description: "Allows users to query Azure Security Center Settings" +--- -Azure security center settings contains different configurations in security center. +# Table: azure_security_center_setting - Query Azure Security Center Settings using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not. It gives you the ability to protect your hybrid cloud workloads and get unified security management across your entire environment. Azure Security Center helps you prevent, detect, and respond to threats with increased visibility and control over the security of all your Azure resources. + +## Table Usage Guide + +The 'azure_security_center_setting' table provides insights into settings within Azure Security Center. As a Security Engineer, explore setting-specific details through this table, including the type of setting, whether it is enabled or not, and the kind of resource it is associated with. Utilize it to uncover information about settings, such as those that are disabled, those that are enabled, and the resources they are associated with. The schema presents a range of attributes of the Security Center setting for your analysis, like the setting name, type, kind, provisioning state, and associated metadata. ## Examples ### Basic info +Explore the status of your Azure Security Center settings to determine which ones are active. This can help streamline your security management by focusing on the settings currently in use. ```sql select @@ -16,6 +26,7 @@ from ``` ### List the enabled settings for security center +Explore which settings are enabled in the Azure Security Center to determine the areas of your system that are currently secured. This can help in identifying any potential vulnerabilities or gaps in security. ```sql select @@ -26,4 +37,4 @@ from azure_security_center_setting where enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_sub_assessment.md b/docs/tables/azure_security_center_sub_assessment.md index 0a6a88b3..a4db262d 100644 --- a/docs/tables/azure_security_center_sub_assessment.md +++ b/docs/tables/azure_security_center_sub_assessment.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_sub_assessment +--- +title: "Steampipe Table: azure_security_center_sub_assessment - Query Azure Security Center Sub-Assessments using SQL" +description: "Allows users to query Azure Security Center Sub-Assessments" +--- -Azure security center sub-assessments helps identifying conditions to evaluate if there is a need to fix security vulnerabilities found in images before pushing anything further in the process on all your scanned resources inside a subscription scope +# Table: azure_security_center_sub_assessment - Query Azure Security Center Sub-Assessments using SQL + +Azure Security Center is a unified infrastructure security management system by Microsoft Azure that improves the security posture of your data centers. It provides advanced threat protection across your hybrid workloads in the cloud, whether they're in Azure or not. As part of this service, Sub-Assessments provide detailed security recommendations and potential vulnerabilities within your resources. + +## Table Usage Guide + +The 'azure_security_center_sub_assessment' table provides insights into Sub-Assessments within Azure Security Center. As a security professional, you can explore detailed security recommendations and potential vulnerabilities for your resources through this table. Utilize it to uncover information about each sub-assessment, such as its status, severity, and associated metadata. The schema presents a range of attributes of the sub-assessment for your analysis, like the resource ID, resource type, and associated recommendations. This can be particularly useful in identifying and mitigating potential security risks in your Azure environment. ## Examples ### Basic info +Explore which security assessments in your Azure Security Center have specific characteristics. This can help you identify potential risk areas and understand the security posture of your resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### List unhealthy sub assessment details +Explore which sub-assessments in Azure Security Center are marked as unhealthy. This can help you identify areas of your Azure environment that may require immediate attention or remediation. ```sql select @@ -32,6 +43,7 @@ where ``` ### List all container registry vulnerabilities with corresponding remedies +Explore potential security vulnerabilities within your container registry and understand the corresponding solutions. This is useful for maintaining the security of your applications by identifying and addressing potential threats. ```sql select @@ -45,6 +57,7 @@ where ``` ### List all server vulnerabilities with corresponding remedies +Explore server vulnerabilities and their corresponding remedies within the Azure Security Center. This is useful for identifying potential security issues and understanding how to address them. ```sql select @@ -58,6 +71,7 @@ where ``` ### List all sql server vulnerabilities with corresponding remedies +Discover the segments that contain vulnerabilities in your SQL server and understand the corresponding remedies. This can help in ensuring your server's security by addressing these vulnerabilities promptly. ```sql select diff --git a/docs/tables/azure_security_center_subscription_pricing.md b/docs/tables/azure_security_center_subscription_pricing.md index 8302eeae..3ec62dcf 100644 --- a/docs/tables/azure_security_center_subscription_pricing.md +++ b/docs/tables/azure_security_center_subscription_pricing.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_subscription_pricing +--- +title: "Steampipe Table: azure_security_center_subscription_pricing - Query Azure Security Center Subscription Pricings using SQL" +description: "Allows users to query Azure Security Center Subscription Pricings." +--- -Azure security center pricing configurations for the subscription. +# Table: azure_security_center_subscription_pricing - Query Azure Security Center Subscription Pricings using SQL + +Azure Security Center is a unified security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud, whether they're in Azure or not. It provides you with a set of policies and recommendations, tailored to your specific deployments. With Azure Security Center, you can understand the security state of your resources in Azure, on-premises, and in other cloud providers. + +## Table Usage Guide + +The 'azure_security_center_subscription_pricing' table provides insights into subscription pricings within Azure Security Center. As a security analyst, explore pricing-specific details through this table, including pricing tier, free trial status, and associated metadata. Utilize it to uncover information about subscription pricings, such as the pricing tier for each resource type and whether the free trial is still active. The schema presents a range of attributes of the subscription pricing for your analysis, like the pricing name, pricing tier, and free trial status. ## Examples ### Basic info +Analyze the settings to understand the different pricing tiers of your Azure Security Center subscriptions. This can help you assess your current cost structure and potentially identify areas for optimization. ```sql select @@ -16,6 +26,7 @@ from ``` ### List pricing information for virtual machines +Explore the cost implications of your virtual machines by determining their associated pricing tiers. This is useful for budget management and cost optimization within your Azure environment. ```sql select @@ -26,4 +37,4 @@ from azure_security_center_subscription_pricing where name = 'VirtualMachines'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_service_fabric_cluster.md b/docs/tables/azure_service_fabric_cluster.md index dcb1933f..f4a3bc91 100644 --- a/docs/tables/azure_service_fabric_cluster.md +++ b/docs/tables/azure_service_fabric_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_service_fabric_cluster +--- +title: "Steampipe Table: azure_service_fabric_cluster - Query Azure Service Fabric Clusters using SQL" +description: "Allows users to query Azure Service Fabric Clusters." +--- -An Azure Service Fabric cluster is a network-connected set of virtual or physical machines into which your microservices are deployed and managed. It rebalances the partition replicas and instances across the increase or decreased number of nodes to make better use of the hardware on each node. It allows for the creation of clusters on any VMs or computers running Windows Server or Linux. +# Table: azure_service_fabric_cluster - Query Azure Service Fabric Clusters using SQL + +Azure Service Fabric is a distributed systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers. It also provides comprehensive runtime and lifecycle management capabilities to applications that are composed of these microservices or containers. This platform simplifies the delivery of cloud services and provides developers with a comprehensive, agnostic and intrinsically secure approach to building, scaling and updating cloud applications. + +## Table Usage Guide + +The 'azure_service_fabric_cluster' table provides insights into Service Fabric Clusters within Azure Service Fabric. As a DevOps engineer, explore cluster-specific details through this table, including cluster code versions, reliability levels, upgrade modes, and associated metadata. Utilize it to uncover information about clusters, such as those with specific reliability levels, the upgrade modes of the clusters, and the verification of cluster health policies. The schema presents a range of attributes of the Service Fabric Cluster for your analysis, like the cluster ID, creation date, upgrade mode, and associated tags. ## Examples ### Basic info +Explore which Azure Service Fabric Clusters are being used by reviewing their basic information. This helps in managing resources and understanding their provisioning states and upgrade modes. ```sql select @@ -21,6 +31,7 @@ from ``` ### List azure active directory details for clusters +Explore the Azure Active Directory details associated with your clusters to understand the client and cluster applications. This can be beneficial for assessing the elements within your Azure Service Fabric Cluster, such as the tenant ID. ```sql select @@ -34,6 +45,7 @@ from ``` ### List certificate details for clusters +Discover the segments that have specific certificate details for clusters. This can be useful in identifying potential security vulnerabilities or ensuring compliance with organizational policies. ```sql select @@ -47,6 +59,7 @@ from ``` ### List fabric setting details for clusters +Analyze the settings to understand the configuration details for specific clusters within the Azure Service Fabric. This can help in managing and troubleshooting your service fabric clusters effectively. ```sql select @@ -60,6 +73,7 @@ from ``` ### List node type details for clusters +Assess the configuration of cluster nodes to better understand their connection points, durability levels, and port settings. This information can be useful for optimizing resource allocation and enhancing network security. ```sql select @@ -76,4 +90,4 @@ select from azure_service_fabric_cluster, jsonb_array_elements(node_types) as types; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_servicebus_namespace.md b/docs/tables/azure_servicebus_namespace.md index 6e3e3a9e..19141a5a 100644 --- a/docs/tables/azure_servicebus_namespace.md +++ b/docs/tables/azure_servicebus_namespace.md @@ -1,10 +1,20 @@ -# Table: azure_servicebus_namespace +--- +title: "Steampipe Table: azure_servicebus_namespace - Query Azure Service Bus Namespaces using SQL" +description: "Allows users to query Azure Service Bus Namespaces, providing insights into their properties, statuses, and configurations." +--- -A ServiceBus namespace is a container for all messaging components (queues and topics). Multiple queues and topics can be in a single namespace, and namespaces often serve as application containers. A Service Bus namespace is your own capacity slice of a large cluster made up of dozens of all-active virtual machines. +# Table: azure_servicebus_namespace - Query Azure Service Bus Namespaces using SQL + +Azure Service Bus is a fully managed enterprise integration message broker. It can decouple applications and services, enabling them to communicate independently and reliably through messages. A namespace is a scoping container for all messaging components, providing a unique environment within the Service Bus where the queues, topics, and subscriptions reside. + +## Table Usage Guide + +The 'azure_servicebus_namespace' table provides insights into Azure Service Bus Namespaces, allowing you to explore details such as their properties, statuses, and configurations. As a DevOps engineer, leverage this table to understand the setup and management of your Service Bus Namespaces, including their SKU details, provisioning states, and associated tags. The schema presents a range of attributes of the Service Bus Namespace for your analysis, such as the name, region, resource group, subscription ID, and more. Utilize it to monitor the health and performance of your Azure Service Bus Namespaces, ensuring they meet predefined conditions and standards. ## Examples ### Basic info +Explore which Azure Service Bus namespaces are currently in use, to understand their provisioning status and when they were created. This can help in managing resources and planning for future capacity needs. ```sql select @@ -18,6 +28,7 @@ from ``` ### List premium namespaces +Explore which service bus namespaces in your Azure environment are operating on a premium tier, allowing you to assess your resource allocation and optimize cost management. ```sql select @@ -31,6 +42,7 @@ where ``` ### List unencrypted namespaces +Explore the premium tier of your Azure Service Bus to identify namespaces that lack encryption. This is useful for improving your security measures and ensuring data protection. ```sql select @@ -45,6 +57,7 @@ where ``` ### List namespaces not using a virtual network service endpoint +Identify premium Azure Service Bus namespaces that are not utilizing a virtual network service endpoint. This can be used to enhance network security by ensuring all namespaces are connected to a secure network. ```sql select @@ -69,6 +82,7 @@ where ``` ### List private endpoint connection details +Explore the details of private endpoint connections in your Azure Service Bus Namespace. This can be useful to understand the state and type of each connection, which can assist in managing and optimizing your network's performance. ```sql select @@ -86,6 +100,7 @@ from ``` ### List encryption details +Explore the encryption details of your Azure Service Bus namespaces to understand their security configurations and ensure that they meet your organization's requirements. This query is particularly useful for auditing and compliance purposes. ```sql select @@ -96,4 +111,4 @@ select encryption -> 'requireInfrastructureEncryption' as require_infrastructure_encryption from azure_servicebus_namespace; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_signalr_service.md b/docs/tables/azure_signalr_service.md index a63c1184..053160a9 100644 --- a/docs/tables/azure_signalr_service.md +++ b/docs/tables/azure_signalr_service.md @@ -1,10 +1,20 @@ -# Table: azure_signalr_service +--- +title: "Steampipe Table: azure_signalr_service - Query Azure SignalR Services using SQL" +description: "Allows users to query Azure SignalR Services." +--- -Azure SignalR Service is a fully-managed service which allows developers to focus on building real-time web experiences without worrying about capacity provisioning, reliable connections, scaling, encryption or authentication. +# Table: azure_signalr_service - Query Azure SignalR Services using SQL + +Azure SignalR Service is a fully-managed service that allows developers to focus on building real-time web experiences without worrying about capacity provisioning, reliable connections, scaling, encryption, or authentication. It is an Azure cloud-based service that is designed to support real-time web technologies like WebSockets and has built-in support for scaling your applications instantly. It also provides robust client SDKs for .NET, JavaScript, and Java, making it easier to build web applications with real-time features. + +## Table Usage Guide + +The 'azure_signalr_service' table provides insights into SignalR services within Azure. As a DevOps engineer, explore service-specific details through this table, including the service mode, primary and secondary connection strings, and associated metadata. Utilize it to uncover information about services, such as those with specific features, the connections between services, and the verification of connection strings. The schema presents a range of attributes of the SignalR service for your analysis, like the service tier, unit count, host name, and associated tags. ## Examples ### Basic info +Explore the status and types of Azure SignalR services to gain insights into their provisioning status, which can help in managing and troubleshooting these services efficiently. ```sql select @@ -18,6 +28,7 @@ from ``` ### List network ACL details for SignalR service +Explore the network access control lists (ACLs) for SignalR service to understand their configuration and status. This can help you assess security measures and pinpoint areas for potential improvement. ```sql select @@ -33,6 +44,7 @@ from ``` ### List private endpoint connection details for SignalR service +This example helps you identify the details of private endpoint connections for the SignalR service. It's useful for understanding the state and type of your connections, providing insights that can aid in service configuration and management. ```sql select @@ -46,4 +58,4 @@ select from azure_signalr_service, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_spring_cloud_service.md b/docs/tables/azure_spring_cloud_service.md index 98c4873d..fefae011 100644 --- a/docs/tables/azure_spring_cloud_service.md +++ b/docs/tables/azure_spring_cloud_service.md @@ -1,10 +1,20 @@ -# Table: azure_spring_cloud_service +--- +title: "Steampipe Table: azure_spring_cloud_service - Query Azure Spring Cloud Services using SQL" +description: "Allows users to query Azure Spring Cloud Services, providing data on various aspects of the service such as the service's ID, name, type, and location, as well as detailed information on the service's properties, tags, and encryption settings." +--- -Azure Spring Cloud is a platform as a service (PaaS) for Spring developers. It manages the lifecycle of your Spring Boot applications with comprehensive monitoring and diagnostics, configuration management, service discovery, CI/CD integration, blue-green deployments and more. +# Table: azure_spring_cloud_service - Query Azure Spring Cloud Services using SQL + +Azure Spring Cloud is a service that lets developers build, deploy, and scale Spring Boot applications on Azure. It provides a fully managed service for Spring Boot apps, allowing developers to focus on building their applications without the worry of managing infrastructure. Azure Spring Cloud is designed to be simple, safe, and scalable, providing a robust platform for enterprise-grade applications. + +## Table Usage Guide + +The 'azure_spring_cloud_service' table provides insights into Azure Spring Cloud Services. As a DevOps engineer, explore service-specific details through this table, including service properties, tags, and encryption settings. Utilize it to uncover information about services, such as the service's ID, name, type, and location. The schema presents a range of attributes of the Azure Spring Cloud Service for your analysis, like the service's provisioning state, active deployment name, and network profile. ## Examples ### Basic info +Explore the various features of your Azure Spring Cloud services, such as their current provisioning state, type, and version. This can help you manage and optimize your resources effectively. ```sql select @@ -20,6 +30,7 @@ from ``` ### List network profile details +This example helps you explore the details of your network profile in Azure Spring Cloud Service. It's particularly useful when you need to understand your network configuration for troubleshooting or optimizing your cloud services. ```sql select diff --git a/docs/tables/azure_sql_database.md b/docs/tables/azure_sql_database.md index 78dd3098..a0a79e37 100644 --- a/docs/tables/azure_sql_database.md +++ b/docs/tables/azure_sql_database.md @@ -1,10 +1,20 @@ -# Table: azure_sql_database +--- +title: "Steampipe Table: azure_sql_database - Query Azure SQL Databases using SQL" +description: "Allows users to query Azure SQL Databases." +--- -An Azure SQL Database is an intelligent, scalable, relational database service built for the cloud. +# Table: azure_sql_database - Query Azure SQL Databases using SQL + +Azure SQL Database is a managed cloud database provided as part of Microsoft Azure. A high-performance, reliable, and secure database you can use to build data-driven applications and websites in the programming language of your choice, without needing to manage infrastructure. + +## Table Usage Guide + +The 'azure_sql_database' table provides insights into SQL databases within Azure. As a DevOps engineer, you can explore database-specific details through this table, including server details, collation, status, and associated metadata. Utilize it to uncover information about databases, such as those with specific collation, the status of the databases, and the verification of server details. The schema presents a range of attributes of the SQL database for your analysis, like the database ID, creation date, server name, and associated tags. ## Examples ### Basic info +Explore the general attributes of your Azure SQL databases, such as their names, IDs, server names, locations, and editions. This is useful for gaining a broad overview of your database configurations and locations. ```sql select @@ -18,6 +28,7 @@ from ``` ### List databases that are not online +Discover the databases that are not currently online, enabling you to identify potential issues or areas for maintenance within your Azure SQL server. This can be useful for troubleshooting, ensuring optimal performance, and managing resources. ```sql select @@ -34,6 +45,7 @@ where ``` ### List databases that are not encrypted +Explore which databases in your Azure SQL server are not encrypted. This can help in identifying potential security risks and ensuring data protection compliance. ```sql select @@ -47,4 +59,4 @@ from azure_sql_database where transparent_data_encryption ->> 'status' != 'Enabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_sql_server.md b/docs/tables/azure_sql_server.md index 68070122..6def02e2 100644 --- a/docs/tables/azure_sql_server.md +++ b/docs/tables/azure_sql_server.md @@ -1,10 +1,20 @@ -# Table: azure_sql_server +--- +title: "Steampipe Table: azure_sql_server - Query Azure SQL Servers using SQL" +description: "Allows users to query Azure SQL Servers for information such as server names, locations, versions, administrator logins, and more." +--- -An Azure SQL server is a relational database management system. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet). +# Table: azure_sql_server - Query Azure SQL Servers using SQL + +Azure SQL Server is a relational database service in the Microsoft Azure cloud. It provides a scalable, highly available, and managed database service that handles most of the database management functions such as upgrading, patching, backups, and monitoring. Azure SQL Server offers the broadest SQL Server engine compatibility and an automated patching and version updates feature. + +## Table Usage Guide + +The 'azure_sql_server' table provides insights into SQL servers within Azure SQL Server service. As a database administrator, you can explore server-specific details through this table, including server names, locations, versions, administrator logins, and more. Utilize it to uncover information about servers, such as those with specific versions, the locations of the servers, and the administrator login details. The schema presents a range of attributes of the SQL server for your analysis, like the server name, location, version, administrator login, and associated tags. ## Examples ### List servers that have auditing disabled +Determine the areas in which auditing is disabled on your servers. This can be useful to maintain security standards and ensure all activities are properly recorded for future reference. ```sql select @@ -19,6 +29,7 @@ where ``` ### List servers with an audit log retention period less than 90 days +Determine the servers that have an audit log retention period of less than 90 days. This can be useful for identifying potential security risks and ensuring compliance with internal or external data retention policies. ```sql select @@ -33,6 +44,7 @@ where ``` ### List servers that have advanced data security disabled +Discover the segments that have advanced data security turned off in your Azure SQL servers. This is particularly useful for assessing potential vulnerabilities and ensuring optimal security practices. ```sql select @@ -47,6 +59,7 @@ where ``` ### List servers that have Advanced Threat Protection types set to All +Explore which Azure servers have their Advanced Threat Protection types set to 'All'. This is useful for assessing the security configuration of servers and identifying any potential vulnerabilities. ```sql select @@ -64,6 +77,7 @@ where ``` ### List servers that do not have an Active Directory admin set +Analyze your Azure SQL servers to identify those that lack an assigned Active Directory admin. This could be beneficial in pinpointing potential security vulnerabilities or compliance issues in your infrastructure. ```sql select @@ -76,6 +90,7 @@ where ``` ### List servers for which TDE protector is encrypted with the service-managed key +Explore which servers have their Transparent Data Encryption (TDE) protector encrypted with a service-managed key. This is useful for assessing the encryption status and understanding the key management scheme of your servers. ```sql select @@ -87,4 +102,4 @@ from jsonb_array_elements(encryption_protector) as encryption where encryption ->> 'kind' = 'servicemanaged'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_account.md b/docs/tables/azure_storage_account.md index a73a6e8a..a4a4c1e3 100644 --- a/docs/tables/azure_storage_account.md +++ b/docs/tables/azure_storage_account.md @@ -1,10 +1,20 @@ -# Table: azure_storage_account +--- +title: "Steampipe Table: azure_storage_account - Query Azure Storage Accounts using SQL" +description: "Allows users to query Azure Storage Accounts." +--- -An Azure storage account contains all of your Azure Storage data objects: blobs, files, queues, tables, and disks. +# Table: azure_storage_account - Query Azure Storage Accounts using SQL + +Azure Storage Account is a service provided by Microsoft Azure that offers highly scalable and secure data storage. It allows you to store and retrieve large amounts of unstructured data, such as documents and media files, and structured data, such as databases. Azure Storage Account supports different data types including blobs, files, queues, tables, and disks. + +## Table Usage Guide + +The 'azure_storage_account' table provides insights into Storage Accounts within Microsoft Azure. As a DevOps engineer, explore account-specific details through this table, including creation time, primary location, and associated metadata. Utilize it to uncover information about accounts, such as those with public access, the replication type, and the status of primary and secondary locations. The schema presents a range of attributes of the Storage Account for your analysis, like the account name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure storage accounts are in use, their associated SKU names and tiers, and their primary and secondary locations. This can help in understanding the distribution and classification of storage resources within your Azure environment. ```sql select @@ -18,6 +28,7 @@ from ``` ### List storage accounts with versioning disabled +Discover the segments that have disabled versioning within their storage accounts, enabling you to identify potential risks and ensure data recovery options. ```sql select @@ -30,6 +41,7 @@ where ``` ### List storage accounts with blob soft delete disabled +Explore which Azure storage accounts have the blob soft delete feature disabled. This is useful in identifying potential data loss risks, as these accounts do not have a recovery option for accidentally deleted blobs. ```sql select @@ -43,6 +55,7 @@ where ``` ### List storage accounts that allow blob public access +Explore which Azure storage accounts permit public access to blob data. This is useful for assessing potential security risks and ensuring appropriate access controls are in place. ```sql select @@ -55,6 +68,7 @@ where ``` ### List storage accounts with encryption in transit disabled +Explore which Azure storage accounts lack encryption in transit, a feature crucial for maintaining data security during transmission. This query is useful for identifying potential security vulnerabilities within your cloud storage infrastructure. ```sql select @@ -67,6 +81,7 @@ where ``` ### List storage accounts that do not have a cannot-delete lock +Analyze the settings to understand which storage accounts lack a 'cannot-delete' lock, therefore potentially posing a risk of accidental deletion. This query is useful in identifying areas that need improved security measures. ```sql select @@ -85,6 +100,7 @@ where ``` ### List storage accounts with queue logging enabled +Explore which Azure storage accounts have queue logging enabled for all actions, such as delete, read, and write. This is useful in monitoring activity and maintaining security within your storage accounts. ```sql select @@ -101,6 +117,7 @@ where ``` ### List storage accounts without lifecycle +Discover the storage accounts that lack a lifecycle management policy. This is useful for identifying areas where data retention and deletion policies may not be properly enforced, potentially leading to unnecessary storage costs or compliance issues. ```sql select @@ -113,6 +130,7 @@ where ``` ### List diagnostic settings details +Explore the diagnostic settings of your Azure storage accounts. This can help you better understand and manage the logging and monitoring capabilities of your storage resources. ```sql select @@ -123,6 +141,7 @@ from ``` ### List storage accounts with replication but unavailable secondary +Determine the areas in which storage accounts have replication enabled but the secondary is unavailable. This is useful to identify potential risks and ensure data redundancy in case of primary failure. ```sql select @@ -139,6 +158,7 @@ where ``` ### Get table properties of storage accounts +Explore the properties of your storage accounts to understand their configurations, such as logging settings and metrics, which can help in optimizing storage usage and improving data management practices. ```sql select diff --git a/docs/tables/azure_storage_blob.md b/docs/tables/azure_storage_blob.md index f855fd30..54e283bf 100644 --- a/docs/tables/azure_storage_blob.md +++ b/docs/tables/azure_storage_blob.md @@ -1,10 +1,20 @@ -# Table: azure_storage_blob +--- +title: "Steampipe Table: azure_storage_blob - Query Azure Storage Blobs using SQL" +description: "Allows users to query Azure Storage Blobs." +--- -Azure Blob Storage helps you create data lakes for your analytics needs and provides storage to build powerful cloud-native and mobile apps. Optimise costs with tiered storage for your long-term data and flexibly scale up for high-performance computing and machine learning workloads. +# Table: azure_storage_blob - Query Azure Storage Blobs using SQL + +Azure Storage Blobs are scalable, object storage for unstructured data. They are ideal for serving images or documents directly to a browser, storing files for distributed access, streaming video and audio, writing to log files, storing data for backup and restore, disaster recovery, and archiving. Azure Storage Blobs are accessible from anywhere in the world via HTTP or HTTPS. + +## Table Usage Guide + +The 'azure_storage_blob' table provides insights into the storage blobs within Azure Storage. As a DevOps engineer, explore blob-specific details through this table, including type, content settings, and associated metadata. Utilize it to uncover information about blobs, such as their lease status, server encrypted status, and the last modified date. The schema presents a range of attributes of the Azure Storage Blob for your analysis, like the blob name, creation date, content type, and associated tags. ## Examples ### Basic info +Explore the details of specific Azure storage blobs within a designated resource group, storage account, and region. This is useful for managing and organizing your data storage in Azure, particularly when dealing with large numbers of blobs. ```sql select @@ -23,6 +33,7 @@ where ``` ### List snapshot type blobs with import data +Discover the segments that contain snapshot type blobs with import data in a specific Azure storage account located in a certain region. This could be useful to assess the elements within a particular resource group for better data management and security compliance. ```sql select @@ -43,4 +54,4 @@ where and storage_account_name = 'mystorageaccount' and region = 'eastus' and is_snapshot; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_blob_service.md b/docs/tables/azure_storage_blob_service.md index 85978986..8f416c41 100644 --- a/docs/tables/azure_storage_blob_service.md +++ b/docs/tables/azure_storage_blob_service.md @@ -1,10 +1,20 @@ -# Table: azure_storage_blob_service +--- +title: "Steampipe Table: azure_storage_blob_service - Query Azure Storage Blob Services using SQL" +description: "Allows users to query Azure Blob Services." +--- -The properties of a storage account's Blob service endpoint, including properties for Storage Analytics, CORS (Cross-Origin Resource Sharing) rules and soft delete settings. +# Table: azure_storage_blob_service - Query Azure Storage Blob Services using SQL + +Azure Blob storage is a service for storing large amounts of unstructured object data, such as text or binary data, that can be accessed from anywhere in the world via HTTP or HTTPS. You can use Blob storage to expose data publicly to the world, or to store application data privately. Common uses of Blob storage include serving images or documents directly to a browser, storing files for distributed access, streaming video and audio, writing to log files, storing data for backup and restore, disaster recovery, and archiving. + +## Table Usage Guide + +The 'azure_storage_blob_service' table provides insights into Blob Services within Azure Storage. As a DevOps engineer, explore service-specific details through this table, including the status of blob services, the CORS rules in place, and associated metadata. Utilize it to uncover information about each blob service, such as its default service version, whether or not it supports HTTPS traffic only, and the last modified time. The schema presents a range of attributes of the blob service for your analysis, like the storage account name, resource group, and Azure region. ## Examples ### Basic info +Analyze the settings to understand the tier and region of your Azure storage accounts. This can help you manage resources and costs effectively. ```sql select @@ -18,6 +28,7 @@ from ``` ### List of storage blob service where delete retention policy is not enabled +Determine the areas in which the delete retention policy is not enabled for your Azure storage blob service. This query is useful for identifying potential vulnerabilities and maintaining data security within your storage services. ```sql select @@ -31,6 +42,7 @@ where ``` ### List of storage blob service where versioning is not enabled +Identify instances where Azure Blob Storage services do not have versioning enabled. This is useful for ensuring data recovery options are in place, as versioning allows restoration of previous versions of blobs in the event of accidental deletion or alteration. ```sql select @@ -44,6 +56,7 @@ where ``` ### CORS rules info for storage blob service +Explore the Cross-Origin Resource Sharing (CORS) rules for your Azure Storage Blob Service to understand the permissions and restrictions in place. This can help ensure secure data transactions and identify potential areas for security optimization. ```sql select diff --git a/docs/tables/azure_storage_container.md b/docs/tables/azure_storage_container.md index 98bf3d4f..fb790d98 100644 --- a/docs/tables/azure_storage_container.md +++ b/docs/tables/azure_storage_container.md @@ -1,10 +1,20 @@ -# Table: azure_storage_container +--- +title: "Steampipe Table: azure_storage_container - Query Azure Storage Containers using SQL" +description: "Allows users to query Azure Storage Containers." +--- -A container organizes a set of blobs, similar to a directory in a file system. A storage account can include an unlimited number of containers, and a container can store an unlimited number of blobs. +# Table: azure_storage_container - Query Azure Storage Containers using SQL + +Azure Storage Containers are a part of Azure Blob Storage, which provides scalable, secure, performance-efficient storage services in the cloud. The containers organize blobs in a similar way that directories organize files in a file system. They are useful in storing and managing data objects, such as text or binary data, which can be accessed from anywhere in the world via HTTP or HTTPS. + +## Table Usage Guide + +The 'azure_storage_container' table provides insights into Azure Storage Containers within Azure Blob Storage. As a DevOps engineer, explore container-specific details through this table, including metadata, properties, and associated storage account information. Utilize it to uncover information about containers, such as public access level, last modified time, and the lease status. The schema presents a range of attributes of the Azure Storage Container for your analysis, like the storage account name, resource group name, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure storage containers to identify their types and associated accounts. This could be beneficial for managing resources and ensuring correct account allocation. ```sql select @@ -17,6 +27,7 @@ from ``` ### List containers which are publicly accessible +Discover the segments that are publicly accessible within your Azure storage containers to ensure data privacy and security. This query is useful for identifying potential vulnerabilities and implementing necessary access control measures. ```sql select @@ -32,6 +43,7 @@ where ``` ### List containers with legal hold enabled +Explore which Azure storage containers have the legal hold feature enabled. This is useful for identifying instances where data preservation is enforced for compliance or litigation purposes. ```sql select @@ -47,6 +59,7 @@ where ``` ### List containers which are either leased or have a broken lease state +Explore which Azure storage containers are currently leased or have a broken lease state. This query is useful for managing resources and troubleshooting issues related to container leases. ```sql select @@ -63,6 +76,7 @@ where ``` ### List containers with infinite lease duration +Explore which Azure storage containers have been set with an unlimited lease duration. This can help in managing storage resources effectively and identifying areas that may require attention to prevent unnecessary storage consumption. ```sql select @@ -78,6 +92,7 @@ where ``` ### List containers with a remaining retention period of 7 days +Explore which Azure storage containers have a remaining retention period of exactly 7 days. This is useful for managing resources and planning ahead for storage needs or potential data loss. ```sql select @@ -93,6 +108,7 @@ where ``` ### List containers ImmutabilityPolicy details +Explore the immutability policy details of your Azure storage containers to understand their data preservation settings. This can help in maintaining data integrity and ensuring compliance with data retention policies. ```sql select diff --git a/docs/tables/azure_storage_queue.md b/docs/tables/azure_storage_queue.md index e0f63bc2..78f8afb7 100644 --- a/docs/tables/azure_storage_queue.md +++ b/docs/tables/azure_storage_queue.md @@ -1,10 +1,20 @@ -# Table: azure_storage_queue +--- +title: "Steampipe Table: azure_storage_queue - Query Azure Storage Queues using SQL" +description: "Allows users to query Azure Storage Queues, which provide reliable messaging for workflow processing and for communication between components of cloud services." +--- -Azure Queue Storage is a service for storing large numbers of messages which allows to access messages from anywhere in the world via authenticated calls using HTTP or HTTPS. +# Table: azure_storage_queue - Query Azure Storage Queues using SQL + +Azure Storage Queues offer a simple way for components of a distributed application to communicate asynchronously. They are a part of Azure's scalable and secure cloud storage solution, providing reliable messaging for workflow processing and for communication between components of cloud services. Azure Storage Queues support a set of advanced messaging features, making them ideal for building flexible and reliable applications. + +## Table Usage Guide + +The 'azure_storage_queue' table provides insights into Azure Storage Queues within Azure's cloud storage solution. As a DevOps engineer, you can explore queue-specific details through this table, including metadata, approximate message count, and associated storage account information. Utilize it to uncover information about your queues, such as their message retention period, visibility timeout, and whether they are enabled for logging or not. The schema presents a range of attributes of the storage queue for your analysis, like the queue name, resource group, and associated tags. ## Examples ### List of queues and their corresponding storage accounts +This query allows you to identify the storage accounts associated with each queue in your Azure environment and their geographical locations. It can be used to manage and organize resources more effectively by understanding where data is stored and how it is distributed across different regions. ```sql select @@ -17,6 +27,7 @@ from ### List of storage queues without owner tag key +Discover the segments that lack an 'owner' tag within your Azure application security groups. This could be useful for identifying potential security gaps or for maintaining consistent tagging practices. ```sql select diff --git a/docs/tables/azure_storage_share_file.md b/docs/tables/azure_storage_share_file.md index 10780318..66fa06b2 100644 --- a/docs/tables/azure_storage_share_file.md +++ b/docs/tables/azure_storage_share_file.md @@ -1,10 +1,20 @@ -# Table: azure_storage_share_file +--- +title: "Steampipe Table: azure_storage_share_file - Query Azure Storage File Shares using SQL" +description: "Allows users to query Azure Storage File Shares, providing details about each file stored within these resources." +--- -Azure Files is Microsoft's easy-to-use cloud file system. Azure file shares can be mounted in Windows, Linux, and macOS. +# Table: azure_storage_share_file - Query Azure Storage File Shares using SQL + +Azure Storage File Shares service is a feature of Azure Storage that allows you to create a serverless file share in the cloud. It provides highly available network file shares that can be accessed by using the standard Server Message Block (SMB) protocol. Azure File Shares can be used to replace or supplement on-premises file servers or NAS devices. + +## Table Usage Guide + +The 'azure_storage_share_file' table provides insights into the files stored within Azure Storage File Shares. As a DevOps engineer, explore file-specific details through this table, including the file's URL, content type, last modification time, and associated metadata. Utilize it to uncover information about each file, such as its size, type, and any lease status. The schema presents a range of attributes of the file for your analysis, like the file's Etag, content MD5, and whether it is a directory or not. ## Examples ### Basic info +Explore which storage shares are available in your Azure account, focusing on their types and capabilities. This can help you understand your storage utilization and optimize resource allocation. ```sql select @@ -19,6 +29,7 @@ from ``` ### List file shares with default access tier +Explore which file shares are set with a default access tier of 'TransactionOptimized'. This is useful for understanding how your storage is optimized for transactional workloads. ```sql select @@ -36,6 +47,7 @@ where ``` ### Get file share with maximum share quota +Analyze the settings to understand which file share has the largest quota within your Azure storage. This can be useful to determine where the majority of your storage resources are allocated. ```sql select @@ -49,4 +61,4 @@ select from azure_storage_share_file order by share_quota desc limit 1; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_sync.md b/docs/tables/azure_storage_sync.md index 41eefcf5..7a20320e 100644 --- a/docs/tables/azure_storage_sync.md +++ b/docs/tables/azure_storage_sync.md @@ -1,10 +1,20 @@ -# Table: azure_storage_sync +--- +title: "Steampipe Table: azure_storage_sync - Query Azure Storage Sync Services using SQL" +description: "Allows users to query Azure Storage Sync Services, which are used to synchronize files across multiple Azure File shares." +--- -Azure File Sync is a service that allows you to cache several Azure file shares on an on-premises Windows Server or cloud VM. +# Table: azure_storage_sync - Query Azure Storage Sync Services using SQL + +Azure Storage Sync Services is a feature within Microsoft Azure that allows you to synchronize files across multiple Azure File shares. It provides a centralized way to manage and synchronize files across different regions and offices. Azure Storage Sync Services helps you to keep your data close to where it is being used, irrespective of whether it's being used on-premises or in the cloud. + +## Table Usage Guide + +The 'azure_storage_sync' table provides insights into Azure Storage Sync Services within Microsoft Azure. As a DevOps engineer, explore service-specific details through this table, including the synchronization status, last synchronization time, and associated metadata. Utilize it to uncover information about storage sync services, such as those with synchronization issues, the relationships between different services, and the verification of synchronization health. The schema presents a range of attributes of the Azure Storage Sync Services for your analysis, like the service name, id, type, and associated tags. ## Examples ### Basic info +Explore the status and types of your Azure storage synchronization services. This can help in managing and monitoring your storage resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List storage sync which allows traffic through private endpoints only +Determine the areas in which your Azure storage sync is configured to allow traffic through private endpoints only. This is particularly useful for enhancing security by ensuring that network traffic is restricted to virtual networks only. ```sql select @@ -32,6 +43,7 @@ where ``` ### List private endpoint connection details for accounts +This query is useful for gaining insights into the details of private endpoint connections associated with your Azure storage sync accounts. It helps in analyzing the connection settings to understand the status and type of each connection, which can be critical for auditing and compliance purposes. ```sql select @@ -45,4 +57,4 @@ select from azure_storage_sync, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_table.md b/docs/tables/azure_storage_table.md index f49426ec..f682f47e 100644 --- a/docs/tables/azure_storage_table.md +++ b/docs/tables/azure_storage_table.md @@ -1,10 +1,20 @@ -# Table: azure_storage_table +--- +title: "Steampipe Table: azure_storage_table - Query Azure Storage Tables using SQL" +description: "Allows users to query Azure Storage Tables." +--- -Azure Table storage is a service that stores structured NoSQL data in the cloud, providing a key/attribute store with a schema less design. +# Table: azure_storage_table - Query Azure Storage Tables using SQL + +Azure Storage Tables are a service that stores structured NoSQL data in the cloud, providing a key/attribute store with a schema-less design. Because Table storage is schema-less, it's easy to adapt your data as the needs of your application evolve. Azure Table storage is now part of Azure Cosmos DB. + +## Table Usage Guide + +The 'azure_storage_table' table provides insights into Azure Storage Tables within Azure Storage Account service. As a DevOps engineer, explore table-specific details through this table, including the table name, resource group, and associated metadata. Utilize it to uncover information about tables, such as those with specific table names, the resource groups associated with the tables, and the region of storage. The schema presents a range of attributes of the Azure Storage Table for your analysis, like the table name, resource group, and region. ## Examples ### Basic info +Explore which Azure storage tables are currently in use across different regions and subscriptions. This can help manage resources more effectively by identifying where storage is allocated. ```sql select @@ -16,4 +26,4 @@ select subscription_id from azure_storage_table; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_table_service.md b/docs/tables/azure_storage_table_service.md index 4b564d93..debcd036 100644 --- a/docs/tables/azure_storage_table_service.md +++ b/docs/tables/azure_storage_table_service.md @@ -1,10 +1,20 @@ -# Table: azure_storage_table_service +--- +title: "Steampipe Table: azure_storage_table_service - Query Azure Storage Table Services using SQL" +description: "Allows users to query Azure Storage Table Services." +--- -The properties of a storage account’s Table service endpoint, including properties for Storage Analytics and CORS (Cross-Origin Resource Sharing) rules. +# Table: azure_storage_table_service - Query Azure Storage Table Services using SQL + +The Azure Storage Table service is a NoSQL datastore providing a key-attribute store with a schemaless design. This service allows users to store large amounts of structured data. The service is a non-relational data store that allows for rapid development and fast access to data by scaling as needed. + +## Table Usage Guide + +The 'azure_storage_table_service' table provides insights into Azure Storage Table Services. As a DevOps engineer, explore specific details about this service through this table, including the storage account name, resource group, and subscription ID. Utilize it to uncover information about the service, such as the CORS (Cross-Origin Resource Sharing) rules, hour metrics, minute metrics, and the retention policy. The schema presents a range of attributes of the Azure Storage Table Service for your analysis, like the storage account ID, CORS rules, hour metrics enabled status, minute metrics enabled status, and the retention policy days. ## Examples ### Basic info +Explore which storage services are being utilized in your Azure environment. This can help in managing resources and optimizing storage allocation across different regions and resource groups. ```sql select @@ -17,6 +27,7 @@ from ``` ### CORS rules info of each storage table service +Discover the segments that have specific Cross-Origin Resource Sharing (CORS) rules in each Azure storage table service. This can be useful in understanding the security measures in place for data access and transfer across different origins. ```sql select diff --git a/docs/tables/azure_stream_analytics_job.md b/docs/tables/azure_stream_analytics_job.md index f3a5eeda..bbeb6129 100644 --- a/docs/tables/azure_stream_analytics_job.md +++ b/docs/tables/azure_stream_analytics_job.md @@ -1,10 +1,20 @@ -# Table: azure_stream_analytics_job +--- +title: "Steampipe Table: azure_stream_analytics_job - Query Azure Stream Analytics Jobs using SQL" +description: "Allows users to query Azure Stream Analytics Jobs." +--- -An Azure Stream Analytics job consists of an input, query, and an output. Stream Analytics ingests data from Azure Event Hubs (including Azure Event Hubs from Apache Kafka), Azure IoT Hub, or Azure Blob Storage. The query, which is based on SQL query language, can be used to easily filter, sort, aggregate, and join streaming data over a period of time. +# Table: azure_stream_analytics_job - Query Azure Stream Analytics Jobs using SQL + +Azure Stream Analytics is a real-time analytics and complex event-processing engine that is designed to analyze and visualize streaming data in real-time. It provides users with the ability to set up real-time analytic computations on streaming data which can originate from various sources such as devices, sensors, websites, social media feeds, applications, infrastructure systems, and more. Azure Stream Analytics is designed to process and analyze data as it's ingested in real-time, and can handle high volumes of data from multiple sources simultaneously. + +## Table Usage Guide + +The 'azure_stream_analytics_job' table provides insights into Stream Analytics Jobs within Azure Stream Analytics. As a Data Engineer, explore job-specific details through this table, including job topology, transformation query, output details, and associated metadata. Utilize it to uncover information about jobs, such as those with their current state, the events processed, and the input and output of the job. The schema presents a range of attributes of the Stream Analytics Job for your analysis, like the job name, resource group, location, compatibility level, data locale, and job type. ## Examples ### Basic info +Explore which Azure Stream Analytics jobs are currently active or inactive, and identify their respective locations and subscription IDs. This information can be useful for auditing purposes or for managing and optimizing streaming jobs across different regions. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed stream analytics jobs +Identify instances where stream analytics jobs have failed in Azure. This can be useful for troubleshooting and understanding the areas that may require additional resources or configuration adjustments. ```sql select diff --git a/docs/tables/azure_subnet.md b/docs/tables/azure_subnet.md index 58ae4e44..ea655405 100644 --- a/docs/tables/azure_subnet.md +++ b/docs/tables/azure_subnet.md @@ -1,10 +1,20 @@ -# Table: azure_subnet +--- +title: "Steampipe Table: azure_subnet - Query Azure Virtual Networks Subnets using SQL" +description: "Allows users to query Azure Virtual Networks Subnets." +--- -A subnet is a range of IP addresses in the VNet. You can divide a VNet into multiple subnets for organization and security +# Table: azure_subnet - Query Azure Virtual Networks Subnets using SQL + +A subnet is a range within a virtual network where Azure resources like VMs and PaaS services can be deployed and accessed from the internet, other networks, and the internet. Subnets help to segment the virtual network into one or more sub-networks, providing a range of IP addresses, network security policies, and route tables. Each subnet in Azure is associated with a route table, which defines the rules for packet routing. + +## Table Usage Guide + +The 'azure_subnet' table provides insights into subnets within Azure Virtual Networks. As a DevOps engineer, explore subnet-specific details through this table, including IP configurations, network security group details, and associated metadata. Utilize it to uncover information about subnets, such as those with private endpoints, the associated route table, and the service endpoint policies. The schema presents a range of attributes of the subnet for your analysis, like the subnet ID, address prefix, associated network security group, and associated route table. ## Examples ### Virtual network and IP address range of each subnet +Analyze the settings to understand the relationship between your virtual network and IP address range for each subnet. This can help you effectively manage your network resources and ensure optimal performance and security. ```sql select @@ -18,6 +28,7 @@ from ``` ### Route table associated with each subnet +Explore which route tables are associated with each subnet in your Azure environment. This can help you understand and manage the routing of network traffic within your virtual network. ```sql select @@ -32,6 +43,7 @@ from ``` ### Network security group associated with each subnet +Explore which network security groups are linked to each Azure subnet. This is beneficial for understanding your network's security layout and identifying any potential vulnerabilities or misconfigurations. ```sql select @@ -43,6 +55,7 @@ from ``` ### Service endpoints info of each subnet +Explore which locations are associated with each subnet service in Azure. This can help in understanding the geographical distribution of your services and planning for potential regional expansion or redundancy. ```sql select @@ -52,4 +65,4 @@ select from azure_subnet cross join jsonb_array_elements(service_endpoints) as endpoint; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_subscription.md b/docs/tables/azure_subscription.md index ce75135d..fb3fddb3 100644 --- a/docs/tables/azure_subscription.md +++ b/docs/tables/azure_subscription.md @@ -1,10 +1,20 @@ -# Table: azure_subscription +--- +title: "Steampipe Table: azure_subscription - Query Azure Subscriptions using SQL" +description: "Allows users to query Azure Subscriptions." +--- -An Azure subscription is a logical container used to provision resources in Azure. +# Table: azure_subscription - Query Azure Subscriptions using SQL + +Azure Subscriptions represent a logical container for resources that are deployed within an Azure account. They provide a way to manage costs and resources where users can apply different policies and manage access control. Each Azure subscription can have a separate billing and payment setup, so you can have different subscriptions for different departments or projects. + +## Table Usage Guide + +The 'azure_subscription' table provides insights into subscriptions within Azure. As a DevOps engineer, explore subscription-specific details through this table, including subscription ID, name, and state, among others. Utilize it to uncover information about subscriptions, such as their current state, the tenant they belong to, and whether they are spending over their budget. The schema presents a range of attributes of the Azure subscription for your analysis, like the subscription ID, tenant ID, state, and location placement ID. ## Examples ### Basic info +Explore which Azure subscriptions are active and the policies associated with them. This can be helpful in managing resources and understanding the scope of your Azure environment. ```sql select @@ -17,4 +27,4 @@ select subscription_policies from azure_subscription; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_synapse_workspace.md b/docs/tables/azure_synapse_workspace.md index 16909748..9d10ff46 100644 --- a/docs/tables/azure_synapse_workspace.md +++ b/docs/tables/azure_synapse_workspace.md @@ -1,10 +1,20 @@ -# Table: azure_synapse_workspace +--- +title: "Steampipe Table: azure_synapse_workspace - Query Azure Synapse Analytics Workspaces using SQL" +description: "Allows users to query Azure Synapse Analytics Workspaces." +--- -Azure Synapse is an enterprise analytics service that accelerates time to insight across data warehouses and big data systems. Azure Synapse brings together the best of SQL technologies used in enterprise data warehousing, Spark technologies used for big data, Pipelines for data integration and ETL/ELT, and deep integration with other Azure services such as Power BI, CosmosDB, and AzureML. +# Table: azure_synapse_workspace - Query Azure Synapse Analytics Workspaces using SQL + +Azure Synapse Analytics is an integrated analytics service that accelerates time to insight across data warehouses and big data systems. It blends big data and data warehousing into an on-demand resource that brings together enterprise data warehousing and Big Data analytics. It gives you the freedom to query data on your terms, using either serverless or provisioned resources, at scale. + +## Table Usage Guide + +The 'azure_synapse_workspace' table provides insights into workspaces within Azure Synapse Analytics. As a data engineer or data scientist, explore workspace-specific details through this table, including managed private endpoints, managed private endpoint connections, and firewall settings. Utilize it to uncover information about workspaces, such as those with specific managed private endpoint settings, the firewall settings between workspaces, and the verification of managed private endpoint connections. The schema presents a range of attributes of the workspace for your analysis, like the workspace name, ID, type, and associated tags. ## Examples ### Basic info +Analyze the settings to understand the status and type of your Azure Synapse workspaces. This can be useful to manage and monitor your workspaces efficiently. ```sql select @@ -17,6 +27,7 @@ from ``` ### List synapse workspaces with public network access enabled +Discover the segments that have public network access enabled within Azure Synapse workspaces. This allows for a quick assessment of potential security risks and helps in maintaining secure configurations. ```sql select @@ -32,6 +43,7 @@ where ``` ### List synapse workspaces with user assigned identities +Determine the areas in which user-assigned identities are utilized within Azure Synapse workspaces. This is useful for managing access control and ensuring appropriate permissions are in place. ```sql select @@ -51,6 +63,7 @@ where ``` ### List private endpoint connection details for synapse workspaces +Explore the private endpoint connections of Synapse workspaces to understand the current state and any actions required. This is useful in managing and maintaining secure network connections in your data analytics environment. ```sql select @@ -68,6 +81,7 @@ from ``` ### List encryption details for synapse workspaces +Explore the encryption details for Synapse workspaces to gain insights into the security measures in place, including the status of the customer-managed key (CMK) and whether double encryption is enabled. This can help assess the security posture and compliance of your data workspaces. ```sql select @@ -79,4 +93,4 @@ select encryption -> 'DoubleEncryptionEnabled' as double_encryption_enabled from azure_synapse_workspace; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_tenant.md b/docs/tables/azure_tenant.md index 12a7f8b4..c8c209b0 100644 --- a/docs/tables/azure_tenant.md +++ b/docs/tables/azure_tenant.md @@ -1,10 +1,20 @@ -# Table: azure_tenant +--- +title: "Steampipe Table: azure_tenant - Query Azure Tenants using SQL" +description: "Allows users to query Azure Tenants for comprehensive data on the tenant's details, including tenant ID, domains, and display name." +--- -A dedicated and trusted instance of Azure AD that's automatically created when your organization signs up for a Microsoft cloud service subscription, such as Microsoft Azure, Microsoft Intune, or Microsoft 365. An Azure tenant represents a single organization. +# Table: azure_tenant - Query Azure Tenants using SQL + +Azure Tenant refers to an organization's dedicated and isolated instance of Microsoft Azure that is automatically created when an organization signs up for a Microsoft cloud service subscription. Azure Tenants serve as dedicated, isolated containers for all of an organization's Azure resources, and provide a secure environment where an organization can store and manage its resources. + +## Table Usage Guide + +The 'azure_tenant' table provides insights into Azure Tenants within Microsoft Azure. As a DevOps engineer, explore tenant-specific details through this table, including tenant ID, domains, and display name. Utilize it to uncover information about tenants, such as those with specific domains, the tenant's display name, and the verification of tenant IDs. The schema presents a range of attributes of the Azure Tenant for your analysis, like the tenant ID, domains, and display name. ## Examples ### Basic info +Explore the basic details of your Azure tenants, including their names, IDs, categories, locations, and associated domains. This can be useful for gaining a high-level overview of your Azure environment, and for identifying areas for potential optimization or consolidation. ```sql select @@ -18,4 +28,4 @@ select domains from azure_tenant; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_virtual_network.md b/docs/tables/azure_virtual_network.md index 5048a65a..0e4632bf 100644 --- a/docs/tables/azure_virtual_network.md +++ b/docs/tables/azure_virtual_network.md @@ -1,10 +1,20 @@ -# Table: azure_virtual_network +--- +title: "Steampipe Table: azure_virtual_network - Query Azure Virtual Networks using SQL" +description: "Allows users to query Azure Virtual Networks." +--- -A virtual network is a network where all devices, servers, virtual machines, and data centers that are connected are done so through software and wireless technology. +# Table: azure_virtual_network - Query Azure Virtual Networks using SQL + +Azure Virtual Networks (VNet) is a fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the internet, and on-premises networks. VNet is similar to a traditional network that you'd operate in your own data center, but brings with it additional benefits of Azure's infrastructure, such as scale, availability, and isolation. + +## Table Usage Guide + +The 'azure_virtual_network' table provides insights into Virtual Networks within Azure. As a DevOps engineer, explore network-specific details through this table, including address spaces, DNS servers, and associated subnets. Utilize it to uncover information about networks, such as those with certain security rules, the associated subnets, and the verification of DNS servers. The schema presents a range of attributes of the Virtual Network for your analysis, like the network ID, creation date, associated subnets, and associated tags. ## Examples ### List of virtual networks where DDoS(Distributed Denial of Service attacks) Protection is not enabled +Explore the virtual networks that lack protection against Distributed Denial of Service (DDoS) attacks. This allows for the identification of potential network vulnerabilities and aids in strengthening security measures. ```sql select @@ -19,6 +29,7 @@ where ``` ### CIDR list for each virtual network +Explore which address blocks are associated with each virtual network in Azure. This can help you understand the network structure and manage IP address allocation efficiently. ```sql select @@ -29,6 +40,7 @@ from ``` ### List VPCs with public CIDR blocks +Determine the areas in which Azure Virtual Networks are configured with public CIDR blocks, allowing you to assess potential exposure to the internet and take necessary security measures. ```sql select @@ -47,6 +59,7 @@ where ### Subnet details associated with the virtual network +Explore the configuration of your virtual network to understand the details of associated subnets. This can help in managing network policies, service endpoints, and routing tables efficiently. ```sql select @@ -60,4 +73,4 @@ select from azure_virtual_network cross join jsonb_array_elements(subnets) as subnet; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_virtual_network_gateway.md b/docs/tables/azure_virtual_network_gateway.md index 19f3ced8..f52b5f71 100644 --- a/docs/tables/azure_virtual_network_gateway.md +++ b/docs/tables/azure_virtual_network_gateway.md @@ -1,10 +1,20 @@ -# Table: azure_virtual_network_gateway +--- +title: "Steampipe Table: azure_virtual_network_gateway - Query Azure Virtual Network Gateways using SQL" +description: "Allows users to query Azure Virtual Network Gateways" +--- -A virtual network gateway is used to establish secure, cross-premises connectivity. +# Table: azure_virtual_network_gateway - Query Azure Virtual Network Gateways using SQL + +Azure Virtual Network Gateway is a component that provides a point-to-point network connection from an Azure virtual network to an on-premises location over the public internet. It can also be used to send encrypted traffic between an Azure virtual network and an on-premises location over a VPN tunnel, or to route traffic between virtual networks. + +## Table Usage Guide + +The 'azure_virtual_network_gateway' table provides insights into Virtual Network Gateways within Azure. As a DevOps engineer, explore gateway-specific details through this table, including gateway type, VPN type, and associated metadata. Utilize it to uncover information about gateways, such as their active-active status, the private IP allocated to the gateway, and the verification of gateway SKU. The schema presents a range of attributes of the Virtual Network Gateway for your analysis, like the gateway name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure Virtual Network Gateway to gain insights into settings such as BGP status and regional distribution. This can be useful in assessing network performance and identifying areas for optimization. ```sql select @@ -18,6 +28,7 @@ from ``` ### List network gateways with no connections +Determine the areas in which network gateways are not connected in your Azure virtual network. This can help identify potential network vulnerabilities or inefficiencies. ```sql select @@ -30,4 +41,4 @@ from azure_virtual_network_gateway where gateway_connections is null; -``` +``` \ No newline at end of file diff --git a/go.mod b/go.mod index 17fde63a..ed066abc 100644 --- a/go.mod +++ b/go.mod @@ -4,6 +4,7 @@ go 1.21 require ( github.com/Azure/azure-sdk-for-go v58.0.0+incompatible + github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1 github.com/Azure/azure-sdk-for-go/sdk/data/aztables v1.0.1 github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/recoveryservices/armrecoveryservicesbackup/v3 v3.0.0 github.com/Azure/azure-storage-blob-go v0.12.0 @@ -13,18 +14,17 @@ require ( github.com/Azure/go-autorest/autorest/date v0.3.0 github.com/tombuildsstuff/giovanni v0.15.1 github.com/turbot/go-kit v0.8.0-rc.0 - github.com/turbot/steampipe-plugin-sdk/v5 v5.6.2 + github.com/turbot/steampipe-plugin-sdk/v5 v5.7.0 ) require ( - cloud.google.com/go v0.110.4 // indirect - cloud.google.com/go/compute v1.21.0 // indirect + cloud.google.com/go v0.110.7 // indirect + cloud.google.com/go/compute v1.23.0 // indirect cloud.google.com/go/compute/metadata v0.2.3 // indirect cloud.google.com/go/iam v1.1.1 // indirect cloud.google.com/go/storage v1.30.1 // indirect github.com/Azure/azure-pipeline-go v0.2.3 // indirect github.com/Azure/azure-sdk-for-go/sdk/azcore v1.7.1 // indirect - github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1 // indirect github.com/Azure/azure-sdk-for-go/sdk/internal v1.3.0 // indirect github.com/Azure/go-autorest v14.2.0+incompatible // indirect github.com/Azure/go-autorest/autorest/adal v0.9.10 // indirect @@ -33,7 +33,6 @@ require ( github.com/Azure/go-autorest/logger v0.2.0 // indirect github.com/Azure/go-autorest/tracing v0.6.0 // indirect github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1 // indirect - github.com/XiaoMi/pegasus-go-client v0.0.0-20210427083443-f3b6b08bc4c2 // indirect github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d // indirect github.com/agext/levenshtein v1.2.2 // indirect github.com/allegro/bigcache/v3 v3.1.0 // indirect @@ -41,33 +40,33 @@ require ( github.com/aws/aws-sdk-go v1.44.122 // indirect github.com/beorn7/perks v1.0.1 // indirect github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d // indirect - github.com/bradfitz/gomemcache v0.0.0-20221031212613-62deef7fc822 // indirect github.com/btubbs/datetime v0.1.1 // indirect github.com/cenkalti/backoff/v4 v4.2.1 // indirect github.com/cespare/xxhash/v2 v2.2.0 // indirect github.com/danwakefield/fnmatch v0.0.0-20160403171240-cbb64ac3d964 // indirect github.com/davecgh/go-spew v1.1.1 // indirect github.com/dgraph-io/ristretto v0.1.1 // indirect - github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f // indirect github.com/dimchansky/utfbom v1.1.1 // indirect github.com/dustin/go-humanize v1.0.0 // indirect - github.com/eko/gocache/v3 v3.1.2 // indirect + github.com/eko/gocache/lib/v4 v4.1.5 // indirect + github.com/eko/gocache/store/bigcache/v4 v4.2.1 // indirect + github.com/eko/gocache/store/ristretto/v4 v4.2.1 // indirect github.com/fatih/color v1.15.0 // indirect github.com/form3tech-oss/jwt-go v3.2.2+incompatible // indirect github.com/fsnotify/fsnotify v1.6.0 // indirect github.com/gertd/go-pluralize v0.2.1 // indirect github.com/ghodss/yaml v1.0.0 // indirect - github.com/go-logr/logr v1.2.4 // indirect + github.com/go-logr/logr v1.3.0 // indirect github.com/go-logr/stdr v1.2.2 // indirect - github.com/go-redis/redis/v8 v8.11.5 // indirect github.com/gofrs/uuid v4.0.0+incompatible // indirect github.com/golang-jwt/jwt/v5 v5.0.0 // indirect - github.com/golang/glog v1.1.0 // indirect + github.com/golang/glog v1.1.2 // indirect github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect + github.com/golang/mock v1.6.0 // indirect github.com/golang/protobuf v1.5.3 // indirect - github.com/google/go-cmp v0.5.9 // indirect + github.com/google/go-cmp v0.6.0 // indirect github.com/google/s2a-go v0.1.4 // indirect - github.com/google/uuid v1.3.0 // indirect + github.com/google/uuid v1.3.1 // indirect github.com/googleapis/enterprise-certificate-proxy v0.2.3 // indirect github.com/googleapis/gax-go/v2 v2.11.0 // indirect github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 // indirect @@ -77,7 +76,7 @@ require ( github.com/hashicorp/go-plugin v1.5.2 // indirect github.com/hashicorp/go-safetemp v1.0.0 // indirect github.com/hashicorp/go-version v1.6.0 // indirect - github.com/hashicorp/hcl/v2 v2.18.0 // indirect + github.com/hashicorp/hcl/v2 v2.19.1 // indirect github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d // indirect github.com/iancoleman/strcase v0.3.0 // indirect github.com/jmespath/go-jmespath v0.4.0 // indirect @@ -94,7 +93,6 @@ require ( github.com/mitchellh/mapstructure v1.5.0 // indirect github.com/oklog/run v1.0.0 // indirect github.com/olekukonko/tablewriter v0.0.5 // indirect - github.com/pegasus-kv/thrift v0.13.0 // indirect github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 // indirect github.com/pkg/errors v0.9.1 // indirect github.com/pmezard/go-difflib v1.0.0 // indirect @@ -104,44 +102,38 @@ require ( github.com/prometheus/procfs v0.8.0 // indirect github.com/rivo/uniseg v0.2.0 // indirect github.com/sethvargo/go-retry v0.2.4 // indirect - github.com/sirupsen/logrus v1.9.0 // indirect - github.com/spf13/cast v1.5.0 // indirect github.com/stevenle/topsort v0.2.0 // indirect github.com/stretchr/testify v1.8.4 // indirect github.com/tkrajina/go-reflector v0.5.6 // indirect github.com/ulikunitz/xz v0.5.10 // indirect github.com/zclconf/go-cty v1.14.0 // indirect go.opencensus.io v0.24.0 // indirect - go.opentelemetry.io/otel v1.17.0 // indirect - go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.17.0 // indirect + go.opentelemetry.io/otel v1.21.0 // indirect go.opentelemetry.io/otel/exporters/otlp/otlpmetric v0.40.0 // indirect go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v0.40.0 // indirect - go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.16.0 // indirect - go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.16.0 // indirect - go.opentelemetry.io/otel/metric v1.17.0 // indirect - go.opentelemetry.io/otel/sdk v1.17.0 // indirect + go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.21.0 // indirect + go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.21.0 // indirect + go.opentelemetry.io/otel/metric v1.21.0 // indirect + go.opentelemetry.io/otel/sdk v1.21.0 // indirect go.opentelemetry.io/otel/sdk/metric v0.40.0 // indirect - go.opentelemetry.io/otel/trace v1.17.0 // indirect + go.opentelemetry.io/otel/trace v1.21.0 // indirect go.opentelemetry.io/proto/otlp v1.0.0 // indirect - golang.org/x/crypto v0.12.0 // indirect + golang.org/x/crypto v0.14.0 // indirect golang.org/x/exp v0.0.0-20230522175609-2e198f4a06a1 // indirect - golang.org/x/net v0.14.0 // indirect - golang.org/x/oauth2 v0.10.0 // indirect - golang.org/x/sync v0.3.0 // indirect - golang.org/x/sys v0.11.0 // indirect - golang.org/x/text v0.12.0 // indirect + golang.org/x/net v0.17.0 // indirect + golang.org/x/oauth2 v0.11.0 // indirect + golang.org/x/sync v0.5.0 // indirect + golang.org/x/sys v0.14.0 // indirect + golang.org/x/text v0.13.0 // indirect golang.org/x/time v0.3.0 // indirect golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect google.golang.org/api v0.126.0 // indirect google.golang.org/appengine v1.6.7 // indirect - google.golang.org/genproto v0.0.0-20230711160842-782d3b101e98 // indirect - google.golang.org/genproto/googleapis/api v0.0.0-20230711160842-782d3b101e98 // indirect - google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98 // indirect - google.golang.org/grpc v1.58.2 // indirect + google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d // indirect + google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d // indirect + google.golang.org/genproto/googleapis/rpc v0.0.0-20230822172742-b8732ec3820d // indirect + google.golang.org/grpc v1.59.0 // indirect google.golang.org/protobuf v1.31.0 // indirect - gopkg.in/natefinch/lumberjack.v2 v2.0.0 // indirect - gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect - k8s.io/apimachinery v0.25.3 // indirect ) diff --git a/go.sum b/go.sum index 68b45d0b..c5199075 100644 --- a/go.sum +++ b/go.sum @@ -30,8 +30,8 @@ cloud.google.com/go v0.100.2/go.mod h1:4Xra9TjzAeYHrl5+oeLlzbM2k3mjVhZh4UqTZ//w9 cloud.google.com/go v0.102.0/go.mod h1:oWcCzKlqJ5zgHQt9YsaeTY9KzIvjyy0ArmiBUgpQ+nc= cloud.google.com/go v0.102.1/go.mod h1:XZ77E9qnTEnrgEOvr4xzfdX5TRo7fB4T2F4O6+34hIU= cloud.google.com/go v0.104.0/go.mod h1:OO6xxXdJyvuJPcEPBLN9BJPD+jep5G1+2U5B5gkRYtA= -cloud.google.com/go v0.110.4 h1:1JYyxKMN9hd5dR2MYTPWkGUgcoxVVhg0LKNKEo0qvmk= -cloud.google.com/go v0.110.4/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI= +cloud.google.com/go v0.110.7 h1:rJyC7nWRg2jWGZ4wSJ5nY65GTdYJkg0cd/uXb+ACI6o= +cloud.google.com/go v0.110.7/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI= cloud.google.com/go/aiplatform v1.22.0/go.mod h1:ig5Nct50bZlzV6NvKaTwmplLLddFx0YReh9WfTO5jKw= cloud.google.com/go/aiplatform v1.24.0/go.mod h1:67UUvRBKG6GTayHKV8DBv2RtR1t93YRu5B1P3x99mYY= cloud.google.com/go/analytics v0.11.0/go.mod h1:DjEWCu41bVbYcKyvlws9Er60YE4a//bK6mnhWvQeFNI= @@ -68,8 +68,8 @@ cloud.google.com/go/compute v1.6.0/go.mod h1:T29tfhtVbq1wvAPo0E3+7vhgmkOYeXjhFvz cloud.google.com/go/compute v1.6.1/go.mod h1:g85FgpzFvNULZ+S8AYq87axRKuf2Kh7deLqV/jJ3thU= cloud.google.com/go/compute v1.7.0/go.mod h1:435lt8av5oL9P3fv1OEzSbSUe+ybHXGMPQHHZWZxy9U= cloud.google.com/go/compute v1.10.0/go.mod h1:ER5CLbMxl90o2jtNbGSbtfOpQKR0t15FOtRsugnLrlU= -cloud.google.com/go/compute v1.21.0 h1:JNBsyXVoOoNJtTQcnEY5uYpZIbeCTYIeDe0Xh1bySMk= -cloud.google.com/go/compute v1.21.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM= +cloud.google.com/go/compute v1.23.0 h1:tP41Zoavr8ptEqaW6j+LQOnyBBhO7OkOMAGrgLopTwY= +cloud.google.com/go/compute v1.23.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM= cloud.google.com/go/compute/metadata v0.2.3 h1:mg4jlk7mCAj6xXp9UJ4fjI9VUI5rubuGBW5aJ7UnBMY= cloud.google.com/go/compute/metadata v0.2.3/go.mod h1:VAV5nSsACxMJvgaAuX6Pk2AawlZn8kiOGuCv6gTkwuA= cloud.google.com/go/containeranalysis v0.5.1/go.mod h1:1D92jd8gRR/c0fGMlymRgxWD3Qw9C1ff6/T7mLgVL8I= @@ -234,15 +234,9 @@ github.com/Azure/go-autorest/tracing v0.6.0 h1:TYi4+3m5t6K48TGI9AUdb+IzbnSxvnvUM github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1 h1:WpB/QDNLpMw72xHJc34BNNykqSOeEJDAWkhf0u12/Jk= github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1/go.mod h1:wP83P5OoQ5p6ip3ScPr0BAq0BvuPAvacpEuSzyouqAI= -github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= -github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ= github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= -github.com/PuerkitoBio/purell v1.0.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= -github.com/PuerkitoBio/urlesc v0.0.0-20160726150825-5bd2802263f2/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE= -github.com/XiaoMi/pegasus-go-client v0.0.0-20210427083443-f3b6b08bc4c2 h1:pami0oPhVosjOu/qRHepRmdjD6hGILF7DBr+qQZeP10= -github.com/XiaoMi/pegasus-go-client v0.0.0-20210427083443-f3b6b08bc4c2/go.mod h1:jNIx5ykW1MroBuaTja9+VpglmaJOUzezumfhLlER3oY= github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d h1:licZJFw2RwpHMqeKTCYkitsPqHNxTmd4SNR5r94FGM8= github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d/go.mod h1:asat636LX7Bqt5lYEZ27JNDcqxfjdBQuJ/MM4CN/Lzo= github.com/agext/levenshtein v1.2.2 h1:0S/Yg6LYmFJ5stwQeRp6EeOcCbj7xiqQSdNelsXvaqE= @@ -267,13 +261,10 @@ github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM= github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw= github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d h1:xDfNPAt8lFiC1UJrqV3uuy861HCTo708pDMbjHHdCas= github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d/go.mod h1:6QX/PXZ00z/TKoufEY6K/a0k6AhaJrQKdFe6OfVXsa4= -github.com/bradfitz/gomemcache v0.0.0-20221031212613-62deef7fc822 h1:hjXJeBcAMS1WGENGqDpzvmgS43oECTx8UXq31UBu0Jw= -github.com/bradfitz/gomemcache v0.0.0-20221031212613-62deef7fc822/go.mod h1:H0wQNHz2YrLsuXOZozoeDmnHXkNCRmMW0gwFWDfEZDA= github.com/btubbs/datetime v0.1.1 h1:KuV+F9tyq/hEnezmKZNGk8dzqMVsId6EpFVrQCfA3To= github.com/btubbs/datetime v0.1.1/go.mod h1:n2BZ/2ltnRzNiz27aE3wUb2onNttQdC+WFxAoks5jJM= github.com/bufbuild/protocompile v0.4.0 h1:LbFKd2XowZvQ/kajzguUp2DC9UEIQhIq77fZZlaQsNA= github.com/bufbuild/protocompile v0.4.0/go.mod h1:3v93+mbWn/v3xzN+31nwkJfrEpAUwp+BagBSZWx+TP8= -github.com/cenkalti/backoff/v4 v4.1.0/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw= github.com/cenkalti/backoff/v4 v4.2.1 h1:y4OZtCnogmCPw98Zjyt5a6+QwPLGkiQsYW5oUqylYbM= github.com/cenkalti/backoff/v4 v4.2.1/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE= github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= @@ -296,11 +287,8 @@ github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWH github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20211001041855-01bcc9b48dfe/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= -github.com/coocood/freecache v1.2.3 h1:lcBwpZrwBZRZyLk/8EMyQVXRiFl663cCuMOrjCALeto= -github.com/coocood/freecache v1.2.3/go.mod h1:RBUWa/Cy+OHdfTGFEhEuE1pMCMX51Ncizj7rthiQ3vk= github.com/danwakefield/fnmatch v0.0.0-20160403171240-cbb64ac3d964 h1:y5HC9v93H5EPKqaS1UYVg1uYah5Xf51mBfIoWehClUQ= github.com/danwakefield/fnmatch v0.0.0-20160403171240-cbb64ac3d964/go.mod h1:Xd9hchkHSWYkEqJwUGisez3G1QY8Ryz0sdWrLPMGjLk= -github.com/davecgh/go-spew v0.0.0-20151105211317-5215b55f46b2/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= @@ -309,20 +297,19 @@ github.com/dgraph-io/ristretto v0.1.1/go.mod h1:S1GPSBCYCIhmVNfcth17y2zZtQT6wzkz github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= github.com/dgryski/go-farm v0.0.0-20190423205320-6a90982ecee2 h1:tdlZCpZ/P9DhczCTSixgIKmwPv6+wP5DGjqLYw5SUiA= github.com/dgryski/go-farm v0.0.0-20190423205320-6a90982ecee2/go.mod h1:SqUrOPUnsFjfmXRMNPybcSiG0BgUW2AuFH8PAnS2iTw= -github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78= -github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc= github.com/dimchansky/utfbom v1.1.0/go.mod h1:rO41eb7gLfo8SF1jd9F8HplJm1Fewwi4mQvIirEdv+8= github.com/dimchansky/utfbom v1.1.1 h1:vV6w1AhK4VMnhBno/TPVCoK9U/LP0PkLCS9tbxHdi/U= github.com/dimchansky/utfbom v1.1.1/go.mod h1:SxdoEBH5qIqFocHMyGOXVAybYJdr71b1Q/j0mACtrfE= -github.com/dnaeon/go-vcr v1.1.0 h1:ReYa/UBrRyQdant9B4fNHGoCNKw6qh6P0fsdGmZpR7c= -github.com/dnaeon/go-vcr v1.1.0/go.mod h1:M7tiix8f0r6mKKJ3Yq/kqU1OYf3MnfmBWVbPx/yU9ko= -github.com/docker/spdystream v0.0.0-20160310174837-449fdfce4d96/go.mod h1:Qh8CwZgvJUkLughtfhJv5dyTYa91l1fOUCrgjqmcifM= +github.com/dnaeon/go-vcr v1.2.0 h1:zHCHvJYTMh1N7xnV7zf1m1GPBF9Ad0Jk/whtQ1663qI= +github.com/dnaeon/go-vcr v1.2.0/go.mod h1:R4UdLID7HZT3taECzJs4YgbbH6PIGXB6W/sc5OLb6RQ= github.com/dustin/go-humanize v1.0.0 h1:VSnTsYCnlFHaM2/igO1h6X3HA71jcobQuxemgkq4zYo= github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= -github.com/eko/gocache/v3 v3.1.2 h1:tBAn5kBScEmRXWHJl0iJgJU7TsMeOjySwHDZ/92riqg= -github.com/eko/gocache/v3 v3.1.2/go.mod h1:92prWCVTLxRkRlZuxDkLkwwUfitZ60zKNi6kn3qiDNU= -github.com/elazarl/goproxy v0.0.0-20170405201442-c4fc26588b6e/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc= -github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= +github.com/eko/gocache/lib/v4 v4.1.5 h1:CeMQmdIzwBKKLRjk3FCDXzNFsQTyqJ01JLI7Ib0C9r8= +github.com/eko/gocache/lib/v4 v4.1.5/go.mod h1:XaNfCwW8KYW1bRZ/KoHA1TugnnkMz0/gT51NDIu7LSY= +github.com/eko/gocache/store/bigcache/v4 v4.2.1 h1:xf9R5HZqmrfT4+NzlJPQJQUWftfWW06FHbjz4IEjE08= +github.com/eko/gocache/store/bigcache/v4 v4.2.1/go.mod h1:Q9+hxUE+XUVGSRGP1tqW8sPHcZ50PfyBVh9VKh0OjrA= +github.com/eko/gocache/store/ristretto/v4 v4.2.1 h1:xB5E1LP1gh8yUV1G3KVRSL4T0OTnxp4OixuTljn2848= +github.com/eko/gocache/store/ristretto/v4 v4.2.1/go.mod h1:KyshDyWQqfSVrg2rH06fFQZTj6vG2fxlY7oAW9oxNHY= github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= @@ -333,23 +320,16 @@ github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.m github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0= github.com/envoyproxy/go-control-plane v0.10.2-0.20220325020618-49ff273808a1/go.mod h1:KJwIaB5Mv44NWtYuAOFCVOjcI94vtpEz2JU/D2v6IjE= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= -github.com/evanphx/json-patch v4.2.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4= github.com/fatih/color v1.13.0/go.mod h1:kLAiJbzzSOZDVNGyDpeOxJ47H46qBXwg5ILebYFFOfk= github.com/fatih/color v1.15.0 h1:kOqh6YHBtK8aywxGerMG2Eq3H6Qgoqeo13Bk2Mv/nBs= github.com/fatih/color v1.15.0/go.mod h1:0h5ZqXfHYED7Bhv2ZJamyIOUej9KtShiJESRwBDUSsw= github.com/form3tech-oss/jwt-go v3.2.2+incompatible h1:TcekIExNqud5crz4xD2pavyTgWiPvpYe4Xau31I0PRk= github.com/form3tech-oss/jwt-go v3.2.2+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k= -github.com/fortytw2/leaktest v1.3.0 h1:u8491cBMTQ8ft8aeV+adlcytMZylmA5nnwwkRZjI8vw= -github.com/fortytw2/leaktest v1.3.0/go.mod h1:jDsjWgpAGjm2CA7WthBh/CdZYEPF31XHquHwclZch5g= -github.com/frankban/quicktest v1.14.3 h1:FJKSZTDHjyhriyC81FLQ0LY93eSai0ZyR/ZIkd3ZUKE= -github.com/frankban/quicktest v1.14.3/go.mod h1:mgiwOwqx65TmIk1wJ6Q7wvnVMocbUorkibMOrVTHZps= -github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo= github.com/fsnotify/fsnotify v1.6.0 h1:n+5WquG0fcWoWp6xPWfHdbskMCQaFnG6PfBrh1Ky4HY= github.com/fsnotify/fsnotify v1.6.0/go.mod h1:sl3t1tCWJFWoRz9R8WJCbQihKKwmorjAbSClcnxKAGw= github.com/gertd/go-pluralize v0.2.1 h1:M3uASbVjMnTsPb0PNqg+E/24Vwigyo/tvyMTtAlLgiA= github.com/gertd/go-pluralize v0.2.1/go.mod h1:rbYaKDbsXxmRfr8uygAEKhOWsjyrrqrkHVpZvoOp8zk= -github.com/ghodss/yaml v0.0.0-20150909031657-73d445a93680/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= @@ -363,32 +343,22 @@ github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9 github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A= github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs= -github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas= github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A= -github.com/go-logr/logr v1.2.4 h1:g01GSCwiDw2xSZfjJ2/T9M+S6pFdcNtFYsp+Y43HYDQ= -github.com/go-logr/logr v1.2.4/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A= +github.com/go-logr/logr v1.3.0 h1:2y3SDp0ZXuc6/cjLSZ+Q3ir+QB9T/iG5yYRXqsagWSY= +github.com/go-logr/logr v1.3.0/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY= github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag= github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE= -github.com/go-openapi/jsonpointer v0.0.0-20160704185906-46af16f9f7b1/go.mod h1:+35s3my2LFTysnkMfxsJBAMHj/DoqoB9knIWoYG/Vk0= -github.com/go-openapi/jsonreference v0.0.0-20160704190145-13c6e3589ad9/go.mod h1:W3Z9FmVs9qj+KR4zFKmDPGiLdk1D9Rlm7cyMvf57TTg= -github.com/go-openapi/spec v0.0.0-20160808142527-6aced65f8501/go.mod h1:J8+jY1nAiCcj+friV/PDoE1/3eeccG9LYBs0tYvLOWc= -github.com/go-openapi/swag v0.0.0-20160704191624-1d0bd113de87/go.mod h1:DXUve3Dpr1UfpPtxFw+EFuQ41HhCWZfha5jSVRG7C7I= -github.com/go-redis/redis/v8 v8.11.5 h1:AcZZR7igkdvfVmQTPnu9WE37LRrO/YrBH5zWyjDC0oI= -github.com/go-redis/redis/v8 v8.11.5/go.mod h1:gREzHqY1hg6oD9ngVRbLStwAWKhA0FEgq8Jd4h5lpwo= github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY= github.com/go-test/deep v1.0.3 h1:ZrJSEWsXzPOxaZnFteGEfooLba+ju3FYIbOrS+rQd68= github.com/go-test/deep v1.0.3/go.mod h1:wGDj63lr65AM2AQyKZd/NYHGb0R+1RLqB8NKt3aSFNA= github.com/gofrs/uuid v4.0.0+incompatible h1:1SD/1F5pU8p29ybwgQSwpQk+mwdRrXCYuPhW6m+TnJw= github.com/gofrs/uuid v4.0.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM= github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= -github.com/gogo/protobuf v1.2.2-0.20190723190241-65acae22fc9d/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= -github.com/golang-jwt/jwt v3.2.1+incompatible h1:73Z+4BJcrTC+KczS6WvTPvRGOp1WmfEP4Q1lOd9Z/+c= github.com/golang-jwt/jwt/v5 v5.0.0 h1:1n1XNM9hk7O9mnQoNBGolZvzebBQ7p93ULHRc28XJUE= github.com/golang-jwt/jwt/v5 v5.0.0/go.mod h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk= github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= -github.com/golang/glog v1.1.0 h1:/d3pCKDPWNnvIWe0vVUpNP32qc8U3PDVxySP/y360qE= -github.com/golang/glog v1.1.0/go.mod h1:pfYeQZ3JWZoXTV5sFc986z3HTpwQs9At6P4ImfuP3NQ= -github.com/golang/groupcache v0.0.0-20160516000752-02826c3e7903/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/glog v1.1.2 h1:DVjP2PbBOzHyzA+dn3WhHIq4NdVu3Q+pvivFICf/7fo= +github.com/golang/glog v1.1.2/go.mod h1:zR+okUeTbrL6EL3xHUDxZuEtGv04p5shwip1+mL/rLQ= github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= @@ -404,7 +374,6 @@ github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71 github.com/golang/mock v1.5.0/go.mod h1:CWnOUgYIOo4TcNZ0wHX3YZCqsaM1I1Jvs6v3mP3KVu8= github.com/golang/mock v1.6.0 h1:ErTB+efbowRARo13NNdxyJji2egdxLGQhRaY+DUumQc= github.com/golang/mock v1.6.0/go.mod h1:p6yTPP+5HYm5mzsMV8JkE6ZKdX+/wYM6Hr+LicevLPs= -github.com/golang/protobuf v0.0.0-20161109072736-4bd1920723d7/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= @@ -441,9 +410,9 @@ github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/ github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE= github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= -github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38= github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= -github.com/google/gofuzz v0.0.0-20161122191042-44d81051d367/go.mod h1:HP5RmnzzSNb993RKQDq4+1A4ia9nllfqcQFTQJedwGI= +github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI= +github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg= github.com/google/martian v2.1.0+incompatible h1:/CP5g8u/VJHijgedC/Legn3BAbAaWPgecwXBIDzw5no= github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs= @@ -471,8 +440,9 @@ github.com/google/s2a-go v0.1.4 h1:1kZ/sQM3srePvKs3tXAvQzo66XfcReoqFpIpIccE7Oc= github.com/google/s2a-go v0.1.4/go.mod h1:Ej+mSEMGRnqRzjc7VtF+jdBwYG5fuJfiZ8ELkjEwM0A= github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/google/uuid v1.3.0 h1:t6JiXgmwXMjEs8VusXIJk2BXHsn+wx8BZdTaoZ5fu7I= github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= +github.com/google/uuid v1.3.1 h1:KjJaJ9iWZ3jOFZIf1Lqf4laDRCasjl0BCmnEGxkdLb4= +github.com/google/uuid v1.3.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/googleapis/enterprise-certificate-proxy v0.0.0-20220520183353-fd19c99a87aa/go.mod h1:17drOmN3MwGY7t0e+Ei9b45FFGA3fBs3x36SsCg1hq8= github.com/googleapis/enterprise-certificate-proxy v0.1.0/go.mod h1:17drOmN3MwGY7t0e+Ei9b45FFGA3fBs3x36SsCg1hq8= github.com/googleapis/enterprise-certificate-proxy v0.2.0/go.mod h1:8C0jb7/mgJe/9KK8Lm7X9ctZC2t60YyIpYEI16jx0Qg= @@ -489,10 +459,7 @@ github.com/googleapis/gax-go/v2 v2.5.1/go.mod h1:h6B0KMMFNtI2ddbGJn3T3ZbwkeT6yqE github.com/googleapis/gax-go/v2 v2.6.0/go.mod h1:1mjbznJAPHFpesgE5ucqfYEscaz5kMdcIDwU/6+DDoY= github.com/googleapis/gax-go/v2 v2.11.0 h1:9V9PWXEsWnPpQhu/PeQIkS4eGzMlTLGgt80cUUI8Ki4= github.com/googleapis/gax-go/v2 v2.11.0/go.mod h1:DxmR61SGKkGLa2xigwuZIQpkCI2S5iydzRfb3peWZJI= -github.com/googleapis/gnostic v0.0.0-20170729233727-0c5108395e2d/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= github.com/googleapis/go-type-adapters v1.0.0/go.mod h1:zHW75FOG2aur7gAO2B+MLby+cLsWGBF62rFAi7WjWO4= -github.com/gopherjs/gopherjs v1.17.2 h1:fQnZVsXk8uxXIStYb0N4bGk7jeyTalG/wsZjQ25dO0g= -github.com/gopherjs/gopherjs v1.17.2/go.mod h1:pRRIvn/QzFLrKfvEz3qUuEhtE/zLCWfreZ6J5gM2i+k= github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw= github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 h1:YBftPWNWd4WwGqtY2yeZL2ef8rHAxPBD8KFhJpmcqms= github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0/go.mod h1:YN5jB8ie0yfIUg6VvR9Kz84aCaG7AsGZnLjhHbUqwPg= @@ -516,11 +483,10 @@ github.com/hashicorp/go-version v1.6.0 h1:feTTfFNnjP967rlCxM/I9g701jU+RN74YKx2mO github.com/hashicorp/go-version v1.6.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA= github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= -github.com/hashicorp/hcl/v2 v2.18.0 h1:wYnG7Lt31t2zYkcquwgKo6MWXzRUDIeIVU5naZwHLl8= -github.com/hashicorp/hcl/v2 v2.18.0/go.mod h1:ThLC89FV4p9MPW804KVbe/cEXoQ8NZEh+JtMeeGErHE= +github.com/hashicorp/hcl/v2 v2.19.1 h1://i05Jqznmb2EXqa39Nsvyan2o5XyMowW5fnCKW5RPI= +github.com/hashicorp/hcl/v2 v2.19.1/go.mod h1:ThLC89FV4p9MPW804KVbe/cEXoQ8NZEh+JtMeeGErHE= github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d h1:kJCB4vdITiW1eC1vq2e6IsrXKrZit1bv/TDYFGMp4BQ= github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d/go.mod h1:+NfK9FKeTrX5uv1uIXGdwYDTeHna2qgaIlx54MXqjAM= -github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= github.com/iancoleman/strcase v0.3.0 h1:nTXanmYxhfFAMjZL34Ov6gkzEsSJZ5DbhxWjvSASxEI= github.com/iancoleman/strcase v0.3.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho= github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= @@ -532,19 +498,14 @@ github.com/jmespath/go-jmespath v0.4.0/go.mod h1:T8mJZnbsbmF+m6zOOFylbeCJqk5+pHW github.com/jmespath/go-jmespath/internal/testify v1.5.1 h1:shLQSRRSCCPj3f2gpwzGwWFoC7ycTf1rcQZHOlsJ6N8= github.com/jmespath/go-jmespath/internal/testify v1.5.1/go.mod h1:L3OGu8Wl2/fWfCI6z80xFu9LTZmf1ZRjMHUOPmWr69U= github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4= -github.com/json-iterator/go v0.0.0-20180612202835-f2b4162afba3/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= -github.com/json-iterator/go v1.1.8/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo= github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU= github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk= -github.com/jtolds/gls v4.20.0+incompatible h1:xdiiI2gbIgH/gLH7ADydsJ1uDOEzR8yvV7C0MuV77Wo= -github.com/jtolds/gls v4.20.0+incompatible/go.mod h1:QJZ7F/aHp+rZTRtaJ1ow/lLfFfVYBRgL+9YlvaHOwJU= github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w= github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM= -github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00= github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/klauspost/compress v1.15.11 h1:Lcadnb3RKGin4FYM/orgq0qde+nc15E5Cbqg4B9Sx9c= github.com/klauspost/compress v1.15.11/go.mod h1:QPwzmACJjUTFsnSHH934V6woptycfrDDJnH7hvFVbGM= @@ -560,7 +521,6 @@ github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE= github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc= github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw= -github.com/mailru/easyjson v0.0.0-20160728113105-d5b7844b561a/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU= github.com/mattn/go-colorable v0.1.9/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= github.com/mattn/go-colorable v0.1.12/go.mod h1:u5H1YNBxpqRaxsYJYSkiCWKzEfiAb1Gb520KVy5xxl4= @@ -591,41 +551,22 @@ github.com/mitchellh/mapstructure v1.5.0 h1:jeMsZIYE/09sWLaz43PL7Gy6RuMjD2eJVyua github.com/mitchellh/mapstructure v1.5.0/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo= github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= -github.com/modern-go/reflect2 v0.0.0-20180320133207-05fbef0ca5da/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk= -github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= -github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw= github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno= -github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE= -github.com/nxadm/tail v1.4.8/go.mod h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU= github.com/oklog/run v1.0.0 h1:Ru7dDtJNOyC66gQ5dQmaCa0qIsAUFY3sFpK1Xk8igrw= github.com/oklog/run v1.0.0/go.mod h1:dlhp/R75TPv97u0XWUtDeV/lRKWPKSdTuV0TZvrmrQA= github.com/olekukonko/tablewriter v0.0.5 h1:P2Ga83D34wi1o9J6Wh1mRuqd4mF/x/lgBS7N7AbDhec= github.com/olekukonko/tablewriter v0.0.5/go.mod h1:hPp6KlRPjbx+hW8ykQs1w3UBbZlj6HuIJcUGPhkA7kY= -github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.10.1/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE= -github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU= -github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA= -github.com/onsi/gomega v1.7.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY= -github.com/onsi/gomega v1.20.1 h1:PA/3qinGoukvymdIDV8pii6tiZgC8kbmJO6Z5+b002Q= -github.com/onsi/gomega v1.20.1/go.mod h1:DtrZpjmvpn2mPm4YWQa0/ALMDj9v4YxLgojwPeREyVo= -github.com/patrickmn/go-cache v2.1.0+incompatible h1:HRMgzkcYKYpi3C8ajMPV8OFXaaRUnok+kx1WdO15EQc= -github.com/patrickmn/go-cache v2.1.0+incompatible/go.mod h1:3Qf8kWWT7OJRJbdiICTKqZju1ZixQ/KpMGzzAfe6+WQ= -github.com/pegasus-kv/thrift v0.13.0 h1:4ESwaNoHImfbHa9RUGJiJZ4hrxorihZHk5aarYwY8d4= -github.com/pegasus-kv/thrift v0.13.0/go.mod h1:Gl9NT/WHG6ABm6NsrbfE8LiJN0sAyneCrvB4qN4NPqQ= github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 h1:KoWmjvw+nsYOo29YJK9vDA65RGE3NrOnUtO7a+RF9HU= github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8/go.mod h1:HKlIX3XHQyzLZPlr7++PzdhaXEj94dEiJgZDTsxEqUI= github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= -github.com/pmezard/go-difflib v0.0.0-20151028094244-d8ed2627bdf0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw= @@ -667,24 +608,13 @@ github.com/sethvargo/go-retry v0.2.4/go.mod h1:1afjQuvh7s4gflMObvjLPaWgluLLyhA1w github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo= github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE= github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88= -github.com/sirupsen/logrus v1.9.0 h1:trlNQbNUG3OdDrDil03MCb1H2o9nJ1x4/5LYw7byDE0= -github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ= -github.com/smartystreets/assertions v1.13.0 h1:Dx1kYM01xsSqKPno3aqLnrwac2LetPvN23diwyr69Qs= -github.com/smartystreets/assertions v1.13.0/go.mod h1:wDmR7qL282YbGsPy6H/yAsesrxfxaaSlJazyFLYVFx8= -github.com/smartystreets/goconvey v1.7.2 h1:9RBaZCeXEQ3UselpuwUQHltGVXvdwm6cv1hgR6gDIPg= -github.com/smartystreets/goconvey v1.7.2/go.mod h1:Vw0tHAZW6lzCRk3xgdin6fKYcG+G3Pg9vgXWeJpQFMM= github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA= -github.com/spf13/cast v1.5.0 h1:rj3WzYc11XZaIZMPKmwP96zkFEnnAmV8s6XbB2aY32w= -github.com/spf13/cast v1.5.0/go.mod h1:SpXXQ5YoyJw6s3/6cMTQuxvgRl3PCJiyaX9p6b155UU= -github.com/spf13/pflag v0.0.0-20170130214245-9ff6c6923cff/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4= -github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= github.com/stevenle/topsort v0.2.0 h1:LLWgtp34HPX6/RBDRS0kElVxGOTzGBLI1lSAa5Lb46k= github.com/stevenle/topsort v0.2.0/go.mod h1:ck2WG2/ZrOr6dLApQ/5Xrqy5wv3T0qhKYWE7r9tkibc= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw= github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo= -github.com/stretchr/testify v0.0.0-20151208002404-e3a8ff8ce365/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI= github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4= @@ -703,8 +633,8 @@ github.com/tombuildsstuff/giovanni v0.15.1 h1:CVRaLOJ7C/eercCrKIsarfJ4SZoGMdBL9Q github.com/tombuildsstuff/giovanni v0.15.1/go.mod h1:0TZugJPEtqzPlMpuJHYfXY6Dq2uLPrXf98D2XQSxNbA= github.com/turbot/go-kit v0.8.0-rc.0 h1:Vj1w5TmZWwdSwBTcOq6FKVlQQ+XwCd27BZVPZ9m1hT0= github.com/turbot/go-kit v0.8.0-rc.0/go.mod h1:JkVKhR5XHK86aXY4WzB9Lr0jdnrsafjVh4yJA8ZS3Ck= -github.com/turbot/steampipe-plugin-sdk/v5 v5.6.2 h1:B2gkMJK1m5GYQfmxjO9VREAwdUsGxf48vOzKouoyFIM= -github.com/turbot/steampipe-plugin-sdk/v5 v5.6.2/go.mod h1:u2ubq9W5/5y6wG481LyulS7vuMOTRPmXAUfGLoVmwnA= +github.com/turbot/steampipe-plugin-sdk/v5 v5.7.0 h1:37Iai2lrdvphgEb4D6KjmIiCgVrx8pqeSsikJ3IuTDI= +github.com/turbot/steampipe-plugin-sdk/v5 v5.7.0/go.mod h1:26k5H4Xr9Czen0DnyhJI3up5S4T4MS7gt4mCdBj5i9w= github.com/ulikunitz/xz v0.5.10 h1:t92gobL9l3HE202wg3rlk19F6X+JOxl9BBrCCMYEYd8= github.com/ulikunitz/xz v0.5.10/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14= github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= @@ -726,31 +656,29 @@ go.opencensus.io v0.22.5/go.mod h1:5pWMHQbX5EPX2/62yrJeAkowc+lfs/XD7Uxpq3pI6kk= go.opencensus.io v0.23.0/go.mod h1:XItmlyltB5F7CS4xOC1DcqMoFqwtC6OG2xF7mCv7P7E= go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0= go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo= -go.opentelemetry.io/otel v1.17.0 h1:MW+phZ6WZ5/uk2nd93ANk/6yJ+dVrvNWUjGhnnFU5jM= -go.opentelemetry.io/otel v1.17.0/go.mod h1:I2vmBGtFaODIVMBSTPVDlJSzBDNf93k60E6Ft0nyjo0= -go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.17.0 h1:eU0ffpYuEY7eQ75K+nKr9CI5KcY8h+GPk/9DDlEO1NI= -go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.17.0/go.mod h1:9P5RK5JS2sjKepuCkqFwPp3etwV/57E0eigLw18Mn1k= +go.opentelemetry.io/otel v1.21.0 h1:hzLeKBZEL7Okw2mGzZ0cc4k/A7Fta0uoPgaJCr8fsFc= +go.opentelemetry.io/otel v1.21.0/go.mod h1:QZzNPQPm1zLX4gZK4cMi+71eaorMSGT3A4znnUvNNEo= go.opentelemetry.io/otel/exporters/otlp/otlpmetric v0.40.0 h1:MZbjiZeMmn5wFMORhozpouGKDxj9POHTuU5UA8msBQk= go.opentelemetry.io/otel/exporters/otlp/otlpmetric v0.40.0/go.mod h1:C7tOYVCJmrDTCwxNny0MuUtnDIR3032vFHYke0F2ZrU= go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v0.40.0 h1:q3FNPi8FLQVjLlmV+WWHQfH9ZCCtQIS0O/+dn1+4cJ4= go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v0.40.0/go.mod h1:rmx4n0uSIAkKBeQYkygcv9dENAlL2/tv3OSq68h1JAo= -go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.16.0 h1:cbsD4cUcviQGXdw8+bo5x2wazq10SKz8hEbtCRPcU78= -go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.16.0/go.mod h1:JgXSGah17croqhJfhByOLVY719k1emAXC8MVhCIJlRs= -go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.16.0 h1:TVQp/bboR4mhZSav+MdgXB8FaRho1RC8UwVn3T0vjVc= -go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.16.0/go.mod h1:I33vtIe0sR96wfrUcilIzLoA3mLHhRmz9S9Te0S3gDo= -go.opentelemetry.io/otel/metric v1.17.0 h1:iG6LGVz5Gh+IuO0jmgvpTB6YVrCGngi8QGm+pMd8Pdc= -go.opentelemetry.io/otel/metric v1.17.0/go.mod h1:h4skoxdZI17AxwITdmdZjjYJQH5nzijUUjm+wtPph5o= -go.opentelemetry.io/otel/sdk v1.17.0 h1:FLN2X66Ke/k5Sg3V623Q7h7nt3cHXaW1FOvKKrW0IpE= -go.opentelemetry.io/otel/sdk v1.17.0/go.mod h1:U87sE0f5vQB7hwUoW98pW5Rz4ZDuCFBZFNUBlSgmDFQ= +go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.21.0 h1:cl5P5/GIfFh4t6xyruOgJP5QiA1pw4fYYdv6nc6CBWw= +go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.21.0/go.mod h1:zgBdWWAu7oEEMC06MMKc5NLbA/1YDXV1sMpSqEeLQLg= +go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.21.0 h1:tIqheXEFWAZ7O8A7m+J0aPTmpJN3YQ7qetUAdkkkKpk= +go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.21.0/go.mod h1:nUeKExfxAQVbiVFn32YXpXZZHZ61Cc3s3Rn1pDBGAb0= +go.opentelemetry.io/otel/metric v1.21.0 h1:tlYWfeo+Bocx5kLEloTjbcDwBuELRrIFxwdQ36PlJu4= +go.opentelemetry.io/otel/metric v1.21.0/go.mod h1:o1p3CA8nNHW8j5yuQLdc1eeqEaPfzug24uvsyIEJRWM= +go.opentelemetry.io/otel/sdk v1.21.0 h1:FTt8qirL1EysG6sTQRZ5TokkU8d0ugCj8htOgThZXQ8= +go.opentelemetry.io/otel/sdk v1.21.0/go.mod h1:Nna6Yv7PWTdgJHVRD9hIYywQBRx7pbox6nwBnZIxl/E= go.opentelemetry.io/otel/sdk/metric v0.40.0 h1:qOM29YaGcxipWjL5FzpyZDpCYrDREvX0mVlmXdOjCHU= go.opentelemetry.io/otel/sdk/metric v0.40.0/go.mod h1:dWxHtdzdJvg+ciJUKLTKwrMe5P6Dv3FyDbh8UkfgkVs= -go.opentelemetry.io/otel/trace v1.17.0 h1:/SWhSRHmDPOImIAetP1QAeMnZYiQXrTy4fMMYOdSKWQ= -go.opentelemetry.io/otel/trace v1.17.0/go.mod h1:I/4vKTgFclIsXRVucpH25X0mpFSczM7aHeaz0ZBLWjY= +go.opentelemetry.io/otel/trace v1.21.0 h1:WD9i5gzvoUPuXIXH24ZNBudiarZDKuekPqi/E8fpfLc= +go.opentelemetry.io/otel/trace v1.21.0/go.mod h1:LGbsEB0f9LGjN+OZaQQ26sohbOmiMR+BaslueVtS/qQ= go.opentelemetry.io/proto/otlp v0.7.0/go.mod h1:PqfVotwruBrMGOCsRd/89rSnXhoiJIqeYNgFYFoEGnI= go.opentelemetry.io/proto/otlp v1.0.0 h1:T0TX0tmXU8a3CbNXzEKGeU5mIVOdf0oykP+u2lIVU/I= go.opentelemetry.io/proto/otlp v1.0.0/go.mod h1:Sy6pihPLfYHkr3NkUbEhGHFhINUSI/v80hjKIs5JXpM= -go.uber.org/goleak v1.2.1 h1:NBol2c7O1ZokfZ0LEU9K6Whx/KnwvepVetCUhtKja4A= -go.uber.org/goleak v1.2.1/go.mod h1:qlT2yGI9QafXHhZZLxlSuNsMw3FFLxBr+tBRlmO1xH4= +go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto= +go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE= golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= @@ -762,8 +690,8 @@ golang.org/x/crypto v0.0.0-20201016220609-9e8e0b390897/go.mod h1:LzIPMQfyMNhhGPh golang.org/x/crypto v0.0.0-20201221181555-eec23a3978ad/go.mod h1:jdWPYTVW3xRLrWPugEBEK3UY2ZEsg3UU495nc5E+M+I= golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= golang.org/x/crypto v0.0.0-20220314234659-1baeb1ce4c0b/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= -golang.org/x/crypto v0.12.0 h1:tFM/ta59kqch6LlvYnPa0yx5a83cL2nHflFhYKvv9Yk= -golang.org/x/crypto v0.12.0/go.mod h1:NF0Gs7EO5K4qLn+Ylc+fih8BSTeIjAP05siRnAh98yw= +golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= +golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -802,10 +730,8 @@ golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= -golang.org/x/net v0.0.0-20170114055629-f2499483f923/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -818,8 +744,6 @@ golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLL golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= -golang.org/x/net v0.0.0-20191004110552-13f9640d40b9/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= -golang.org/x/net v0.0.0-20191105084925-a882066a44e0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191112182307-2180aed22343/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= @@ -858,8 +782,8 @@ golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug golang.org/x/net v0.0.0-20220909164309-bea034e7d591/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= golang.org/x/net v0.0.0-20221014081412-f15817d10f9b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco= -golang.org/x/net v0.14.0 h1:BONx9s002vGdD9umnlX1Po8vOZmrgH34qlHcD1MfK14= -golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI= +golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= +golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -885,8 +809,8 @@ golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri golang.org/x/oauth2 v0.0.0-20220909003341-f21342109be1/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg= golang.org/x/oauth2 v0.0.0-20221014153046-6fdb5e3db783/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg= golang.org/x/oauth2 v0.1.0/go.mod h1:G9FE4dLTsbXUu90h/Pf85g4w1D+SSAgR+q46nJZ8M4A= -golang.org/x/oauth2 v0.10.0 h1:zHCpF2Khkwy4mMB4bv0U37YtJdTGW8jI0glAApi0Kh8= -golang.org/x/oauth2 v0.10.0/go.mod h1:kTpgurOux7LqtuxjuyZa4Gj2gdezIt/jQtGnNFfypQI= +golang.org/x/oauth2 v0.11.0 h1:vPL4xzxBM4niKCW6g9whtaWVXTJf1U5e4aZxxFx/gbU= +golang.org/x/oauth2 v0.11.0/go.mod h1:LdF7O/8bLR/qWK9DrpXmbHLTouvRHK0SgJl0GmDBchk= golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= @@ -901,12 +825,10 @@ golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJ golang.org/x/sync v0.0.0-20220601150217-0de741cfad7f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220929204114-8fcdb60fdcc0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.3.0 h1:ftCYgMx6zT/asHUrPw8BLLscYtGznsLAnjq5RH9P66E= -golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= -golang.org/x/sys v0.0.0-20170830134202-bb24a47a89ea/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sync v0.5.0 h1:60k92dhOjHxJkrqnwsfl8KuaHbn/5dl0lUPUklKo3qE= +golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -917,9 +839,7 @@ golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190826190057-c7b8b68b1456/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20191010194322-b09406accb47/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191112214154-59a1497f0cea/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -982,7 +902,6 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc golang.org/x/sys v0.0.0-20220610221304-9f5ed59c137d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220615213510-4f61da869c0c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220624220833-87e55d714810/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= @@ -990,13 +909,12 @@ golang.org/x/sys v0.0.0-20220908164124-27713097b956/go.mod h1:oPkhp1MJrh7nUepCBc golang.org/x/sys v0.0.0-20221010170243-090e33056c14/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.11.0 h1:eG7RXZHdqOJ1i+0lgLgCpSXAp6M3LYlAo6osgSi0xOM= -golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q= +golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= -golang.org/x/text v0.0.0-20160726164857-2910a502d2bf/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -1008,16 +926,14 @@ golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ= golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= -golang.org/x/text v0.12.0 h1:k+n5B8goJNdU7hSvEtMUz3d1Q6D/XW4COJSJR6fN0mc= -golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= +golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k= +golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4= golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20181011042414-1f849cf54d09/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= @@ -1237,12 +1153,12 @@ google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e/go.mod h1:3526vdqw google.golang.org/genproto v0.0.0-20221014173430-6e2ab493f96b/go.mod h1:1vXfmgAz9N9Jx0QA82PqRVauvCz1SGSz739p0f183jM= google.golang.org/genproto v0.0.0-20221014213838-99cd37c6964a/go.mod h1:1vXfmgAz9N9Jx0QA82PqRVauvCz1SGSz739p0f183jM= google.golang.org/genproto v0.0.0-20221025140454-527a21cfbd71/go.mod h1:9qHF0xnpdSfF6knlcsnpzUu5y+rpwgbvsyGAZPBMg4s= -google.golang.org/genproto v0.0.0-20230711160842-782d3b101e98 h1:Z0hjGZePRE0ZBWotvtrwxFNrNE9CUAGtplaDK5NNI/g= -google.golang.org/genproto v0.0.0-20230711160842-782d3b101e98/go.mod h1:S7mY02OqCJTD0E1OiQy1F72PWFB4bZJ87cAtLPYgDR0= -google.golang.org/genproto/googleapis/api v0.0.0-20230711160842-782d3b101e98 h1:FmF5cCW94Ij59cfpoLiwTgodWmm60eEV0CjlsVg2fuw= -google.golang.org/genproto/googleapis/api v0.0.0-20230711160842-782d3b101e98/go.mod h1:rsr7RhLuwsDKL7RmgDDCUc6yaGr1iqceVb5Wv6f6YvQ= -google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98 h1:bVf09lpb+OJbByTj913DRJioFFAjf/ZGxEz7MajTp2U= -google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98/go.mod h1:TUfxEVdsvPg18p6AslUXFoLdpED4oBnGwyqk3dV1XzM= +google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d h1:VBu5YqKPv6XiJ199exd8Br+Aetz+o08F+PLMnwJQHAY= +google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d/go.mod h1:yZTlhN0tQnXo3h00fuXNCxJdLdIdnVFVBaRJ5LWBbw4= +google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d h1:DoPTO70H+bcDXcd39vOqb2viZxgqeBeSGtZ55yZU4/Q= +google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d/go.mod h1:KjSP20unUpOx5kyQUFa7k4OJg0qeJ7DEZflGDu2p6Bk= +google.golang.org/genproto/googleapis/rpc v0.0.0-20230822172742-b8732ec3820d h1:uvYuEyMHKNt+lT4K3bN6fGswmK8qSvcreM3BwjDh+y4= +google.golang.org/genproto/googleapis/rpc v0.0.0-20230822172742-b8732ec3820d/go.mod h1:+Bk1OCOj40wS2hwAMA+aCW9ypzm63QTBBHp6lQ3p+9M= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= @@ -1278,8 +1194,8 @@ google.golang.org/grpc v1.48.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACu google.golang.org/grpc v1.49.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= google.golang.org/grpc v1.50.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= google.golang.org/grpc v1.50.1/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= -google.golang.org/grpc v1.58.2 h1:SXUpjxeVF3FKrTYQI4f4KvbGD5u2xccdYdurwowix5I= -google.golang.org/grpc v1.58.2/go.mod h1:tgX3ZQDlNJGU96V6yHh1T/JeoBQ2TXdr43YbYSsCJk0= +google.golang.org/grpc v1.59.0 h1:Z5Iec2pjwb+LEOqzpB2MR12/eKFhDPhuqW91O+4bwUk= +google.golang.org/grpc v1.59.0/go.mod h1:aUPDwccQo6OTjy7Hct4AfBPD1GptF4fyUjIkQ9YtF98= google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw= google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= @@ -1307,14 +1223,6 @@ gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntN gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q= gopkg.in/cheggaaa/pb.v1 v1.0.27/go.mod h1:V/YB90LKu/1FcN3WVnfiiE5oMCibMjukxqG/qStrOgw= gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI= -gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys= -gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw= -gopkg.in/natefinch/lumberjack.v2 v2.0.0 h1:1Lc07Kr7qY4U2YPouBjpCLxpiyxIVoxqXgkXLknAOE8= -gopkg.in/natefinch/lumberjack.v2 v2.0.0/go.mod h1:l0ndWWf7gzL7RNwBG7wST/UCcT4T24xpD6X8LsfU/+k= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 h1:uRGJdciOHaEIrze2W8Q3AKkepLTh2hOroT7a+7czfdQ= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw= -gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637 h1:yiW+nvdHb9LVqSHQBXfZCieqV4fzYhNBql77zY0ykqs= -gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637/go.mod h1:BHsqpu/nsuzkT5BpiH1EMZPLyqSMM8JbIavyFACoFNk= gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= @@ -1334,15 +1242,6 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= -k8s.io/apimachinery v0.0.0-20191123233150-4c4803ed55e3/go.mod h1:b9qmWdKlLuU9EBh+06BtLcSf/Mu89rWL33naRxs1uZg= -k8s.io/apimachinery v0.25.3 h1:7o9ium4uyUOM76t6aunP0nZuex7gDf8VGwkR5RcJnQc= -k8s.io/apimachinery v0.25.3/go.mod h1:jaF9C/iPNM1FuLl7Zuy5b9v+n35HGSh6AQ4HYRkCqwo= -k8s.io/gengo v0.0.0-20190128074634-0689ccc1d7d6/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= -k8s.io/klog v0.0.0-20181102134211-b9b56d5dfc92/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk= -k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I= -k8s.io/kube-openapi v0.0.0-20191107075043-30be4d16710a/go.mod h1:1TqjTSzOxsLGIKfj0lK8EeCP7K1iUG65v09OM0/WG5E= rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= -sigs.k8s.io/structured-merge-diff v0.0.0-20190525122527-15d366b2352e/go.mod h1:wWxsB5ozmmv/SG7nM11ayaAW51xMvak/t1r0CSlcokI= -sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o= From f91d3bb866f447f1a63bc1ca52e4435de40a01c0 Mon Sep 17 00:00:00 2001 From: misraved Date: Wed, 29 Nov 2023 22:09:13 +0530 Subject: [PATCH 2/2] Improve table docs and recompile plugin with steampipe-plugin-sdk v5.7.0 --- docs/tables/azure_ad_group.md | 5 +- docs/tables/azure_ad_service_principal.md | 6 +- docs/tables/azure_ad_user.md | 6 +- docs/tables/azure_alert_management.md | 7 +- docs/tables/azure_api_management.md | 19 +- docs/tables/azure_app_configuration.md | 20 +- docs/tables/azure_app_service_environment.md | 18 +- docs/tables/azure_app_service_function_app.md | 19 +- docs/tables/azure_app_service_plan.md | 16 +- docs/tables/azure_app_service_web_app.md | 21 +- docs/tables/azure_app_service_web_app_slot.md | 22 +- docs/tables/azure_application_gateway.md | 20 +- docs/tables/azure_application_insight.md | 17 +- .../azure_application_security_group.md | 17 +- docs/tables/azure_automation_account.md | 18 +- docs/tables/azure_automation_variable.md | 19 +- docs/tables/azure_bastion_host.md | 17 +- docs/tables/azure_batch_account.md | 17 +- docs/tables/azure_cognitive_account.md | 19 +- docs/tables/azure_compute_availability_set.md | 18 +- docs/tables/azure_compute_disk.md | 20 +- docs/tables/azure_compute_disk_access.md | 17 +- .../azure_compute_disk_encryption_set.md | 16 +- .../azure_compute_disk_metric_read_ops.md | 17 +- ...zure_compute_disk_metric_read_ops_daily.md | 17 +- ...ure_compute_disk_metric_read_ops_hourly.md | 17 +- .../azure_compute_disk_metric_write_ops.md | 17 +- ...ure_compute_disk_metric_write_ops_daily.md | 17 +- ...re_compute_disk_metric_write_ops_hourly.md | 17 +- docs/tables/azure_compute_image.md | 20 +- docs/tables/azure_compute_resource_sku.md | 16 +- docs/tables/azure_compute_snapshot.md | 16 +- docs/tables/azure_compute_ssh_key.md | 17 +- docs/tables/azure_compute_virtual_machine.md | 25 +- ..._virtual_machine_metric_cpu_utilization.md | 17 +- ...al_machine_metric_cpu_utilization_daily.md | 17 +- ...l_machine_metric_cpu_utilization_hourly.md | 17 +- ...azure_compute_virtual_machine_scale_set.md | 17 +- ...ual_machine_scale_set_network_interface.md | 19 +- ...re_compute_virtual_machine_scale_set_vm.md | 17 +- docs/tables/azure_container_group.md | 22 +- docs/tables/azure_container_registry.md | 19 +- docs/tables/azure_cosmosdb_account.md | 21 +- .../tables/azure_cosmosdb_mongo_collection.md | 17 +- docs/tables/azure_cosmosdb_mongo_database.md | 16 +- ...re_cosmosdb_restorable_database_account.md | 17 +- docs/tables/azure_cosmosdb_sql_database.md | 16 +- docs/tables/azure_data_factory.md | 18 +- docs/tables/azure_data_factory_dataset.md | 15 +- docs/tables/azure_data_factory_pipeline.md | 16 +- .../azure_data_lake_analytics_account.md | 18 +- docs/tables/azure_data_lake_store.md | 18 +- docs/tables/azure_databox_edge_device.md | 17 +- docs/tables/azure_databricks_workspace.md | 20 +- docs/tables/azure_diagnostic_setting.md | 20 +- docs/tables/azure_dns_zone.md | 18 +- docs/tables/azure_eventgrid_domain.md | 18 +- docs/tables/azure_eventgrid_topic.md | 18 +- docs/tables/azure_eventhub_namespace.md | 20 +- docs/tables/azure_express_route_circuit.md | 18 +- docs/tables/azure_firewall.md | 19 +- docs/tables/azure_firewall_policy.md | 19 +- docs/tables/azure_frontdoor.md | 21 +- docs/tables/azure_hdinsight_cluster.md | 19 +- docs/tables/azure_healthcare_service.md | 20 +- docs/tables/azure_hpc_cache.md | 18 +- docs/tables/azure_hybrid_compute_machine.md | 15 +- ...ure_hybrid_kubernetes_connected_cluster.md | 17 +- docs/tables/azure_iothub.md | 17 +- docs/tables/azure_iothub_dps.md | 17 +- docs/tables/azure_key_vault.md | 21 +- docs/tables/azure_key_vault_deleted_vault.md | 17 +- docs/tables/azure_key_vault_key.md | 20 +- docs/tables/azure_key_vault_key_version.md | 20 +- ..._vault_managed_hardware_security_module.md | 15 +- docs/tables/azure_key_vault_secret.md | 20 +- docs/tables/azure_kubernetes_cluster.md | 19 +- .../azure_kubernetes_service_version.md | 20 +- docs/tables/azure_kusto_cluster.md | 17 +- docs/tables/azure_lb.md | 15 +- docs/tables/azure_lb_backend_address_pool.md | 17 +- docs/tables/azure_lb_nat_rule.md | 16 +- docs/tables/azure_lb_outbound_rule.md | 16 +- docs/tables/azure_lb_probe.md | 16 +- docs/tables/azure_lb_rule.md | 16 +- docs/tables/azure_location.md | 15 +- docs/tables/azure_log_alert.md | 17 +- docs/tables/azure_log_profile.md | 14 +- docs/tables/azure_logic_app_workflow.md | 18 +- .../azure_machine_learning_workspace.md | 16 +- docs/tables/azure_management_group.md | 18 +- docs/tables/azure_management_lock.md | 17 +- docs/tables/azure_mariadb_server.md | 19 +- .../azure_monitor_activity_log_event.md | 31 ++- docs/tables/azure_mssql_elasticpool.md | 17 +- docs/tables/azure_mssql_managed_instance.md | 18 +- docs/tables/azure_mssql_virtual_machine.md | 17 +- docs/tables/azure_mysql_flexible_server.md | 25 +- docs/tables/azure_mysql_server.md | 29 ++- docs/tables/azure_nat_gateway.md | 18 +- docs/tables/azure_network_interface.md | 16 +- docs/tables/azure_network_security_group.md | 16 +- docs/tables/azure_network_watcher.md | 15 +- docs/tables/azure_network_watcher_flow_log.md | 19 +- docs/tables/azure_policy_assignment.md | 18 +- docs/tables/azure_policy_definition.md | 17 +- .../azure_postgresql_flexible_server.md | 17 +- docs/tables/azure_postgresql_server.md | 23 +- docs/tables/azure_private_dns_zone.md | 18 +- docs/tables/azure_provider.md | 17 +- docs/tables/azure_public_ip.md | 18 +- .../azure_recovery_services_backup_job.md | 17 +- docs/tables/azure_recovery_services_vault.md | 17 +- docs/tables/azure_redis_cache.md | 19 +- docs/tables/azure_resource_group.md | 15 +- docs/tables/azure_resource_link.md | 17 +- docs/tables/azure_role_assignment.md | 18 +- docs/tables/azure_role_definition.md | 18 +- docs/tables/azure_route_table.md | 18 +- docs/tables/azure_search_service.md | 15 +- ...azure_security_center_auto_provisioning.md | 17 +- .../azure_security_center_automation.md | 16 +- docs/tables/azure_security_center_contact.md | 17 +- ...curity_center_jit_network_access_policy.md | 16 +- docs/tables/azure_security_center_setting.md | 17 +- .../azure_security_center_sub_assessment.md | 18 +- ...re_security_center_subscription_pricing.md | 17 +- docs/tables/azure_service_fabric_cluster.md | 20 +- docs/tables/azure_servicebus_namespace.md | 21 +- docs/tables/azure_signalr_service.md | 18 +- docs/tables/azure_spring_cloud_service.md | 15 +- docs/tables/azure_sql_database.md | 18 +- docs/tables/azure_sql_server.md | 21 +- docs/tables/azure_storage_account.md | 24 +- docs/tables/azure_storage_blob.md | 17 +- docs/tables/azure_storage_blob_service.md | 17 +- docs/tables/azure_storage_container.md | 20 +- docs/tables/azure_storage_queue.md | 15 +- docs/tables/azure_storage_share_file.md | 18 +- docs/tables/azure_storage_sync.md | 18 +- docs/tables/azure_storage_table.md | 16 +- docs/tables/azure_storage_table_service.md | 15 +- docs/tables/azure_stream_analytics_job.md | 15 +- docs/tables/azure_subnet.md | 19 +- docs/tables/azure_subscription.md | 16 +- docs/tables/azure_synapse_workspace.md | 20 +- docs/tables/azure_tenant.md | 16 +- docs/tables/azure_virtual_network.md | 19 +- docs/tables/azure_virtual_network_gateway.md | 17 +- go.mod | 66 +++--- go.sum | 217 +++++------------- 151 files changed, 2308 insertions(+), 608 deletions(-) diff --git a/docs/tables/azure_ad_group.md b/docs/tables/azure_ad_group.md index d00de9c6..31ba7359 100644 --- a/docs/tables/azure_ad_group.md +++ b/docs/tables/azure_ad_group.md @@ -7,6 +7,7 @@ Azure Active Directory groups is used to manage access to your cloud-based apps, ## Examples ### Basic info +Determine the areas in which your Azure Active Directory groups are mail-enabled. This could be beneficial for managing group email communications and understanding which groups have specific email settings. ```sql select @@ -21,6 +22,7 @@ from ### List of AD groups where security is not enabled +Determine the areas in which Azure Active Directory groups are not security-enabled. This is crucial for identifying potential vulnerabilities and enhancing the security posture of your organization. ```sql select @@ -35,6 +37,7 @@ where ### List of AD groups where mail is not enabled +Determine the areas in which Azure Active Directory groups have not enabled mail. This can be useful in identifying groups that may not be receiving important communications or updates. ```sql select @@ -45,4 +48,4 @@ from azure_ad_group where not mail_enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_ad_service_principal.md b/docs/tables/azure_ad_service_principal.md index 6e2ea65b..942dc2e6 100644 --- a/docs/tables/azure_ad_service_principal.md +++ b/docs/tables/azure_ad_service_principal.md @@ -7,6 +7,7 @@ An Azure service principal is an identity created for use with applications, hos ## Examples ### List of ad service principals where service principal account is disabled +Determine which ad service principals have their account disabled in Azure. This is useful for identifying potential inactive or unused resources within your Azure environment. ```sql select @@ -22,6 +23,7 @@ where ### List of ad service principals where app role assignment is not required +Determine the areas in which ad service principals do not require app role assignments. This is useful to identify potential areas of your Azure AD environment where security could be improved by requiring app role assignments. ```sql select @@ -36,6 +38,7 @@ where ### Application role info of service principals +Identify the roles of service principals within an application to gain insights into their permissions and status. This is useful for understanding who has access to what within your application and ensuring appropriate security measures are in place. ```sql select @@ -53,6 +56,7 @@ from ### Oauth 2.0 permission info of ad service principal +This query is useful to gain insights into the permissions related to the OAuth 2.0 protocol for an advertising service principal in Azure. It allows you to understand the consent descriptions, display names, IDs and the status (enabled or not) of these permissions, which is crucial for managing access and maintaining security. ```sql select @@ -66,4 +70,4 @@ select from azure_ad_service_principal cross join jsonb_array_elements(oauth2_permissions) as perm; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_ad_user.md b/docs/tables/azure_ad_user.md index 1c9a6db3..2e9125ba 100644 --- a/docs/tables/azure_ad_user.md +++ b/docs/tables/azure_ad_user.md @@ -7,6 +7,7 @@ Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access ## Examples ### Basic active directory user info +Explore user details within your Azure Active Directory to gain insights into their status and contact information. This can be particularly useful for managing user access and maintaining up-to-date records. ```sql select @@ -22,6 +23,7 @@ from ### List of guest users in the active directory +Determine the areas in which guest users are active within your directory. This can help in managing user access and maintaining security protocols. ```sql select @@ -38,6 +40,7 @@ where ### Password profile info of each user +Determine the areas in which user password policies are enforced and where users are required to change their passwords at their next login. This helps to understand and manage user security within your Azure Active Directory. ```sql select @@ -47,5 +50,4 @@ select additional_properties -> 'passwordProfile' -> 'forceChangePasswordNextLogin' as change_password_next_login from azure_ad_user; -``` - +``` \ No newline at end of file diff --git a/docs/tables/azure_alert_management.md b/docs/tables/azure_alert_management.md index 07dc6fd7..0ea07013 100644 --- a/docs/tables/azure_alert_management.md +++ b/docs/tables/azure_alert_management.md @@ -25,6 +25,7 @@ Azure Alert Management is a service and set of tools within Microsoft Azure that ## Examples ### Basic info +Explore which alerts are currently active within your Azure management system. This can help you identify potential issues or areas that may require your attention, thus improving system monitoring and management. ```sql select @@ -40,6 +41,7 @@ from ``` ### List fired alerts +Discover the alerts that have been triggered in your Azure environment. This can help you quickly identify potential issues or anomalies that require attention. ```sql select @@ -57,6 +59,7 @@ where ``` ### List alerts within the last 7 days +Gain insights into recent alerts by identifying those that occurred within the past week. This is useful for keeping track of recent system issues or identifying patterns in alert occurrences. ```sql select @@ -73,6 +76,7 @@ where ``` ### List critical alerts +Uncover the details of critical alerts in your Azure environment to promptly address any severe issues affecting your resources. This query helps in identifying and prioritizing alerts with the highest severity for immediate action. ```sql select @@ -90,6 +94,7 @@ where ``` ### List alerts of VMInsights monitoring service +Explore alerts generated by the VMInsights monitoring service. This can help you gain insights into system performance and identify potential issues with your virtual machines. ```sql select @@ -104,4 +109,4 @@ from azure_alert_management where monitor_service = 'VMInsights'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_api_management.md b/docs/tables/azure_api_management.md index 359d1293..685317cf 100644 --- a/docs/tables/azure_api_management.md +++ b/docs/tables/azure_api_management.md @@ -1,10 +1,20 @@ -# Table: azure_api_management +--- +title: "Steampipe Table: azure_api_management - Query Azure API Management Services using SQL" +description: "Allows users to query Azure API Management Services." +--- -Azure API Management is a fully managed service that enables customers to publish, secure, transform, maintain, and monitor APIs. +# Table: azure_api_management - Query Azure API Management Services using SQL + +Azure API Management is a fully managed service that helps customers publish, secure, transform, maintain, and monitor APIs. With Azure API Management, organizations can ensure that their APIs are always available and performing as expected, and that their valuable data is secure. The service also includes a developer portal to help onboard developers and foster a developer community. + +## Table Usage Guide + +The 'azure_api_management' table provides insights into API Management Services within Azure. As a DevOps engineer, explore service-specific details through this table, including API names, locations, and associated metadata. Utilize it to uncover information about services, such as those with specific SKUs, the regions they are deployed in, and the verification of their identities. The schema presents a range of attributes of the API Management Service for your analysis, like the service name, resource group, subscription ID, and associated tags. ## Examples ### Public and private IP address info of each API management +Gain insights into the public and private IP addresses associated with each API management system in your Azure environment. This allows for better network management and security monitoring. ```sql select @@ -17,6 +27,7 @@ from ### API management publisher info +Gain insights into the publishers of your Azure API management service, including their names and contact emails, to facilitate effective communication and management. ```sql select @@ -29,6 +40,7 @@ from ### List of premium API managements and their computing capacity +Identify premium Azure API management services and their computing capacities. This is useful for assessing your organization's API management capabilities and planning for potential upgrades or expansions. ```sql select @@ -43,6 +55,7 @@ where ### List of API management without application tag key +Identify instances where API management in Azure is missing the 'application' tag. This can aid in pinpointing areas where tagging conventions may not have been followed, helping to improve resource management and compliance. ```sql select @@ -52,4 +65,4 @@ from azure_api_management where not tags :: JSONB ? 'application'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_configuration.md b/docs/tables/azure_app_configuration.md index b205d983..68605769 100644 --- a/docs/tables/azure_app_configuration.md +++ b/docs/tables/azure_app_configuration.md @@ -1,10 +1,20 @@ -# Table: azure_app_configuration +--- +title: "Steampipe Table: azure_app_configuration - Query Azure App Configuration Stores using SQL" +description: "Allows users to query Azure App Configuration Stores" +--- -Azure App Configuration provides a service to centrally manage application settings and feature flags. App Configuration is used to store all the settings for your application and secure their accesses in one place. +# Table: azure_app_configuration - Query Azure App Configuration Stores using SQL + +Azure App Configuration is a managed service that helps developers centralize their application and feature settings simply and securely. It provides a way to manage and distribute application settings, helping to improve the speed and reliability of application deployment. Azure App Configuration also allows you to automate the process of managing and updating these settings across multiple environments. + +## Table Usage Guide + +The 'azure_app_configuration' table provides insights into App Configuration Stores within Azure App Configuration. As a DevOps engineer, explore store-specific details through this table, including store names, resource groups, subscription IDs, and associated metadata. Utilize it to uncover information about stores, such as their provisioning states, creation times, and the number of failed requests. The schema presents a range of attributes of the App Configuration Store for your analysis, like the store name, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore the status and creation dates of your Azure application configurations. This can help you understand the overall state of your applications, allowing for better management and timely updates. ```sql select @@ -18,6 +28,7 @@ from ``` ### List public network access enabled app configurations +Explore which app configurations have public network access enabled. This can be useful in identifying potential security risks and ensuring your app configurations adhere to best practices. ```sql select @@ -33,6 +44,7 @@ where ``` ### List app configurations with user assigned identities +This query helps in identifying the application configurations within Azure that have been assigned user identities. It is useful in managing and tracking user access, contributing to improved security and compliance. ```sql select @@ -53,6 +65,7 @@ where ``` ### List private endpoint connection details for app configurations +Explore the details of private endpoint connections for your app configurations. This can help you understand their current status, any required actions, and their provisioning state, which can be useful for troubleshooting or optimizing your app's performance. ```sql select @@ -70,6 +83,7 @@ from ``` ### List encryption details for app configurations +Explore the encryption details of your app configurations to ensure secure data handling. This is particularly useful in maintaining data security standards and regulatory compliance. ```sql select @@ -79,4 +93,4 @@ select encryption -> 'keyVaultProperties' ->> 'keyIdentifier' as key_vault_key_identifier from azure_app_configuration; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_service_environment.md b/docs/tables/azure_app_service_environment.md index c4c7c8da..0e776836 100644 --- a/docs/tables/azure_app_service_environment.md +++ b/docs/tables/azure_app_service_environment.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_environment +--- +title: "Steampipe Table: azure_app_service_environment - Query Azure App Service Environments using SQL" +description: "Allows users to query Azure App Service Environments" +--- -The Azure App Service Environment provides a fully isolated and dedicated environment for securely running App Service apps at high scale. +# Table: azure_app_service_environment - Query Azure App Service Environments using SQL + +Azure App Service Environment is a fully isolated and dedicated environment for securely running App Service apps at high scale. It is designed for applications that require secure, scalable and isolated environments for their execution. It provides network isolation and improved scalability capabilities, making it ideal for applications that require high levels of security and isolation, or that run at a large scale. + +## Table Usage Guide + +The 'azure_app_service_environment' table provides insights into App Service Environments within Azure. As a DevOps engineer, explore environment-specific details through this table, including the environment's capacity, status, and associated metadata. Utilize it to uncover information about the environments, such as their virtual network integration, worker pool specifications, and inbound and outbound IP addresses. The schema presents a range of attributes of the App Service Environment for your analysis, like the environment's ID, location, resource group, and tags. ## Examples ### List of app service environments which are not healthy +Identify the Azure app service environments that are not functioning properly. This is useful for promptly addressing issues and maintaining optimal application performance. ```sql select @@ -17,6 +27,7 @@ where ``` ### Virtual network info of each app service environment +Gain insights into the virtual network configuration of each app service environment to understand the internal load balancing mode and ensure optimal resource allocation. ```sql select @@ -30,6 +41,7 @@ from ``` ### List cluster settings details +Explore the configuration details of your Azure app service environment to gain insights into the specific cluster settings. This can help you understand the current setup and make informed decisions on potential modifications. ```sql select @@ -40,4 +52,4 @@ select from azure_app_service_environment, jsonb_array_elements(cluster_settings) as settings; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_service_function_app.md b/docs/tables/azure_app_service_function_app.md index 6e06768a..2094c959 100644 --- a/docs/tables/azure_app_service_function_app.md +++ b/docs/tables/azure_app_service_function_app.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_function_app +--- +title: "Steampipe Table: azure_app_service_function_app - Query Azure App Service Function Apps using SQL" +description: "Allows users to query Azure App Service Function Apps." +--- -A function app is the container that hosts the execution of individual functions. +# Table: azure_app_service_function_app - Query Azure App Service Function Apps using SQL + +Azure App Service is a fully managed platform for building, deploying, and scaling web apps. Azure Function Apps, a part of Azure App Service, is a serverless compute service that lets you run event-triggered code without having to provision or manage infrastructure. It enables developers to host and run chunks of code, or "functions," in the cloud, without needing to create a virtual machine or publish a web application. + +## Table Usage Guide + +The 'azure_app_service_function_app' table provides insights into Function Apps within Azure App Service. As a DevOps engineer, explore Function App-specific details through this table, including App settings, connection strings, default hostname, and associated metadata. Utilize it to uncover information about Function Apps, such as those with specific configurations, the relationships between apps, and the verification of connection strings. The schema presents a range of attributes of the Function App for your analysis, like the app service plan id, creation date, default hostname, and associated tags. ## Examples ### List of app functions which accepts HTTP traffic +Identify Azure app functions that accept HTTP traffic to assess potential security risks and ensure secure communication protocols are in place. ```sql select @@ -20,6 +30,7 @@ where ### List of all unreserved app function +Explore which Azure app service function apps are not reserved. This is useful for identifying potential resource allocation inefficiencies and optimizing your cloud infrastructure. ```sql select @@ -34,6 +45,7 @@ where ### Outbound IP addresses and possible outbound IP addresses info of each function app +Explore the outbound IP addresses associated with each function app to understand potential network communication paths. This is useful in identifying and managing the network traffic routes for your application. ```sql select @@ -46,6 +58,7 @@ from ### List of app functions where client certificate mode is disabled. +Explore which Azure app service functions have the client certificate mode disabled. This can be useful for identifying potential security vulnerabilities in your application services. ```sql select @@ -57,4 +70,4 @@ from azure_app_service_function_app where not client_cert_enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_app_service_plan.md b/docs/tables/azure_app_service_plan.md index 079716c0..4de029f3 100644 --- a/docs/tables/azure_app_service_plan.md +++ b/docs/tables/azure_app_service_plan.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_plan +--- +title: "Steampipe Table: azure_app_service_plan - Query Azure App Service Plans using SQL" +description: "Allows users to query Azure App Service Plans." +--- -An App Service plan defines a set of compute resources for a web app to run. These compute resources are analogous to the server farm in conventional web hosting. +# Table: azure_app_service_plan - Query Azure App Service Plans using SQL + +Azure App Service Plan is a component of Azure App Service, the platform that runs and manages web applications. This service plan allocates the resources your web app will use. It determines the number of VM instances that will be used to run the app and it affects the cost. + +## Table Usage Guide + +The 'azure_app_service_plan' table provides insights into App Service Plans within Azure App Service. As a DevOps engineer, explore service plan-specific details through this table, including the number of workers, kind of operating system, and associated metadata. Utilize it to uncover information about service plans, such as the maximum number of workers, the reserved status, and the targeted worker size. The schema presents a range of attributes of the App Service Plan for your analysis, like the resource group, kind, status, and associated tags. ## Examples ### App service plan SKU info +Gain insights into the various specifications of your Azure App Service Plan, such as the SKU family, name, size, tier, and capacity. This is useful in understanding the resources allocated to your application, which can help in optimizing performance and cost. ```sql select @@ -20,6 +30,7 @@ from ### List of Hyper-V container app service plan +Explore which Azure app service plans are using Hyper-V containers and understand their distribution across different regions. This can be useful for assessing the distribution and usage of Hyper-V containers in your Azure environment. ```sql select @@ -35,6 +46,7 @@ where ### List of App service plan that owns spot instances +Explore which Azure App Service plans own spot instances to better manage your resources and costs in different regions and resource groups. This is particularly useful for identifying potential cost savings and optimizing resource allocation. ```sql select diff --git a/docs/tables/azure_app_service_web_app.md b/docs/tables/azure_app_service_web_app.md index 5abb830c..b80db3c1 100644 --- a/docs/tables/azure_app_service_web_app.md +++ b/docs/tables/azure_app_service_web_app.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_web_app +--- +title: "Steampipe Table: azure_app_service_web_app - Query Azure App Service Web Apps using SQL" +description: "Allows users to query Azure App Service Web Apps" +--- -Azure App Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends. +# Table: azure_app_service_web_app - Query Azure App Service Web Apps using SQL + +Azure App Service is a fully managed platform for building, deploying, and scaling web apps. You can host and scale web apps in Azure with minimal to zero code changes. Azure App Service not only adds the power of Microsoft Azure to your application, such as security, load balancing, and automated management, but also provides the ability to build a web app in your favorite language, be it .NET, .NET Core, Java, Ruby, Node.js, PHP, or Python. + +## Table Usage Guide + +The 'azure_app_service_web_app' table provides insights into web apps within Azure App Service. As a DevOps engineer, explore web app-specific details through this table, including app settings, configuration details, and associated metadata. Utilize it to uncover information about web apps, such as those with specific configurations, the relationships between different apps, and the verification of app settings. The schema presents a range of attributes of the web app for your analysis, like the app name, resource group, kind, location, and associated tags. ## Examples ### Outbound IP addresses and possible outbound IP addresses info of each web app +Analyze the settings to understand the outbound IP addresses currently in use and potential future ones for each web application. This can help in planning and managing network configurations for improved security and performance. ```sql select @@ -16,6 +26,7 @@ from ``` ### List web apps which accepts HTTP traffics (i.e HTTPS only is disabled) +Discover the segments of your web applications that are potentially insecure by identifying which ones are accepting HTTP traffic. This is useful for understanding where your system may be vulnerable to unencrypted data transfer, aiding in enhancing your overall security measures. ```sql select @@ -30,6 +41,7 @@ where ``` ### List of web app where client certificate mode is disabled +Explore which web applications on Azure App Service have the client certificate mode disabled. This can be useful in identifying potential security risks, as applications without client certificates may be more vulnerable to unauthorized access. ```sql select @@ -44,6 +56,7 @@ where ``` ### Host names of each web app +Analyze the settings to understand the geographical distribution and organization of your Azure web applications. This can help you manage resources more effectively and plan for scalability. ```sql select @@ -57,6 +70,7 @@ from ``` ### List web apps with latest HTTP version +Explore which Azure web apps are enabled with the latest HTTP version. This can be useful in identifying potential updates needed for apps running on older HTTP versions. ```sql select @@ -70,6 +84,7 @@ where ``` ### List web apps that have FTP deployments set to disabled +Determine the areas in which web apps are operating with FTP deployments disabled. This can be beneficial for auditing security measures and ensuring compliance with company policies that disallow FTP deployments. ```sql select @@ -82,6 +97,7 @@ where ``` ### List web apps that have managed service identity disabled +Discover the segments that have the managed service identity feature disabled in your web applications. This is useful in identifying potential security risks as it allows you to pinpoint applications that might not be properly utilizing Azure's built-in identity management features. ```sql select @@ -96,6 +112,7 @@ where ``` ### Get the storage information associated to a particular app +Explore the storage details linked to a specific application within a designated resource group to better manage and allocate resources. This is particularly useful for optimizing storage utilization and planning for future capacity needs. ```sql select diff --git a/docs/tables/azure_app_service_web_app_slot.md b/docs/tables/azure_app_service_web_app_slot.md index a4405989..bb896867 100644 --- a/docs/tables/azure_app_service_web_app_slot.md +++ b/docs/tables/azure_app_service_web_app_slot.md @@ -1,10 +1,20 @@ -# Table: azure_app_service_web_app +--- +title: "Steampipe Table: azure_app_service_web_app_slot - Query Azure App Service Web App Slots using SQL" +description: "Allows users to query Azure App Service Web App Slots" +--- -When you deploy your web app on Linux, mobile back end, or API app to Azure App Service, you can use a separate deployment slot instead of the default production slot when running in the Standard, Premium, or Isolated App Service plan tier. Deployment slots are live apps with their host names. App content and configuration elements can be swapped between two deployment slots, including the production slot. +# Table: azure_app_service_web_app_slot - Query Azure App Service Web App Slots using SQL + +Azure App Service is a fully managed platform for building, deploying, and scaling web apps. You can host web apps, mobile app back ends, RESTful APIs, or automated business processes. Web App Slots are live apps with their own hostnames that are used to deploy different versions of an app and then swap them to production with zero downtime. + +## Table Usage Guide + +The 'azure_app_service_web_app_slot' table provides insights into Web App Slots within Azure App Service. As a DevOps engineer, explore slot-specific details through this table, including configuration settings, app service plans, and associated metadata. Utilize it to uncover information about slots, such as those in stopped state, the configuration settings of each slot, and the verification of app service plans. The schema presents a range of attributes of the Web App Slot for your analysis, like the slot name, kind, fully qualified domain name, and associated tags. ## Examples ### Basic info +Explore which web application slots in Azure App Service are currently active and when they were last modified. This can be useful to manage and monitor your application deployment slots. ```sql select @@ -22,6 +32,7 @@ from ``` ### List slots where the apps are enabled +Explore which slots have apps enabled to gain insights into active app usage and distribution. This can be beneficial for managing resources and optimizing app performance. ```sql select @@ -40,6 +51,7 @@ where ``` ### List slots that accept HTTP traffic (i.e only HTTPS is disabled) +Explore which Azure App Service slots are configured to accept HTTP traffic, allowing you to identify potential security vulnerabilities where HTTPS is not enforced. This could be useful in a security audit to ensure all web applications are using secure protocols. ```sql select @@ -54,6 +66,7 @@ where ``` ### Host names of each slot +Explore which web application slots are hosted in different regions and resource groups. This can aid in managing and organizing your Azure App Service resources effectively. ```sql select @@ -67,6 +80,7 @@ from ``` ### List enabled host names +Explore which web application slots in your Azure App Service are currently enabled. This can be useful for managing your resources and understanding the active components within your cloud environment. ```sql select @@ -80,6 +94,7 @@ from ``` ### Get slot swap status of each slot +Assess the status of slot swaps within your application, identifying the source and destination of each swap. This allows you to track changes and manage your app's performance effectively. ```sql select @@ -93,6 +108,7 @@ from ``` ### Get site config details of each slot +Assess the configuration details of each web application slot to gain insights into the number of workers, enabled features, and software versions installed. This can help in managing resources and ensuring optimal performance. ```sql select @@ -121,4 +137,4 @@ select site_config ->> 'DocumentRoot' as DocumentRoot from azure_app_service_web_app_slot; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_application_gateway.md b/docs/tables/azure_application_gateway.md index d6173a45..63fb541f 100644 --- a/docs/tables/azure_application_gateway.md +++ b/docs/tables/azure_application_gateway.md @@ -1,10 +1,20 @@ -# Table: azure_application_gateway +--- +title: "Steampipe Table: azure_application_gateway - Query Azure Network Application Gateways using SQL" +description: "Allows users to query Azure Network Application Gateways" +--- -Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. Traditional load balancers operate at the transport layer (OSI layer 4 - TCP and UDP) and route traffic based on source IP address and port, to a destination IP address and port. Application Gateway can make routing decisions based on additional attributes of an HTTP request, for example URI path or host headers. +# Table: azure_application_gateway - Query Azure Network Application Gateways using SQL + +An Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. It operates at the application layer (Layer 7) of the Open Systems Interconnection (OSI) model. This service provides routing capabilities and can make routing decisions based on additional attributes of an HTTP request, for instance, URI path or host headers. + +## Table Usage Guide + +The 'azure_application_gateway' table provides insights into Application Gateways within Azure Network. As a Network Engineer, explore Application Gateway-specific details through this table, including backend configurations, SSL policy, and associated metadata. Utilize it to uncover information about Application Gateways, such as their SKU, operational state, and the verification of SSL policies. The schema presents a range of attributes of the Application Gateway for your analysis, like the gateway's ID, name, type, region, and associated tags. ## Examples ### Basic info +Explore which application gateways in your Azure environment are currently being provisioned and where they are located. This is beneficial for keeping track of your network resources and their geographical distribution. ```sql select @@ -18,6 +28,7 @@ from ``` ### List web application firewall configurations for application gateway +Analyze the settings to understand the configurations of your web application firewall for application gateways. This can help you assess its current status, identify any disabled rule groups, exclusions, and understand the limitations such as file upload limit and maximum request body size. ```sql select @@ -37,6 +48,7 @@ from ``` ### List http listeners for application gateway +Determine the areas in which HTTP listeners for the application gateway are configured. This is useful for understanding the setup and configuration of your application gateway, particularly for troubleshooting or optimizing network traffic management. ```sql select @@ -54,6 +66,7 @@ from ``` ### List backend http settings collection for application gateway +This query aids in gaining insights into the backend HTTP settings for an application gateway. It's particularly useful for understanding settings such as cookie-based affinity, host name selection, port, protocol, and request timeout, which can help optimize the application gateway's performance and security. ```sql select @@ -72,6 +85,7 @@ from ``` ### List frontend IP configurations for application gateway +This example helps you identify the different frontend IP configurations for your application gateway in Azure. It's useful for managing and understanding the various IP settings associated with your application gateway, including public and private IP allocations. ```sql select @@ -84,4 +98,4 @@ select from azure_application_gateway, jsonb_array_elements(frontend_ip_configurations) as config; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_application_insight.md b/docs/tables/azure_application_insight.md index f7afa305..8fba834e 100644 --- a/docs/tables/azure_application_insight.md +++ b/docs/tables/azure_application_insight.md @@ -1,10 +1,20 @@ -# Table: azure_application_insight +--- +title: "Steampipe Table: azure_application_insight - Query Azure Monitor Application Insights using SQL" +description: "Allows users to query Application Insights from Azure Monitor." +--- -Application Insights is an extension of Azure Monitor and provides Application Performance Monitoring (also known as “APM”) features. +# Table: azure_application_insight - Query Azure Monitor Application Insights using SQL + +Application Insights is an extensible Application Performance Management (APM) service for developers and DevOps professionals. It is part of Azure Monitor. You can use it to monitor your live applications. It will automatically detect performance anomalies, and includes powerful analytics tools to help you diagnose issues and to understand what users actually do with your app. + +## Table Usage Guide + +The 'azure_application_insight' table provides insights into Application Insights within Azure Monitor. As a DevOps professional, explore specific details through this table, including application types, instrumentation keys, and associated metadata. Utilize it to uncover information about applications, such as the application type, the resource group it belongs to, and the region it is hosted in. The schema presents a range of attributes of the Application Insight for your analysis, like the application type, resource group, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure Application Insights to gain insights into the retention period and geographical distribution. This can help in assessing resource allocation and data management strategies. ```sql select @@ -18,6 +28,7 @@ from ``` ### List application insights having retention period less than 30 days +Explore which application insights have a retention period of less than 30 days to manage data storage and optimize resource use in the Azure environment. This is useful for identifying potential areas of cost reduction and ensuring compliance with data retention policies. ```sql select @@ -33,6 +44,7 @@ where ``` ### List insights that can be queried publicly +Explore which Azure Application Insights are publicly accessible, allowing you to identify potential areas of vulnerability and manage access control more effectively. This query is particularly useful for enhancing data security and maintaining compliance. ```sql select @@ -48,6 +60,7 @@ where ``` ### List insights that allow ingestion publicly +Explore which application insights within your Azure environment are configured to allow public network access for data ingestion. This can help in assessing potential security risks and improving data management strategies. ```sql select diff --git a/docs/tables/azure_application_security_group.md b/docs/tables/azure_application_security_group.md index 014750a8..120b0199 100644 --- a/docs/tables/azure_application_security_group.md +++ b/docs/tables/azure_application_security_group.md @@ -1,10 +1,20 @@ -# Table: azure_application_security_groups +--- +title: "Steampipe Table: azure_application_security_group - Query Azure Network Security Groups using SQL" +description: "Allows users to query Azure Application Security Groups" +--- -Application security groups enable you to configure network security as a natural extension of an application's structure, allowing you to group virtual machines and define network security policies based on those groups. +# Table: azure_application_security_group - Query Azure Network Security Groups using SQL + +An Azure Application Security Group is a network security feature provided by Azure Network Security Groups. It allows users to define fine-grained network policies based on workloads, centralized on applications, instead of explicit IP addresses. Application Security Groups provide a tool to manage the network security policy at scale and increases the manageability of security policies. + +## Table Usage Guide + +The 'azure_application_security_group' table provides insights into Application Security Groups within Azure Network Security Groups. As a Network Administrator, explore group-specific details through this table, including security rules, associated network interfaces, and associated metadata. Utilize it to uncover information about groups, such as those with certain security rules, the relationships between different groups, and the verification of security policies. The schema presents a range of attributes of the Application Security Group for your analysis, like the resource group, location, type, and associated tags. ## Examples ### Basic info +Discover the segments of your Azure application security groups, such as their names and regions, to better understand their distribution and organization within your resource groups. ```sql select @@ -17,6 +27,7 @@ from ### List of application security group without application tag key +Explore which Azure Application Security Groups lack the 'application' tag key. This is useful for identifying potential gaps in your tagging strategy, which could impact resource tracking and management. ```sql select @@ -26,4 +37,4 @@ from azure_application_security_group where not tags :: JSONB ? 'application'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_automation_account.md b/docs/tables/azure_automation_account.md index 13c4e66b..8495575f 100644 --- a/docs/tables/azure_automation_account.md +++ b/docs/tables/azure_automation_account.md @@ -1,10 +1,20 @@ -# Table: azure_automation_account +--- +title: "Steampipe Table: azure_automation_account - Query Azure Automation Accounts using SQL" +description: "Allows users to query Azure Automation Accounts." +--- - Automation accounts allow you to isolate your Automation resources, runbooks, assets, and configurations from the resources of other accounts. You can use Automation accounts to separate resources into separate logical environments or delegated responsibilities. +# Table: azure_automation_account - Query Azure Automation Accounts using SQL + +Azure Automation is a service in Microsoft Azure that allows users to automate their manual, long-running, error-prone, and frequently repeated tasks. It provides process automation, update management and configuration features, and integrates with other popular DevOps tools. Azure Automation helps users to focus on work that adds business value by reducing the time spent on routine tasks. + +## Table Usage Guide + +The 'azure_automation_account' table provides insights into Automation Accounts within Azure Automation. As a DevOps engineer, explore account-specific details through this table, including the account's name, ID, location, and type. Utilize it to uncover information about accounts, such as their provisioning state, creation time, last modified time, and their SKU. The schema presents a range of attributes of the Automation Account for your analysis, like the subscription ID, tenant ID, resource group, and associated tags. ## Examples ### Basic info +Explore the different automation accounts within your Azure environment, including their names and associated resource groups. This can help you manage and organize your resources more effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List accounts that are created in last 30 days +Gain insights into newly created accounts in the past month. This query is useful for tracking recent account activity and managing resources within Azure automation. ```sql select @@ -32,6 +43,7 @@ where ``` ### List accounts that are suspended +Explore which Azure Automation accounts are currently suspended. This can be useful in identifying any potential issues or disruptions in your automation tasks and processes. ```sql select @@ -45,4 +57,4 @@ from azure_automation_account where state = 'AccountStateSuspended'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_automation_variable.md b/docs/tables/azure_automation_variable.md index ba1f6af2..99c13ea6 100644 --- a/docs/tables/azure_automation_variable.md +++ b/docs/tables/azure_automation_variable.md @@ -1,10 +1,20 @@ -# Table: azure_automation_variable +--- +title: "Steampipe Table: azure_automation_variable - Query Azure Automation Variables using SQL" +description: "Allows users to query Azure Automation Variables" +--- -Variable assets are values that are available to all runbooks and DSC configurations in your Automation account. You can manage them from the Azure portal, from PowerShell, within a runbook, or in a DSC configuration. +# Table: azure_automation_variable - Query Azure Automation Variables using SQL + +Azure Automation is a service that allows you to automate your Azure management tasks and to orchestrate actions across external systems from right within Azure. Variables in Azure Automation are used to store values that can be accessed across runbooks and modules during their execution. These variables can store different types of values, such as strings, integers, Booleans, and DateTime values. + +## Table Usage Guide + +The 'azure_automation_variable' table provides insights into Variables within Azure Automation. As a DevOps engineer, explore variable-specific details through this table, including names, types, values, and descriptions. Utilize it to uncover information about variables, such as those with specific values, the encrypted status of the variables, and the last time they were updated. The schema presents a range of attributes of the Automation Variable for your analysis, like the variable id, creation time, last modified time, and associated tags. ## Examples ### Basic info +Explore the basic information of Azure Automation Variables to understand the type and encryption status. This can help in managing and securing the automation environment. ```sql select @@ -19,6 +29,7 @@ from ``` ### List variables that are unencrypted +Discover the segments that contain unencrypted variables within your Azure Automation account. This is useful for identifying potential security risks and ensuring that all sensitive information is adequately protected. ```sql select @@ -35,6 +46,7 @@ where ``` ### List variables created in last 30 days +Discover the segments that have been newly added in the past month, which can be useful in understanding recent changes or additions to your system. This can help in assessing the elements within your system that have been recently modified or created. ```sql select @@ -52,6 +64,7 @@ where ``` ### Get details of a variable +Explore the specific settings of a variable within a given account and resource group in Azure Automation. This is useful for assessing the elements within your automation environment, such as identifying if a variable is encrypted or not. ```sql select @@ -67,4 +80,4 @@ where account_name = 'turbot_account' and name = 'turbot' and resource_group = 'turbot_rg'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_bastion_host.md b/docs/tables/azure_bastion_host.md index d3edd54b..d6832027 100644 --- a/docs/tables/azure_bastion_host.md +++ b/docs/tables/azure_bastion_host.md @@ -1,10 +1,20 @@ -# Table: azure_bastion_host +--- +title: "Steampipe Table: azure_bastion_host - Query Azure Bastion Hosts using SQL" +description: "Allows users to query Azure Bastion Hosts to retrieve information about the state, configurations, and associated resources." +--- -Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal, or via the native SSH or RDP client already installed on your local computer. The Azure Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. When you connect via Azure Bastion, your virtual machines don't need a public IP address, agent, or special client software. +# Table: azure_bastion_host - Query Azure Bastion Hosts using SQL + +Azure Bastion is a fully managed network security service that provides secure and seamless RDP and SSH access to your virtual machines directly from the Azure portal. Azure Bastion is provisioned directly in your Virtual Network (VNet) and supports all VMs in your VNet. Using Azure Bastion protects your virtual machines from exposing RDP/SSH ports to the outside world, while providing secure access to manage your VMs. + +## Table Usage Guide + +The 'azure_bastion_host' table provides insights into Bastion Hosts within Azure Bastion service. As an IT administrator, explore host-specific details through this table, including its state, configurations, and associated resources. Utilize it to uncover information about hosts, such as those with specific configurations, the associated subnets, and the verification of their state. The schema presents a range of attributes of the Bastion Host for your analysis, like the host name, provisioning state, type, id, and associated tags. ## Examples ### Basic info +Explore which Azure Bastion Hosts are currently provisioned and where they are located. This helps in managing resources and planning deployment strategies across different regions. ```sql select @@ -18,6 +28,7 @@ from ``` ### List bastion hosts that are in failed state +Discover the segments that have bastion hosts in a failed state. This can help in identifying and troubleshooting problematic hosts, ensuring the stability and security of your Azure environment. ```sql select @@ -33,6 +44,7 @@ where ``` ### Get subnet details associated with each host +Discover the network organization of your Azure resources by identifying the specific subnets associated with each bastion host. This allows for efficient infrastructure management and helps in identifying potential network vulnerabilities. ```sql select @@ -49,6 +61,7 @@ where ``` ### Get IP configuration details associated with each host +Explore the IP configurations linked to each host in your Azure environment to gain insights into allocation methods and SKU details. This can help in managing and optimizing your network resources in Azure. ```sql select diff --git a/docs/tables/azure_batch_account.md b/docs/tables/azure_batch_account.md index ab28422e..fd29d86e 100644 --- a/docs/tables/azure_batch_account.md +++ b/docs/tables/azure_batch_account.md @@ -1,10 +1,20 @@ -# Table: azure_batch_account +--- +title: "Steampipe Table: azure_batch_account - Query Azure Batch Accounts using SQL" +description: "Allows users to query Azure Batch Accounts." +--- -An Azure Batch account is a uniquely identified entity within the Batch service. Most Batch solutions use Azure Storage for storing resource files and output files, so each Batch account is usually associated with a corresponding storage account. +# Table: azure_batch_account - Query Azure Batch Accounts using SQL + +Azure Batch is a cloud-based job scheduling service that parallelizes and distributes the processing of large volumes of data across many computers. It is designed for high-performance computing (HPC) applications, enabling developers and scientists to run large-scale parallel and high-performance computing (HPC) applications efficiently in the cloud. Azure Batch creates and manages a pool of compute nodes (virtual machines), installs the applications you want to run, and schedules jobs to run on the nodes. + +## Table Usage Guide + +The 'azure_batch_account' table provides insights into Batch Accounts within Azure Batch. As a DevOps engineer, explore account-specific details through this table, including the provisioning state, pool allocation mode, and associated metadata. Utilize it to uncover information about accounts, such as those with public network access, the key vault reference, and the verification of pool allocation mode. The schema presents a range of attributes of the Batch Account for your analysis, like the account name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Batch accounts are active and their dedicated core quota limits, to manage resource allocation and prevent potential overuse. This helps in maintaining cost-effective and efficient operations within your Azure environment. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed batch accounts +Explore which batch accounts in your Azure environment have failed to provision. This is useful for identifying and addressing potential issues in resource allocation or configuration. ```sql select @@ -32,4 +43,4 @@ from azure_batch_account where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_cognitive_account.md b/docs/tables/azure_cognitive_account.md index 2451f514..755f15ea 100644 --- a/docs/tables/azure_cognitive_account.md +++ b/docs/tables/azure_cognitive_account.md @@ -1,10 +1,20 @@ -# Table: azure_cognitive_account +--- +title: "Steampipe Table: azure_cognitive_account - Query Azure Cognitive Services Accounts using SQL" +description: "Allows users to query Azure Cognitive Services Accounts." +--- -Azure Cognitive Services are cloud-based services with REST APIs and client library SDKs available to help you build cognitive intelligence into your applications. You can add cognitive features to your applications without having artificial intelligence (AI) or data science skills. Azure Cognitive Services comprise various AI services that enable you to build cognitive solutions that can see, hear, speak, understand, and even make decisions. +# Table: azure_cognitive_account - Query Azure Cognitive Services Accounts using SQL + +Azure Cognitive Services is a suite of artificial intelligence (AI) services and cognitive APIs to help you build intelligent apps. It provides developers with APIs that help in building applications that can see, hear, speak, understand, and even begin to reason. The APIs are designed to be easy to use, while also providing a comprehensive set of capabilities. + +## Table Usage Guide + +The 'azure_cognitive_account' table provides insights into Cognitive Services Accounts within Azure Cognitive Services. As a DevOps engineer, explore account-specific details through this table, including the kind of cognitive service, the network rules set, and associated metadata. Utilize it to uncover information about accounts, such as those with specific capabilities, the network rules applied to them, and the status of the accounts. The schema presents a range of attributes of the Cognitive Services Account for your analysis, like the account name, creation date, endpoint, and associated tags. ## Examples ### Basic info +Explore which Azure cognitive accounts are currently being provisioned, by understanding their type and kind. This can help in managing resources and planning for capacity. ```sql select @@ -18,6 +28,7 @@ from ``` ### List accounts with enabled public network access +Determine the areas in which public network access is enabled within your Azure cognitive accounts. This can assist in identifying potential security risks and ensuring your data remains protected. ```sql select @@ -34,6 +45,7 @@ where ``` ### List private endpoint connection details for accounts +This example helps in exploring the details of private endpoint connections linked to cognitive accounts in Azure. It can assist in understanding the connections' status and type, which is essential for managing network accessibility and ensuring secure data communication. ```sql select @@ -50,6 +62,7 @@ from ``` ### List diagnostic setting details for accounts +This query allows you to analyze the diagnostic settings of your Azure Cognitive Services accounts. It's useful for understanding the log and metric settings of each account, which can help in monitoring and troubleshooting. ```sql select @@ -64,4 +77,4 @@ select from azure_cognitive_account, jsonb_array_elements(diagnostic_settings) as settings; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_availability_set.md b/docs/tables/azure_compute_availability_set.md index 13232a08..5150c186 100644 --- a/docs/tables/azure_compute_availability_set.md +++ b/docs/tables/azure_compute_availability_set.md @@ -1,10 +1,20 @@ -# Table: azure_compute_availability_set +--- +title: "Steampipe Table: azure_compute_availability_set - Query Azure Compute Availability Sets using SQL" +description: "Allows users to query Azure Compute Availability Sets." +--- -An Availability Set is a logical grouping capability for isolating VM resources from each other when they're deployed. +# Table: azure_compute_availability_set - Query Azure Compute Availability Sets using SQL + +An Azure Compute Availability Set is a logical grouping capability that you can use in Azure to ensure that the VM resources you place within it are isolated from each other when they are deployed within an Azure datacenter. Azure ensures that the VMs you place within an Availability Set run across multiple physical servers, compute racks, storage units, and network switches. This is particularly useful for building high availability applications and protecting your applications from planned or unplanned maintenance. + +## Table Usage Guide + +The 'azure_compute_availability_set' table provides insights into the Availability Sets within Azure Compute. As a DevOps engineer, explore Availability Set-specific details through this table, including fault domain count, update domain count, and associated metadata. Utilize it to uncover information about Availability Sets, such as those with specific virtual machine profiles, the virtual machines within an availability set, and the verification of fault and update domains. The schema presents a range of attributes of the Availability Set for your analysis, like the set name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Compute Availability Sets are in a specific region and assess the count of fault and update domains within them. This can help in managing and planning resource distribution across various domains and regions. ```sql select @@ -18,6 +28,7 @@ from ### List of availability sets which does not use managed disks configuration +Identify instances where availability sets in Azure are not utilizing the managed disks configuration. This is beneficial in pinpointing areas where you could optimize your resources for improved performance and management. ```sql select @@ -31,6 +42,7 @@ where ### List of availability sets without application tag key +Discover the segments that lack specific application tag keys within the Azure compute availability sets. This query is useful for identifying potential areas of misconfiguration or missing data. ```sql select @@ -40,4 +52,4 @@ from azure_compute_availability_set where not tags :: JSONB ? 'application'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk.md b/docs/tables/azure_compute_disk.md index 9e003d7e..c3a1ce86 100644 --- a/docs/tables/azure_compute_disk.md +++ b/docs/tables/azure_compute_disk.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk +--- +title: "Steampipe Table: azure_compute_disk - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks." +--- -Azure Managed Disks are the new and recommended disk storage offering for use with Azure virtual machines for persistent storage of data. +# Table: azure_compute_disk - Query Azure Compute Disks using SQL + +Azure Compute Disks are durable, high-performance, secure disk storage for Azure Virtual Machines. They provide persistent, secured disk storage and support for industry-leading data protection capabilities. Azure Compute Disks can be used with Azure Virtual Machines to deliver high-performance and highly durable disk storage. + +## Table Usage Guide + +The 'azure_compute_disk' table provides insights into Azure Compute Disks within Azure Compute service. As a DevOps engineer, explore disk-specific details through this table, including disk size, creation time, encryption settings, and associated metadata. Utilize it to uncover information about disks, such as the ones with specific encryption settings, the type of disks, and their provisioning state. The schema presents a range of attributes of the Azure Compute Disk for your analysis, like the disk ID, creation time, disk state, and associated tags. ## Examples ### List of all premium tier compute disks +Determine the areas in which premium tier compute disks are being utilized within the Azure environment. This can be beneficial for cost management and resource optimization. ```sql select @@ -19,6 +29,7 @@ where ### List of unattached disks +Determine the areas in which there are unattached disks within your Azure Compute service. This can help you identify unused resources and potential cost savings. ```sql select @@ -32,6 +43,7 @@ where ### Size and performance info of each disk +Explore the performance and capacity of each disk in your Azure Compute environment. This information can be crucial for optimizing resource allocation and ensuring efficient data operations. ```sql select @@ -47,6 +59,7 @@ from ### List of compute disks which are not available in multiple az +Determine the areas in which certain compute disks are not available across multiple Azure availability zones. This is useful in identifying potential risks to data redundancy and disaster recovery plans. ```sql select @@ -62,6 +75,7 @@ where ### List of compute disks which are not encrypted with customer key +Discover the segments of your Azure compute disks that are not utilizing customer key encryption. This is beneficial in identifying potential security vulnerabilities and ensuring data protection standards are met. ```sql select @@ -71,4 +85,4 @@ from azure_compute_disk where encryption_type <> 'EncryptionAtRestWithCustomerKey'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_access.md b/docs/tables/azure_compute_disk_access.md index f01634a9..6e10452b 100644 --- a/docs/tables/azure_compute_disk_access.md +++ b/docs/tables/azure_compute_disk_access.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_access +--- +title: "Steampipe Table: azure_compute_disk_access - Query Azure Compute Disk Accesses using SQL" +description: "Allows users to query Azure Compute Disk Accesses" +--- -Disk access resource is required to use private link to export and import managed disks, first you create a disk access resource and link it to a virtual network in the same subscription by creating a private endpoint. Then, associate a disk or a snapshot with a disk access instance. +# Table: azure_compute_disk_access - Query Azure Compute Disk Accesses using SQL + +Azure Compute Disk Access is a feature within Microsoft Azure that enables and controls access to managed disks, snapshots, and images. It provides a secure way to grant permissions to read or write data from these resources. Disk Access resources are Azure Resource Manager resources that can be created and managed just like other Azure resources. + +## Table Usage Guide + +The 'azure_compute_disk_access' table provides insights into Disk Accesses within Azure Compute. As a DevOps engineer, explore specific details through this table, including the network access policy, disk encryption set ID, and associated metadata. Utilize it to uncover information about disk accesses, such as those with unrestricted network access, the associated disk encryption sets, and the verification of network access policies. The schema presents a range of attributes of the Disk Access for your analysis, like the resource ID, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure compute disk access to understand its state and group allocation. This can help you manage and optimize your resources effectively. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed disk accesses +Explore which disk accesses in your Azure Compute resource have failed. This is useful for diagnosing system issues and ensuring optimal performance of your resources. ```sql select @@ -30,4 +41,4 @@ from azure_compute_disk_access where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_encryption_set.md b/docs/tables/azure_compute_disk_encryption_set.md index cb9c97bb..d66369ca 100644 --- a/docs/tables/azure_compute_disk_encryption_set.md +++ b/docs/tables/azure_compute_disk_encryption_set.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_encryption_set +--- +title: "Steampipe Table: azure_compute_disk_encryption_set - Query Azure Compute Disk Encryption Sets using SQL" +description: "Allows users to query Azure Compute Disk Encryption Sets." +--- -Disk Encryption Set simplifies the key management for managed disks. When a disk encryption set is created, a system-assigned managed identity is created in Azure Active Directory (AD) and associated with the disk encryption set. +# Table: azure_compute_disk_encryption_set - Query Azure Compute Disk Encryption Sets using SQL + +Azure Disk Encryption is a capability that helps you encrypt your Windows and Linux IaaS virtual machine disks. Disk Encryption Sets are a resource in Azure that contain and manage the key for server-side encryption of Azure managed disks and snapshots. It simplifies the key management for disk encryption and allows you to use Customer Managed Keys for managed disks instead of platform-managed keys. + +## Table Usage Guide + +The 'azure_compute_disk_encryption_set' table provides insights into Disk Encryption Sets within Azure Compute. As a security engineer, explore Disk Encryption Set-specific details through this table, including the encryption type, key URL, and source vault. Utilize it to uncover information about encryption sets, such as those with server-side encryption and customer-managed keys. The schema presents a range of attributes of the Disk Encryption Set for your analysis, like the id, name, type, location, and associated tags. ## Examples ### Key vault associated with each disk encryption set +Identify the specific key vault associated with each disk encryption set in your Azure Compute environment. This is useful for managing and auditing your encryption keys and their usage. ```sql select @@ -17,6 +27,7 @@ from ### List of encryption sets which are not using customer managed key +Explore which encryption sets in Azure's Compute Disk Encryption are not utilizing customer-managed keys, providing a way to identify potential areas for enhancing data security practices. ```sql select @@ -33,6 +44,7 @@ where ### Identity info of each disk encryption set +Explore which disk encryption sets in your Azure Compute resources have specific identities associated with them. This can help in assessing security configurations and managing access control within your environment. ```sql select diff --git a/docs/tables/azure_compute_disk_metric_read_ops.md b/docs/tables/azure_compute_disk_metric_read_ops.md index 03b106bd..909fece2 100644 --- a/docs/tables/azure_compute_disk_metric_read_ops.md +++ b/docs/tables/azure_compute_disk_metric_read_ops.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_read_ops +--- +title: "Steampipe Table: azure_compute_disk_metric_read_ops - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks read operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_read_ops` table provides metric statistics at 5 minutes intervals for the most recent 5 days. +# Table: azure_compute_disk_metric_read_ops - Query Azure Compute Disks using SQL + +Azure Compute Disks are a type of Azure Storage that provide high-performance, durable block storage for Azure Virtual Machines. These disks are designed to support I/O-intensive workloads and offer seamless integration with Azure Virtual Machines. They provide consistent low-latency performance, deliver high IOPS/throughput, and ensure data durability and availability. + +## Table Usage Guide + +The 'azure_compute_disk_metric_read_ops' table provides insights into read operations metrics of Azure Compute Disks. As a DevOps engineer, explore specific details through this table, including the time grain, average, minimum, and maximum read operations. Utilize it to monitor and analyze the performance of your disks, such as those with high read operations, the average read operations over a period, and the peak read operations. The schema presents a range of attributes of the read operations metrics for your analysis, like the unit, timestamp, and total count. ## Examples ### Basic info +Explore the performance of Azure Compute Disks over time to identify potential bottlenecks or inefficiencies. This query provides a historical overview of disk operations, helping you pinpoint areas for optimization or resource allocation. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Determine the areas in which Azure compute disk read operations exceed an average of 10 bytes. This can be useful for identifying potential performance bottlenecks or areas where optimization may be beneficial. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_read_ops_daily.md b/docs/tables/azure_compute_disk_metric_read_ops_daily.md index e9bb1817..dcd46e1e 100644 --- a/docs/tables/azure_compute_disk_metric_read_ops_daily.md +++ b/docs/tables/azure_compute_disk_metric_read_ops_daily.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_read_ops_daily +--- +title: "Steampipe Table: azure_compute_disk_metric_read_ops_daily - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks daily read operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_read_ops_daily` table provides metric statistics at 24 hours intervals for the most recent 1 year. +# Table: azure_compute_disk_metric_read_ops_daily - Query Azure Compute Disks using SQL + +Azure Compute Disks are a key component of Azure Infrastructure-as-a-Service (IaaS) based solutions, providing high-performance, reliable, and resilient block storage for Azure Virtual Machines. They support a wide range of workloads like relational databases, high-volume transactional systems, and big data applications. Azure Compute Disks offer a variety of disk storage options to meet varying workload requirements. + +## Table Usage Guide + +The 'azure_compute_disk_metric_read_ops_daily' table provides insights into the daily read operations of Azure Compute Disks. As a system administrator or a DevOps engineer, you can explore disk-specific details through this table, including the total number of read operations, maximum and average read operations, and the time at which the maximum read operations occurred. Utilize it to monitor the performance of your disks, identify potential bottlenecks, and plan capacity. The schema presents a range of attributes of the disk read operations for your analysis, like the resource group name, subscription ID, time grain, and unit type. ## Examples ### Basic info +Explore the daily read operations metrics for Azure compute disks to understand usage patterns and performance. This can help in identifying any unusual activity or potential areas for optimization. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Explore which operations have an average higher than 10 bytes. This is useful for identifying potential areas of heavy data usage or inefficiency in your Azure compute disk metrics. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_read_ops_hourly.md b/docs/tables/azure_compute_disk_metric_read_ops_hourly.md index b9946142..d4950c58 100644 --- a/docs/tables/azure_compute_disk_metric_read_ops_hourly.md +++ b/docs/tables/azure_compute_disk_metric_read_ops_hourly.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_read_ops_hourly +--- +title: "Steampipe Table: azure_compute_disk_metric_read_ops_hourly - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks' hourly read operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_read_ops_hourly` table provides metric statistics at 1 hour intervals for the most recent 60 days. +# Table: azure_compute_disk_metric_read_ops_hourly - Query Azure Compute Disks using SQL + +Azure Compute Disks are data storage units available in Microsoft Azure, used to manage and store data persistently. These disks are designed to provide secure, scalable storage for virtual machines. They offer high-performance, durable storage for Azure Virtual Machines instances. + +## Table Usage Guide + +The 'azure_compute_disk_metric_read_ops_hourly' table provides insights into the read operations metrics of Azure Compute Disks on an hourly basis. As a DevOps engineer, you can use this table to explore disk-specific details such as the number of read operations, their time duration, and other related metadata. This can be particularly useful for monitoring disk performance, identifying potential bottlenecks, and ensuring optimal data management. The schema presents a range of attributes for your analysis, such as the disk name, resource group, subscription ID, and the count of read operations. ## Examples ### Basic info +Explore the performance of your Azure Compute Disks by analyzing the hourly read operations. This allows you to identify periods of high or low activity, assisting in capacity planning and troubleshooting performance issues. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +This query is useful to analyze disk operations that exceed an average of 10 bytes in Azure's Compute Disk service. It can help optimize system performance by identifying potential bottlenecks in disk operations. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_write_ops.md b/docs/tables/azure_compute_disk_metric_write_ops.md index ab2544d1..73e77301 100644 --- a/docs/tables/azure_compute_disk_metric_write_ops.md +++ b/docs/tables/azure_compute_disk_metric_write_ops.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_write_ops +--- +title: "Steampipe Table: azure_compute_disk_metric_write_ops - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks write operations metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_write_ops` table provides metric statistics at 5 minutes intervals for the most recent 5 days. +# Table: azure_compute_disk_metric_write_ops - Query Azure Compute Disks using SQL + +Azure Compute Disks are a type of storage that can be attached to Azure Virtual Machines. They provide persistent, secured, and highly reliable storage capabilities, allowing you to read and write data. Azure Compute Disks come in different performance tiers to support a variety of workloads and applications. + +## Table Usage Guide + +The 'azure_compute_disk_metric_write_ops' table provides insights into the write operations metrics of Azure Compute Disks. As a DevOps engineer, explore disk-specific details through this table, including total write operations, average write operations, and maximum write operations. Utilize it to monitor and analyze the performance of your Azure Compute Disks, identify any unusual increase in write operations, and optimize disk usage. The schema presents a range of attributes of the Compute Disk write operations for your analysis, like the average, maximum, minimum, and total count of write operations. ## Examples ### Basic info +Explore which Azure Compute Disk has the most write operations over time. This can help in understanding disk usage patterns and planning for potential disk capacity upgrades. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Explore disk operations that have an average higher than 10 bytes. This can be useful to monitor and manage storage performance, ensuring efficient data handling and optimal system operation. ```sql select @@ -37,4 +48,4 @@ where average > 10 order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_write_ops_daily.md b/docs/tables/azure_compute_disk_metric_write_ops_daily.md index 96ec0edc..9b0a7d5b 100644 --- a/docs/tables/azure_compute_disk_metric_write_ops_daily.md +++ b/docs/tables/azure_compute_disk_metric_write_ops_daily.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_write_ops_daily +--- +title: "Steampipe Table: azure_compute_disk_metric_write_ops_daily - Query Azure Compute Disks using SQL" +description: "Allows users to query daily write operations metrics of Azure Compute Disks." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_write_ops_daily` table provides metric statistics at 24 hours intervals for the most recent 1 year. +# Table: azure_compute_disk_metric_write_ops_daily - Query Azure Compute Disks using SQL + +Azure Compute Disks are a key component of the Azure Infrastructure-as-a-Service (IaaS) offering. These disks provide durable, secure, and scalable storage for the data that drives your applications and services. Azure Compute Disks support a variety of workloads, like relational databases, large-scale NoSQL databases, and enterprise applications, with the flexibility and security required for Azure-based virtual machines. + +## Table Usage Guide + +The 'azure_compute_disk_metric_write_ops_daily' table provides insights into the daily write operations metrics of Azure Compute Disks. As a system administrator or a DevOps engineer, you can explore disk-specific details through this table, including the time grain, average, minimum, and maximum write operations. Utilize it to uncover information about disk performance, such as spikes in write operations, periods of low activity, and overall write operation trends. The schema presents a range of attributes of the disk's write operations for your analysis, like the unit, timestamp, and the total count of write operations. ## Examples ### Basic info +Analyze the daily write operations on Azure Compute Disks to understand performance trends and identify potential areas of concern. This can help in proactive resource management and ensure optimal application performance. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Uncover the details of disk operations in your Azure Compute instances that exceed an average of 10 bytes. This allows you to monitor and manage disk usage effectively, ensuring optimal performance. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_disk_metric_write_ops_hourly.md b/docs/tables/azure_compute_disk_metric_write_ops_hourly.md index a514ed5e..3eafbcc1 100644 --- a/docs/tables/azure_compute_disk_metric_write_ops_hourly.md +++ b/docs/tables/azure_compute_disk_metric_write_ops_hourly.md @@ -1,10 +1,20 @@ -# Table: azure_compute_disk_metric_write_ops_hourly +--- +title: "Steampipe Table: azure_compute_disk_metric_write_ops_hourly - Query Azure Compute Disks using SQL" +description: "Allows users to query Azure Compute Disks metrics on an hourly basis." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_disk_metric_write_ops_hourly` table provides metric statistics at 1 hour intervals for the most recent 60 days. +# Table: azure_compute_disk_metric_write_ops_hourly - Query Azure Compute Disks using SQL + +Azure Compute Disks is a service that allows you to create and manage disks for your virtual machines. These disks can be used as system disks or data disks, and are available in different performance tiers to meet the needs of various applications and workloads. Azure Compute Disks also provide capabilities such as disk snapshots and disk backups for data protection and recovery. + +## Table Usage Guide + +The 'azure_compute_disk_metric_write_ops_hourly' table provides insights into the write operations metrics of Azure Compute Disks on an hourly basis. As a system administrator, you can use this table to explore the write operations performance of your disks, including the frequency and volume of data written to the disks. The table offers detailed metrics such as the timestamp of the data, minimum, maximum, and average write operations, and total count of write operations. Utilize it to monitor your disk performance, identify potential bottlenecks, and optimize your disk utilization for improved application performance. The schema presents a range of attributes of the disk write operations for your analysis, like the disk name, resource group, subscription ID, and more. ## Examples ### Basic info +Explore the performance of Azure compute disks by examining hourly write operations. This information can help identify potential bottlenecks or performance issues, allowing you to optimize your disk usage. ```sql select @@ -22,6 +32,7 @@ order by ``` ### Operations Over 10 Bytes average +Explore which operations have an above-average rate, allowing you to assess potential areas of high activity or strain on your system. This can be useful in managing resources and identifying potential bottlenecks or areas for optimization. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_image.md b/docs/tables/azure_compute_image.md index c8a5dc43..50b1157a 100644 --- a/docs/tables/azure_compute_image.md +++ b/docs/tables/azure_compute_image.md @@ -1,10 +1,21 @@ -# Table: azure_compute_image +--- +title: "Steampipe Table: azure_compute_image - Query Azure Compute Images using SQL" +description: "Allows users to query Azure Compute Images." +--- + +# Table: azure_compute_image - Query Azure Compute Images using SQL + +Azure Compute Images are resources within Microsoft Azure that represent a virtual machine's operating system, applications, and configuration settings. These images can be used to create multiple identical virtual machines within Azure. They provide an efficient way to package, provision, and manage VMs in your cloud environment. + +## Table Usage Guide + +The 'azure_compute_image' table provides insights into Azure Compute Images. As a DevOps engineer, explore image-specific details through this table, including publisher details, offer information, and associated metadata. Utilize it to uncover information about images, such as those used in multiple VM deployments, the publishers of these images, and the verification of image configurations. The schema presents a range of attributes of the Azure Compute Image for your analysis, like the image name, resource group, publisher, offer, SKU, and version. -Compute Engine offers many preconfigured public images that have compatible Linux or Windows operating systems. Compute Engine uses selected image to create a persistent boot disk for each instance. ## Examples ### Basic compute image info +Explore the types and regional distribution of virtual machine images in your Azure environment. This can help in understanding the configuration and usage patterns of virtual machines, thereby aiding in resource management and optimization. ```sql select @@ -19,6 +30,7 @@ from ### Storage profile's OS disk info of each compute image +Determine the storage characteristics of each compute image in your Azure environment. This could help optimize storage utilization and cost by revealing details such as disk size, snapshot ID, storage account type, state, and disk type. ```sql select @@ -34,6 +46,7 @@ from ### List of compute images where disk storage type is Premium_LRS +Determine the areas in which your compute images are using premium disk storage type. This query can be useful for understanding your storage usage and optimizing costs. ```sql select @@ -51,6 +64,7 @@ where ### List of compute images which do not have owner or app_id tag key +Discover the segments that lack either an 'owner' or 'app_id' tag key within your Azure compute images. This query can be used to identify potential gaps in your image tagging strategy, which can help improve resource tracking and management. ```sql select @@ -61,4 +75,4 @@ from where tags -> 'owner' is null or tags -> 'app_id' is null; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_resource_sku.md b/docs/tables/azure_compute_resource_sku.md index 31d9dfec..ddf6f971 100644 --- a/docs/tables/azure_compute_resource_sku.md +++ b/docs/tables/azure_compute_resource_sku.md @@ -1,10 +1,20 @@ -# Table: azure_compute_resource_sku +--- +title: "Steampipe Table: azure_compute_resource_sku - Query Azure Compute Resource SKUs using SQL" +description: "Allows users to query Azure Compute Resource SKUs" +--- -Types of sku available for azure compute resources. +# Table: azure_compute_resource_sku - Query Azure Compute Resource SKUs using SQL + +Azure Compute Resource SKUs represent the purchasable units for Azure resources, providing details about the available resources for a subscription, including their tier, size, and corresponding cost. They are used to define the size and capacity of the resources that you can provision within your Azure subscription. Each SKU represents a specific combination of resource type, tier, and size. + +## Table Usage Guide + +The 'azure_compute_resource_sku' table provides insights into the available SKUs for Azure Compute Resources. As a DevOps engineer, explore SKU-specific details through this table, including their tier, size, and corresponding cost. Utilize it to uncover information about SKUs, such as their capacity, family, kind, and locations. The schema presents a range of attributes of the SKU for your analysis, like the resource type, tier, size, and restrictions. ## Examples ### Compute resources sku info +Determine the characteristics of your Azure compute resources, such as their tier, size, and family. This is useful for understanding the specifics of your current resources and can aid in planning future resource allocation or optimization. ```sql select @@ -19,6 +29,7 @@ from ### Azure compute resources and their capacity +Identify the capacity range of Azure compute resources to efficiently manage and allocate your cloud resources. ```sql select @@ -32,6 +43,7 @@ from ### List of all premium type disks and location +Explore which premium type disks are in use and their locations. This is useful to manage resources and understand their distribution across various locations. ```sql select diff --git a/docs/tables/azure_compute_snapshot.md b/docs/tables/azure_compute_snapshot.md index 326678dd..3c51646b 100644 --- a/docs/tables/azure_compute_snapshot.md +++ b/docs/tables/azure_compute_snapshot.md @@ -1,10 +1,20 @@ -# Table: azure_compute_snapshot +--- +title: "Steampipe Table: azure_compute_snapshot - Query Azure Compute Snapshots using SQL" +description: "Allows users to query Azure Compute Snapshots" +--- -A snapshot is a full, read-only copy of a virtual hard drive (VHD). +# Table: azure_compute_snapshot - Query Azure Compute Snapshots using SQL + +Azure Compute Snapshots are a point-in-time copy of data. They are used to back up data and can be used to restore a virtual machine to the state at the time of the snapshot. Snapshots are incremental, capturing only the changes since the last snapshot, and are thus space-efficient. + +## Table Usage Guide + +The 'azure_compute_snapshot' table provides insights into snapshots within Azure Compute. As a DevOps engineer, explore snapshot-specific details through this table, including snapshot state, creation time, and associated metadata. Utilize it to uncover information about snapshots, such as those that are incremental, the disk size, and the source disk. The schema presents a range of attributes of the snapshot for your analysis, like the snapshot ID, resource group, and associated tags. ## Examples ### Disk info of each snapshot +Analyze the settings to understand the disk information for each snapshot in Azure, including its size and encryption set ID, which can help in managing storage and security aspects. This is particularly useful in assessing the storage consumption and encryption status of each snapshot. ```sql select @@ -19,6 +29,7 @@ from ### List of snapshots which are publicly accessible +Discover the segments that contain snapshots which are publicly accessible. This query is useful to identify potential security risks by pinpointing areas where data might be exposed. ```sql select @@ -32,6 +43,7 @@ where ### List of all incremental type snapshots +Gain insights into all snapshots that are incremental in nature within the Azure compute service. This is useful for managing storage and tracking changes made over time. ```sql select diff --git a/docs/tables/azure_compute_ssh_key.md b/docs/tables/azure_compute_ssh_key.md index 73168e3c..90af5484 100644 --- a/docs/tables/azure_compute_ssh_key.md +++ b/docs/tables/azure_compute_ssh_key.md @@ -1,10 +1,20 @@ -# Table: azure_compute_ssh_key +--- +title: "Steampipe Table: azure_compute_ssh_key - Query Azure Compute SSH Keys using SQL" +description: "Allows users to query Azure Compute SSH Keys" +--- -Azure SSH public key used by VMs. +# Table: azure_compute_ssh_key - Query Azure Compute SSH Keys using SQL + +Azure Compute is a service within Microsoft Azure that provides on-demand processing power and infrastructure for applications. It allows you to create and manage virtual machines, containers, and batch jobs, as well as supports remote application access via SSH keys. Azure Compute SSH Keys are used for secure, encrypted connections to your Azure resources. + +## Table Usage Guide + +The 'azure_compute_ssh_key' table provides insights into SSH Keys within Azure Compute. As a DevOps engineer, explore SSH Key-specific details through this table, including the associated virtual machine, key type, and key data. Utilize it to uncover information about SSH Keys, such as those associated with specific virtual machines, the type of SSH Key being used, and the actual key data for verification purposes. The schema presents a range of attributes of the SSH Key for your analysis, like the virtual machine id, key type, and key data. ## Examples ### Retrieve SSH public key by name +Assess the elements within your Azure Compute resources to identify a specific SSH public key associated with a given name. This can help in verifying access permissions or troubleshooting connectivity issues. ```sql select @@ -17,6 +27,7 @@ where ``` ### List compute virtual machines using SSH public key +Explore which virtual machines are using a particular SSH public key. This is useful for managing and securing your virtual machine access by keeping track of the SSH keys in use. ```sql select @@ -26,4 +37,4 @@ from azure_compute_virtual_machine as m, jsonb_array_elements(linux_configuration_ssh_public_keys) as s left join azure_compute_ssh_key as k on k.public_key = s ->> 'keyData'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine.md b/docs/tables/azure_compute_virtual_machine.md index 49256f01..1e7b005c 100644 --- a/docs/tables/azure_compute_virtual_machine.md +++ b/docs/tables/azure_compute_virtual_machine.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine +--- +title: "Steampipe Table: azure_compute_virtual_machine - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machines." +--- -Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. +# Table: azure_compute_virtual_machine - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service within Microsoft Azure that allows you to deploy and manage virtual machines (VMs). It provides the flexibility of virtualization for a wide range of computing solutions—development and testing, running applications, and extending your datacenter. Azure Virtual Machines provide on-demand, high-scale, secure, virtualized infrastructure using Windows servers or Linux servers. + +## Table Usage Guide + +The 'azure_compute_virtual_machine' table provides insights into Virtual Machines within Azure Compute. As a DevOps engineer, explore VM-specific details through this table, including VM sizes, operating systems, network interfaces, and associated metadata. Utilize it to uncover information about VMs, such as their power states, the virtual networks they are associated with, and the disks they use. The schema presents a range of attributes of the VM for your analysis, like the VM ID, creation date, location, and associated tags. ## Examples ### Virtual machine configuration info +Analyze the settings to understand the configuration and status of your virtual machines in Azure. This can assist in managing machine resources, tracking machine states, and ensuring optimal utilization of your Azure cloud resources. ```sql select @@ -22,6 +32,7 @@ from ``` ### Virtual machine count in each region +Gain insights into the distribution of virtual machines across different regions. This helps in understanding resource allocation and planning for capacity management. ```sql select @@ -34,6 +45,7 @@ group by ``` ### List of VMs whose OS disk is not encrypted by customer managed key +Discover the segments that include virtual machines (VMs) where the operating system disk is not encrypted using a customer-managed key. This can be useful for identifying potential security risks and ensuring compliance with data protection policies. ```sql select @@ -47,6 +59,7 @@ where ``` ### List of VMs provisioned with undesired(for example Standard_D8s_v3 and Standard_DS3_v3 is desired) sizes. +Explore which virtual machines have been provisioned with sizes other than the desired ones. This is useful for identifying potential inefficiencies or mismatches in resource allocation. ```sql select @@ -61,6 +74,7 @@ group by ``` ### Availability set info of VMs +Explore which virtual machines are part of a specific availability set in Azure. This can help you understand how your VMs are distributed across fault and update domains, allowing for better management of redundancy and availability. ```sql select @@ -75,6 +89,7 @@ from ``` ### List of all spot type VM and their eviction policy +Explore the comprehensive list of all spot type Virtual Machines and their corresponding eviction policies. This information can be used to understand and manage resource allocation and cost-efficiency in your Azure cloud environment. ```sql select @@ -88,6 +103,7 @@ where ``` ### Disk Storage Summary, by VM +Explore the disk storage usage across different virtual machines in your Azure environment. This helps in managing resources and planning for storage needs more effectively. ```sql select @@ -104,6 +120,7 @@ order by ``` ### View Network Security Group Rules for a VM +Discover the security rules applied to a specific virtual machine in your Azure network. This query is useful for understanding the security parameters and restrictions currently in place for a given machine. ```sql select @@ -121,6 +138,7 @@ where ``` ### List virtual machines with user assigned identities +Explore which virtual machines have user assigned identities. This can be beneficial for managing access control and ensuring secure operations in your Azure environment. ```sql select @@ -140,6 +158,7 @@ where ``` ### List security profile details +Explore the security profiles of your virtual machines in Azure to understand if the 'encryption at host' setting is enabled. This can aid in assessing your data security and compliance. ```sql select @@ -148,4 +167,4 @@ select security_profile -> 'encryptionAtHost' as encryption_at_host from azure_compute_virtual_machine; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md index dcde1adb..4724bc50 100644 --- a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md +++ b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_metric_cpu_utilization +--- +title: "Steampipe Table: azure_compute_virtual_machine_metric_cpu_utilization - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machine CPU Utilization metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_virtual_machine_metric_cpu_utilization` table provides metric statistics at 5 minutes intervals for the most recent 5 days. +# Table: azure_compute_virtual_machine_metric_cpu_utilization - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service within Microsoft Azure that provides on-demand, high-scale, secure, virtualized infrastructure using Microsoft's advanced data centers. With Azure Compute, users can deploy a wide range of computing solutions, including virtual machines (VMs). This service is particularly useful for workloads that require high-performance computing, analytics, AI, real-time applications, and low-latency applications. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_metric_cpu_utilization' table provides insights into CPU utilization metrics of Azure Compute Virtual Machines. As a systems administrator, you can explore VM-specific details through this table, including the average, minimum, and maximum CPU utilization, and the timestamps for these metrics. Utilize it to uncover information about VM performance, such as identifying VMs with high CPU utilization, understanding the CPU usage pattern over time, and taking necessary actions to optimize resource usage. The schema presents a range of attributes of the VM CPU utilization metrics for your analysis, like the average CPU utilization, minimum CPU utilization, maximum CPU utilization, and the timestamps for these metrics. ## Examples ### Basic info +Explore the use patterns of virtual machines in your Azure environment by analyzing CPU utilization metrics. This can help identify periods of high demand or underutilization, allowing for better resource management and cost optimization. ```sql select @@ -22,6 +32,7 @@ order by ``` ### CPU Over 80% average +Determine the areas in which virtual machine CPU utilization exceeds 80% on average. This can help in identifying potential performance issues and ensuring efficient resource management. ```sql select @@ -37,4 +48,4 @@ where average > 80 order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md index 6d3b0a96..3503a07e 100644 --- a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md +++ b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_daily.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_metric_cpu_utilization_daily +--- +title: "Steampipe Table: azure_compute_virtual_machine_metric_cpu_utilization_daily - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machine daily CPU utilization metrics." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_virtual_machine_metric_cpu_utilization_daily` table provides metric statistics at 24 hours intervals for the most recent 1 year. +# Table: azure_compute_virtual_machine_metric_cpu_utilization_daily - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service that provides on-demand, scalable compute resources in Microsoft Azure. It allows you to deploy and manage virtual machines and containers, and supports a range of operating systems, tools, and frameworks. Virtual machines are a core part of Azure Compute, providing the ability to quickly scale up or down with demand, and offering a range of options for CPU, memory, storage, and networking capacity. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_metric_cpu_utilization_daily' table provides insights into daily CPU utilization metrics of Azure Compute Virtual Machines. As a DevOps engineer, you can use this table to monitor and analyze the daily CPU usage of your virtual machines, helping you to understand the performance and resource demands of your applications and services. The schema presents a range of attributes for your analysis, such as the maximum, minimum, and average CPU utilization, the time of the metric, and the resource group and subscription ID of the virtual machine. Utilize this table to identify trends in resource usage, detect potential issues, and optimize your Azure Compute resources. ## Examples ### Basic info +Explore which Azure virtual machines have high CPU utilization over time. This can help in managing resources efficiently by identifying machines that may need upgrades or load balancing. ```sql select @@ -22,6 +32,7 @@ order by ``` ### CPU Over 80% average +Determine the areas in which the average CPU utilization of Azure virtual machines exceeds 80%. This query can help identify potential performance issues and optimize resource allocation. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md index b6564078..0945ed87 100644 --- a/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md +++ b/docs/tables/azure_compute_virtual_machine_metric_cpu_utilization_hourly.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_metric_cpu_utilization_hourly +--- +title: "Steampipe Table: azure_compute_virtual_machine_metric_cpu_utilization_hourly - Query Azure Compute Virtual Machines using SQL" +description: "Allows users to query Azure Compute Virtual Machines' CPU Utilization metrics on an hourly basis." +--- -Azure Monitor metrics provide data about the performance of your systems. The `azure_compute_virtual_machine_metric_cpu_utilization_hourly` table provides metric statistics at 1 hour intervals for the most recent 60 days. +# Table: azure_compute_virtual_machine_metric_cpu_utilization_hourly - Query Azure Compute Virtual Machines using SQL + +Azure Compute is a service that provides on-demand, scalable compute resources in the cloud. It allows users to create and manage virtual machines (VMs) that run on Microsoft's data centers. The service is designed to support a wide range of workloads, including web applications, batch processing, and high-performance computing. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_metric_cpu_utilization_hourly' table provides insights into the CPU utilization metrics of Azure Compute Virtual Machines on an hourly basis. As a system administrator, you can use this table to monitor and analyze the CPU usage of your virtual machines, helping you to optimize resource allocation and performance. The table provides detailed information such as the maximum and average CPU utilization, the time of the metric, and the resource group of the VM. Utilize it to uncover trends in CPU usage, identify potential performance bottlenecks, and make informed decisions about scaling and capacity planning. The schema presents a range of attributes of the VM's CPU utilization for your analysis, like the maximum and average utilization, the timestamp of the metric, and the resource group of the VM. ## Examples ### Basic info +Explore which virtual machines in your Azure Compute environment have the highest CPU utilization over the past hour. This can help you identify potential performance issues and optimize resource allocation. ```sql select @@ -22,6 +32,7 @@ order by ``` ### CPU Over 80% average +Analyze the performance of Azure virtual machines by identifying instances where the average CPU utilization exceeds 80%. This can be useful for spotting potential bottlenecks or performance issues in your infrastructure. ```sql select @@ -38,4 +49,4 @@ where order by name, timestamp; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_scale_set.md b/docs/tables/azure_compute_virtual_machine_scale_set.md index 303fe324..65b4b8c3 100644 --- a/docs/tables/azure_compute_virtual_machine_scale_set.md +++ b/docs/tables/azure_compute_virtual_machine_scale_set.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_scale_set +--- +title: "Steampipe Table: azure_compute_virtual_machine_scale_set - Query Azure Compute Virtual Machine Scale Sets using SQL" +description: "Allows users to query Azure Compute Virtual Machine Scale Sets." +--- -Azure virtual machine scale sets let you create and manage a group of load balanced VMs. The number of VM instances can automatically increase or decrease in response to demand or a defined schedule. Scale sets provide high availability to your applications, and allow you to centrally manage, configure, and update a large number of VMs. +# Table: azure_compute_virtual_machine_scale_set - Query Azure Compute Virtual Machine Scale Sets using SQL + +Azure Compute Virtual Machine Scale Sets are a service that allows you to deploy and manage a set of identical, auto-scaling virtual machines. You can scale the number of VMs in the scale set manually, or define rules to auto-scale based on resource usage like CPU, memory demand, or network traffic. An Azure load balancer then distributes network traffic to the VM instances in the scale set. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_scale_set' table provides insights into Virtual Machine Scale Sets within Azure Compute. As a DevOps engineer, explore scale set-specific details through this table, including scaling configurations, virtual machine profiles, and associated metadata. Utilize it to uncover information about scale sets, such as those with specific scaling policies, the network configurations of the scale sets, and the verification of virtual machine profiles. The schema presents a range of attributes of the Virtual Machine Scale Set for your analysis, like the scale set name, resource group, location, and associated tags. ## Examples ### Basic info +Explore which virtual machine scale sets are located in specific regions and resource groups within your Azure Compute environment. This enables effective management and allocation of resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### List Standard tier virtual machine scale set +Explore the standard tier virtual machine scale sets within your Azure environment. This is useful for understanding your resource allocation and managing your cloud infrastructure more efficiently. ```sql select @@ -29,4 +40,4 @@ from azure_compute_virtual_machine_scale_set where sku_tier = 'Standard'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md b/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md index 092f4ff4..bc2a0130 100644 --- a/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md +++ b/docs/tables/azure_compute_virtual_machine_scale_set_network_interface.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_scale_set_network_interface +--- +title: "Steampipe Table: azure_compute_virtual_machine_scale_set_network_interface - Query Azure Compute Virtual Machine Scale Set Network Interfaces using SQL" +description: "Allows users to query Azure Compute Virtual Machine Scale Set Network Interfaces." +--- -A network interface enables an Azure VM to communicate with internet, Azure, and on-premises resources. +# Table: azure_compute_virtual_machine_scale_set_network_interface - Query Azure Compute Virtual Machine Scale Set Network Interfaces using SQL + +A Virtual Machine Scale Set Network Interface in Azure is an interconnection between a Virtual Machine Scale Set and a Virtual Network. These network interfaces enable the virtual machines within the scale set to communicate with internet, Azure, and on-premises resources. Network security group rules and route tables can be applied directly to the network interfaces to filter network traffic. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_scale_set_network_interface' table provides insights into Network Interfaces within Azure Compute Virtual Machine Scale Sets. As a DevOps engineer, explore network interface-specific details through this table, including the IP configuration, network security group association, and subnet details. Utilize it to uncover information about network interfaces, such as their private and public IP addresses, MAC address, and the states of IP forwarding and accelerated networking. The schema presents a range of attributes of the network interfaces for your analysis, like the network interface ID, IP configuration, network security group, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure virtual machine scale sets by understanding the provisioning state and location. This can be beneficial in managing resources and optimizing your cloud infrastructure. ```sql select @@ -19,6 +29,7 @@ from ``` ### List network interfaces with IP forwarding rule enabled +Explore the configuration of network interfaces that have the IP forwarding rule enabled. This can be useful in identifying network instances that may allow for IP packet forwarding, which can be critical for understanding network traffic flow and potential security implications. ```sql select @@ -33,6 +44,7 @@ where ``` ### List network interfaces with accelerated networking enabled +Explore which network interfaces have the accelerated networking feature enabled. This can be particularly useful for identifying areas where network performance can be improved. ```sql select @@ -47,6 +59,7 @@ where ``` ### Get scale set virtual machine details for scale set network interface +Analyze the details of virtual machine scale sets to understand the associated network interfaces. This is beneficial in managing the configuration and performance of your network resources in a large-scale cloud environment. ```sql select @@ -60,4 +73,4 @@ from azure_compute_virtual_machine_scale_set_vm as v where i.virtual_machine ->> 'id' = v.id; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_compute_virtual_machine_scale_set_vm.md b/docs/tables/azure_compute_virtual_machine_scale_set_vm.md index 347ae295..220f1129 100644 --- a/docs/tables/azure_compute_virtual_machine_scale_set_vm.md +++ b/docs/tables/azure_compute_virtual_machine_scale_set_vm.md @@ -1,10 +1,20 @@ -# Table: azure_compute_virtual_machine_scale_set_vm +--- +title: "Steampipe Table: azure_compute_virtual_machine_scale_set_vm - Query Azure Compute Virtual Machine Scale Sets using SQL" +description: "Allows users to query Azure Compute Virtual Machine Scale Sets" +--- -You can scale the number of virtual machines in the scale set manually, or define rules to autoscale based on resource usage like CPU, memory demand, or network traffic. An Azure load balancer then distributes traffic to the virtual machine instances in the scale set. +# Table: azure_compute_virtual_machine_scale_set_vm - Query Azure Compute Virtual Machine Scale Sets using SQL + +Azure Compute is a cloud computing service that provides on-demand, high-scale compute capacity for applications and workloads. One of its resources, Virtual Machine Scale Sets, allows for the creation, management, and scaling of a set of identical, load-balanced VMs. This service is ideal for building large-scale services, such as big data, containerized applications, and distributed systems. + +## Table Usage Guide + +The 'azure_compute_virtual_machine_scale_set_vm' table provides insights into Virtual Machine Scale Sets within Azure Compute. As a DevOps engineer, explore specific details through this table, including the status, location, and configuration of each VM in the scale set. Utilize it to uncover information about VMs, such as their operating system, network profile, and associated metadata. The schema presents a range of attributes of the VM for your analysis, like the VM ID, instance ID, virtual network, and associated tags. ## Examples ### Basic info +Explore which virtual machines are part of your Azure scale set to manage resources effectively. This can help in identifying instances where resources are underutilized or overprovisioned, ensuring optimal resource allocation and cost management. ```sql select @@ -20,6 +30,7 @@ from ``` ### List Standard tier scale set virtual machine +Explore which scale set virtual machines operate on the 'Standard' tier. This query is useful for understanding the distribution and usage of different tiered resources within your Azure environment. ```sql select @@ -35,6 +46,7 @@ where ``` ### List all virtual machines under a specific scale set +Explore which virtual machines are part of a specific set to understand the scale and tier of your Azure computing resources. This aids in resource management and capacity planning. ```sql select @@ -50,6 +62,7 @@ where ``` ### View Network Security Group Rules for a virtual machine +Determine the security rules applied to a specific virtual machine within your network. This is useful for assessing the security measures in place and identifying any potential vulnerabilities. ```sql select diff --git a/docs/tables/azure_container_group.md b/docs/tables/azure_container_group.md index cde851eb..3e6c74c8 100644 --- a/docs/tables/azure_container_group.md +++ b/docs/tables/azure_container_group.md @@ -1,10 +1,20 @@ -# Table: azure_container_group +--- +title: "Steampipe Table: azure_container_group - Query Azure Container Instances using SQL" +description: "Allows users to query Azure Container Groups." +--- -An Azure Container Group is a specific type of Azure Container Instances resource that allows you to group multiple containers together and run them as a single unit. A container group can contain one or more containers that are tightly coupled and need to be deployed and managed together. For example, you may have a microservices-based application that consists of multiple containers, such as a front-end container, a back-end container, and a database container. You can create an Azure Container Group to deploy and manage all these containers as a single entity. +# Table: azure_container_group - Query Azure Container Instances using SQL + +Azure Container Instances offers the fastest and simplest way to run a container in Azure, without having to provision any virtual machines and without having to adopt a higher-level service. It is a solution for any scenario that can operate in isolated containers, without orchestration. Run event-driven applications, quickly deploy from your container development pipelines, and run data processing and build jobs. + +## Table Usage Guide + +The 'azure_container_group' table provides insights into Container Groups within Azure Container Instances. As a DevOps engineer, explore Container Group-specific details through this table, including the containers within the group, the image they are using, the commands they are running, and associated metadata. Utilize it to uncover information about Container Groups, such as their current state, the events that have occurred within them, and the configurations they have been given. The schema presents a range of attributes of the Container Group for your analysis, like the group name, creation date, associated containers, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure Container Groups to understand their provisioning states and restart policies. This is useful for assessing the performance and management of your resources across different regions. ```sql select @@ -19,6 +29,7 @@ from ``` ### Get encryption details of each group +Uncover the details of encryption for each group within your Azure Container service. This will help you assess the security measures in place and ensure that each group is properly protected. ```sql select @@ -32,6 +43,7 @@ from ``` ### List groups that have restart policy set to `OnFailure` +Discover the segments that have their restart policy set to 'OnFailure' in the Azure Container Group. This can be useful in assessing system resilience and planning for potential system failures. ```sql select @@ -46,6 +58,7 @@ where ``` ### Count groups by operation type +Analyze the distribution of Azure container groups based on their operating system type. This can provide insights into the predominant OS types used within your container groups, aiding in system optimization and resource planning. ```sql select @@ -58,6 +71,7 @@ group by ``` ### Get IP address details of each group +Explore which containers in your Azure environment are associated with specific IP addresses. This can help you manage your network configuration and identify potential bottlenecks or security risks. ```sql select @@ -72,6 +86,7 @@ from ``` ### Get image registry credential details of each group +Explore the authentication details for image registries used by different container groups. This can be useful to ensure proper security measures are in place and to manage access to your image repositories. ```sql select @@ -87,6 +102,7 @@ from ``` ### Get DNS configuration details of each group +Explore the DNS configuration details for each container group in Azure. This can help you understand how your container groups are configured for network communication, aiding in network troubleshooting and optimization. ```sql select @@ -97,4 +113,4 @@ select dns_config ->> 'Options' as options from azure_container_group; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_container_registry.md b/docs/tables/azure_container_registry.md index e5514fe9..5c4b533c 100644 --- a/docs/tables/azure_container_registry.md +++ b/docs/tables/azure_container_registry.md @@ -1,10 +1,20 @@ -# Table: azure_container_registry +--- +title: "Steampipe Table: azure_container_registry - Query Azure Container Registries using SQL" +description: "Allows users to query Azure Container Registries for detailed information about their configuration, status, and associated metadata." +--- -The Azure container registry is Microsoft's own hosting platform for Docker images. It is a private registry where you can store and manage private docker container images and other related artifacts. These images can then be pulled and run locally or used for container-based deployments to hosting platforms. +# Table: azure_container_registry - Query Azure Container Registries using SQL + +Azure Container Registry is a managed Docker registry service provided by Microsoft Azure for storing and managing private Docker container images and related artifacts. It allows you to build, store, and manage container images and artifacts in a private registry for all types of container deployments. This service also integrates well with existing container development and deployment pipelines. + +## Table Usage Guide + +The 'azure_container_registry' table provides insights into Container Registries within Microsoft Azure. As a DevOps engineer, explore registry-specific details through this table, including SKU, login server, creation date, and associated metadata. Utilize it to uncover information about registries, such as those with admin user enabled, the network rule set, and the encryption status. The schema presents a range of attributes of the Container Registry for your analysis, like the registry name, resource group, region, and associated tags. ## Examples ### Basic info +Explore the status and details of your Azure Container Registry. This query can help you assess the creation date, region, and the tier of your registry, providing insights into your resource usage and allocation. ```sql select @@ -19,6 +29,7 @@ from ``` ### List registries not encrypted with a customer-managed key +Explore which Azure container registries are not encrypted with a customer-managed key. This is useful for identifying potential security vulnerabilities in your Azure cloud environment. ```sql select @@ -30,6 +41,7 @@ from ``` ### List registries not configured with virtual network service endpoint +Analyze the settings to understand which Azure Container Registries are not configured with a virtual network service endpoint. This is useful to pinpoint potential security gaps where data might be exposed to untrusted networks. ```sql select @@ -44,6 +56,7 @@ where ``` ### List registries with admin user account enabled +Discover the segments where the admin user account is enabled in the Azure container registry. This is useful for identifying potential security risks and ensuring the proper configuration of user permissions. ```sql select @@ -54,4 +67,4 @@ from azure_container_registry where admin_user_enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_cosmosdb_account.md b/docs/tables/azure_cosmosdb_account.md index 221dd1c7..c03a1f76 100644 --- a/docs/tables/azure_cosmosdb_account.md +++ b/docs/tables/azure_cosmosdb_account.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_account +--- +title: "Steampipe Table: azure_cosmosdb_account - Query Azure Cosmos DB Accounts using SQL" +description: "Allows users to query Azure Cosmos DB Accounts to obtain key information such as account name, resource group, location, and more. The table provides a comprehensive view of these resources, including the account's offer type, IP rules, and virtual network rules." +--- -Azure Cosmos DB is a fully managed NoSQL database service for modern app development. +# Table: azure_cosmosdb_account - Query Azure Cosmos DB Accounts using SQL + +Azure Cosmos DB is a fully managed NoSQL database service for modern app development with guaranteed single-digit millisecond response times and 99.999-percent availability backed by SLAs, automatic and instant scalability, and open source APIs for MongoDB and Cassandra. It offers multi-mastering feature by automatically indexing all data and allowing massively parallel operations. Azure Cosmos DB provides native support for NoSQL and OSS APIs, including MongoDB, Cassandra, Gremlin, et al. + +## Table Usage Guide + +The 'azure_cosmosdb_account' table provides insights into Azure Cosmos DB Accounts. As a DevOps engineer, explore account-specific details through this table, including the account's offer type, IP rules, and virtual network rules. Utilize it to uncover information about accounts, such as their locations, enabled capabilities, and associated tags. The schema presents a range of attributes of the Azure Cosmos DB Account for your analysis, like the account name, resource group, read and write locations, and more. ## Examples ### List of database accounts where automatic failover is not enabled +Discover the segments that have automatic failover disabled in their database accounts, which can be critical in maintaining seamless service during unexpected outages. This could be useful in identifying potential vulnerabilities in your database setup. ```sql select @@ -19,6 +29,7 @@ where ``` ### List of database accounts which allows traffic from all networks, including the public Internet. +Determine the areas in which database accounts are potentially vulnerable by identifying those that allow traffic from all networks, including the public internet. This can help in enhancing security by restricting access to specific networks. ```sql select @@ -32,6 +43,7 @@ where ``` ### List of database accounts where multiple write location is not enabled +Discover the segments that have not enabled multiple write locations within their Azure CosmosDB accounts. This can be useful in identifying potential areas of risk or inefficiency, as enabling multiple write locations can increase data redundancy and availability. ```sql select @@ -45,6 +57,7 @@ where ``` ### Failover policy info for the database accounts +Gain insights into the priority and location details of failover policies for your Azure CosmosDB accounts. This helps in strategizing disaster recovery and business continuity plans. ```sql select @@ -57,6 +70,7 @@ from ``` ### Consistency policy info for each account +Analyze the consistency policy details of each account to understand the maximum interval, staleness prefix, account offer type, and default consistency level. This aids in optimizing data consistency and performance in Azure Cosmos DB accounts. ```sql select @@ -70,6 +84,7 @@ from ``` ### Get backup policy for accounts having periodic backups enabled +Determine the areas in which Azure CosmosDB accounts have periodic backups enabled to assess their backup policies. This is useful for understanding the frequency of backups and the retention period, ensuring data safety and compliance with data retention policies. ```sql select @@ -85,6 +100,7 @@ where ``` ### Get private endpoint connection details for each account +Explore the status and details of private endpoint connections for each account to understand the connection type, actions required, and current state. This is useful for managing and troubleshooting your private network connections in Azure Cosmos DB. ```sql select @@ -102,6 +118,7 @@ from ``` ### Get details of accounts restored from backup +Identify instances where Azure CosmosDB accounts have been restored from backup. This is useful to track restoration activities and ensure data integrity. ```sql select diff --git a/docs/tables/azure_cosmosdb_mongo_collection.md b/docs/tables/azure_cosmosdb_mongo_collection.md index 8c8d337d..7b3b8ed5 100644 --- a/docs/tables/azure_cosmosdb_mongo_collection.md +++ b/docs/tables/azure_cosmosdb_mongo_collection.md @@ -1,12 +1,20 @@ -# Table: azure_cosmosdb_mongo_collection +--- +title: "Steampipe Table: azure_cosmosdb_mongo_collection - Query Azure Cosmos DB Mongo Collections using SQL" +description: "Allows users to query Azure Cosmos DB Mongo Collections." +--- -An Azure Cosmos DB container is where data is stored. Unlike most relational databases which scale up with larger VM sizes, Azure Cosmos DB scales out. A collection is a grouping of MongoDB documents. +# Table: azure_cosmosdb_mongo_collection - Query Azure Cosmos DB Mongo Collections using SQL -**You must specify the CosmosDB Mongo Database Name** in the `where` clause (`where database_name=''`). +Azure Cosmos DB is a globally distributed, multi-model database service for managing data at scale. It provides native support for NoSQL and OSS APIs, including MongoDB, Cassandra, Gremlin, et al. Azure Cosmos DB Mongo Collections are part of the MongoDB API, which allows users to build and manage MongoDB applications quickly and efficiently in Azure Cosmos DB. + +## Table Usage Guide + +The 'azure_cosmosdb_mongo_collection' table provides insights into Mongo Collections within Azure Cosmos DB. As a database administrator, explore collection-specific details through this table, including sharding, indexing, and associated metadata. Utilize it to uncover information about collections, such as their partition key, default time to live, and indexing policy. The schema presents a range of attributes of the Mongo Collection for your analysis, like the resource ID, name, type, and associated tags. ## Examples ### Basic info +Explore which Azure CosmosDB MongoDB collections are associated with certain databases. This can help in managing resources, identifying potential bottlenecks, and optimizing database performance. ```sql select @@ -25,6 +33,7 @@ where ``` ### Collection count by cosmos DB database name +Gain insights into the number of collections associated with each Cosmos DB database in Azure. This can be useful for understanding the distribution of collections across databases. ```sql select @@ -40,6 +49,7 @@ group by ``` ### Get throughput settings for each collection +Assess the elements within each collection to understand the throughput settings. This allows you to manage resources more efficiently by identifying the maximum and minimum throughput, providing insights into the performance and scalability of your Azure Cosmos DB Mongo Database. ```sql select @@ -59,6 +69,7 @@ where ``` ### Get index keys in each collection +Explore which index keys are present in each collection within your Azure Cosmos DB MongoDB databases. This can help you optimize your database queries and improve overall performance. ```sql select diff --git a/docs/tables/azure_cosmosdb_mongo_database.md b/docs/tables/azure_cosmosdb_mongo_database.md index c207c88a..0c76b60f 100644 --- a/docs/tables/azure_cosmosdb_mongo_database.md +++ b/docs/tables/azure_cosmosdb_mongo_database.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_mongo_database +--- +title: "Steampipe Table: azure_cosmosdb_mongo_database - Query Azure Cosmos DB Mongo Databases using SQL" +description: "Allows users to query Azure Cosmos DB Mongo Databases." +--- -MongoDB is a cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas. +# Table: azure_cosmosdb_mongo_database - Query Azure Cosmos DB Mongo Databases using SQL + +Azure Cosmos DB is a globally distributed, multi-model database service for managing data at planet-scale. It's designed to allow customers to elastically and independently scale throughput and storage across any number of geographical regions. Mongo Database is a type of API that can be used with Azure Cosmos DB to work with data. + +## Table Usage Guide + +The 'azure_cosmosdb_mongo_database' table provides insights into Mongo Databases within Azure Cosmos DB. As a DevOps engineer, explore database-specific details through this table, including the resource group, account name, and associated metadata. Utilize it to uncover information about databases, such as their provisioned throughput, the offer type, and the verification of their properties. The schema presents a range of attributes of the Mongo Database for your analysis, like the ID, name, and type. ## Examples ### Basic info +Explore the configuration of your Azure CosmosDB Mongo databases to understand their throughput and autoscale settings. This can help in optimizing resource allocation and managing costs effectively. ```sql select @@ -20,6 +30,7 @@ from ### Database count by cosmosdb account name +Explore which Azure Cosmos DB accounts have the highest number of databases. This can aid in understanding resource allocation and potential cost implications. ```sql select @@ -32,6 +43,7 @@ group by ``` ### Get throughput settings for each database +Assess the elements within each database to understand their throughput settings, which provide insights into the performance and capacity management of your Azure Cosmos DB's MongoDB databases. This will help in optimizing the resources for improved performance and cost efficiency. ```sql select diff --git a/docs/tables/azure_cosmosdb_restorable_database_account.md b/docs/tables/azure_cosmosdb_restorable_database_account.md index f5125449..c54e354d 100644 --- a/docs/tables/azure_cosmosdb_restorable_database_account.md +++ b/docs/tables/azure_cosmosdb_restorable_database_account.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_restorable_database_account +--- +title: "Steampipe Table: azure_cosmosdb_restorable_database_account - Query Azure Cosmos DB Restorable Database Accounts using SQL" +description: "Allows users to query Azure Cosmos DB Restorable Database Accounts" +--- -Azure Cosmos DB restorable account helps to recover a Cosmos DB account from an accidental write, delete operation, or to restore data into any region. +# Table: azure_cosmosdb_restorable_database_account - Query Azure Cosmos DB Restorable Database Accounts using SQL + +Azure Cosmos DB is a globally distributed, multi-model database service designed for scalable and high performance modern applications. It is a fully managed NoSQL database service built for fast and predictable performance, high availability, elastic scaling, global distribution, and ease of development. A restorable database account represents a Cosmos DB account that can be restored to any point in time within its retention period. + +## Table Usage Guide + +The 'azure_cosmosdb_restorable_database_account' table provides insights into restorable database accounts within Azure Cosmos DB. As a DevOps engineer, explore account-specific details through this table, including locations, enabled capabilities, and associated metadata. Utilize it to uncover information about accounts, such as those with specific capabilities, the locations of accounts, and the verification of failover policies. The schema presents a range of attributes of the restorable database account for your analysis, like the account name, creation date, enabled capabilities, and associated tags. ## Examples ### Basic Info +Explore which Azure Cosmos DB accounts are available for restoration, along with their associated details such as region, account name, and creation time. This is particularly useful for assessing recovery options and planning for potential disaster recovery scenarios. ```sql select @@ -18,6 +28,7 @@ from ``` ### Get the regions that the database accounts can be restored from +Explore which regions your database accounts can be restored from to ensure business continuity and disaster recovery. This query aids in identifying the locations where your database backups are stored, helping you plan your restoration strategy effectively. ```sql select @@ -31,6 +42,7 @@ from ``` ### Get the accounts having point-in-time recovery enabled +Discover the segments that have point-in-time recovery enabled for Azure CosmosDB accounts. This query can be useful in instances where you need to analyze the safety measures of your data, ensuring that it can be restored to a specific point in time if needed. ```sql select @@ -47,6 +59,7 @@ where ``` ### Get the restorable account count per api type +Analyze the settings to understand the distribution of restorable accounts across different API types in Azure CosmosDB. This can be beneficial for assessing the balance of your account types and identifying any potential vulnerabilities or over-reliances. ```sql select diff --git a/docs/tables/azure_cosmosdb_sql_database.md b/docs/tables/azure_cosmosdb_sql_database.md index 44fe87da..6d1d6801 100644 --- a/docs/tables/azure_cosmosdb_sql_database.md +++ b/docs/tables/azure_cosmosdb_sql_database.md @@ -1,10 +1,20 @@ -# Table: azure_cosmosdb_sql_database +--- +title: "Steampipe Table: azure_cosmosdb_sql_database - Query Azure Cosmos DB SQL Databases using SQL" +description: "Allows users to query Azure Cosmos DB SQL Databases" +--- -Azure Cosmos DB is a global distributed, multi-model database that is used in a wide range of applications and use cases. +# Table: azure_cosmosdb_sql_database - Query Azure Cosmos DB SQL Databases using SQL + +Azure Cosmos DB is a globally distributed, multi-model database service for managing data at large scale. It provides elastic scalability, high availability, and low latency required for modern applications. SQL API, one of the APIs provided by Azure Cosmos DB, allows you to work with data using SQL queries. + +## Table Usage Guide + +The 'azure_cosmosdb_sql_database' table provides insights into SQL Databases within Azure Cosmos DB. As a database administrator, explore database-specific details through this table, including the provisioned throughput, partition key path, and associated metadata. Utilize it to uncover information about databases, such as those with high throughput, the partitioning scheme, and the indexing policy. The schema presents a range of attributes of the SQL Database for your analysis, like the database ID, resource group, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure CosmosDB SQL databases to gain insights into their associated account names, user databases, regions, and resource groups. This can help you manage your resources more effectively and understand where potential issues may arise. ```sql select @@ -19,6 +29,7 @@ from ### Database count per cosmosdb accounts +Identify the number of databases within each Azure Cosmos DB account. This information can be useful for managing resources and understanding the distribution of databases across different accounts. ```sql select @@ -32,6 +43,7 @@ group by ### List of sql databases without application tag key +Identify Azure Cosmos DB SQL databases that are missing an 'application' tag. This can be useful in scenarios where you want to ensure all databases are properly tagged for better management and organization. ```sql select diff --git a/docs/tables/azure_data_factory.md b/docs/tables/azure_data_factory.md index 238ad115..75ca9afc 100644 --- a/docs/tables/azure_data_factory.md +++ b/docs/tables/azure_data_factory.md @@ -1,10 +1,20 @@ -# Table: azure_data_factory +--- +title: "Steampipe Table: azure_data_factory - Query Azure Data Factory Pipelines using SQL" +description: "Allows users to query Azure Data Factory Pipelines." +--- -Azure Data Factory is the platform that solves such data scenarios. It is the cloud-based ETL and data integration service that allows to create data-driven workflows for orchestrating data movement and transforming data at scale. +# Table: azure_data_factory - Query Azure Data Factory Pipelines using SQL + +Azure Data Factory is a cloud-based data integration service that orchestrates and automates the movement and transformation of data. It allows users to create data-driven workflows for orchestrating data movement and transforming data at scale. Using Azure Data Factory, you can create and schedule data-driven workflows (called pipelines) that can ingest data from disparate data stores. + +## Table Usage Guide + +The 'azure_data_factory' table provides insights into Pipelines within Azure Data Factory. As a Data Engineer, explore Pipeline-specific details through this table, including activities, datasets, linked services, and associated metadata. Utilize it to uncover information about Pipelines, such as those with specific activities, the relationships between datasets, and the verification of linked services. The schema presents a range of attributes of the Pipeline for your analysis, like the name, region, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which data factories are currently being provisioned in your Azure environment. This allows you to monitor and manage resource distribution more effectively. ```sql select @@ -19,6 +29,7 @@ from ### List system assigned identity type factories +Determine the areas in which Azure Data Factories have system-assigned identities. This query is useful for understanding which factories are using this specific type of identity, helping to manage access control and security. ```sql select @@ -34,6 +45,7 @@ where ### List factories with public network access enabled +Explore which factories have public network access enabled. This is useful for identifying potential security risks and ensuring that your network configurations adhere to best practices. ```sql select @@ -45,4 +57,4 @@ from azure_data_factory where public_network_access = 'Enabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_data_factory_dataset.md b/docs/tables/azure_data_factory_dataset.md index 29519202..6b827bb1 100644 --- a/docs/tables/azure_data_factory_dataset.md +++ b/docs/tables/azure_data_factory_dataset.md @@ -1,10 +1,20 @@ -# Table: azure_data_factory_dataset +--- +title: "Steampipe Table: azure_data_factory_dataset - Query Azure Data Factory Datasets using SQL" +description: "Allows users to query Azure Data Factory Datasets." +--- -Azure Data Factory datasets identify data within different data stores, such as tables, files, folders, and documents. +# Table: azure_data_factory_dataset - Query Azure Data Factory Datasets using SQL + +Azure Data Factory is a cloud-based data integration service that composes data storage, movement, and processing services into automated data pipelines. A dataset in Azure Data Factory represents data structure within the data store, which simply points or references to the data you want to use in your activities as inputs or outputs. It could be an Excel file, a table in Azure SQL Database, or a blob in Azure Blob Storage. + +## Table Usage Guide + +The 'azure_data_factory_dataset' table provides insights into datasets within Azure Data Factory. As a data engineer, explore dataset-specific details through this table, including the type of dataset, linked service, folder, and other related properties. Utilize it to uncover information about datasets, such as those with specific linked services, the relationships between datasets, and the verification of dataset properties. The schema presents a range of attributes of the dataset for your analysis, like the dataset ID, name, type, linked service, and associated parameters. ## Examples ### Basic info +Explore which Azure Data Factory datasets are available and determine their types to better manage resources and understand your data landscape. ```sql select @@ -17,6 +27,7 @@ from ``` ### List relational table type datasets +Determine the areas in which Azure Data Factory datasets are of the 'RelationalTable' type. This is useful for assessing the elements within your data architecture that involve relational table datasets. ```sql select diff --git a/docs/tables/azure_data_factory_pipeline.md b/docs/tables/azure_data_factory_pipeline.md index 790f3671..e577a96f 100644 --- a/docs/tables/azure_data_factory_pipeline.md +++ b/docs/tables/azure_data_factory_pipeline.md @@ -1,10 +1,20 @@ -# Table: azure_data_factory_pipeline +--- +title: "Steampipe Table: azure_data_factory_pipeline - Query Azure Data Factory Pipelines using SQL" +description: "Allows users to query Azure Data Factory Pipelines." +--- -A Data Factory pipeline is a logical grouping of activities that together perform a task. The activities in a pipeline define actions to perform on data. +# Table: azure_data_factory_pipeline - Query Azure Data Factory Pipelines using SQL + +Azure Data Factory is a hybrid data integration service that allows you to create, schedule and manage data pipelines. It provides a serverless approach to data integration and can be used to ingest, prepare, transform, and analyze data from various on-premises and cloud data sources. Pipelines in Azure Data Factory are a logical grouping of activities that together perform a task. + +## Table Usage Guide + +The 'azure_data_factory_pipeline' table provides insights into Pipelines within Azure Data Factory. As a Data Engineer, explore pipeline-specific details through this table, including activities, parameters, and associated metadata. Utilize it to uncover information about pipelines, such as those with specific activities, the relationships between different activities, and the verification of pipeline parameters. The schema presents a range of attributes of the pipeline for your analysis, like the pipeline name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Data Factory pipelines are currently in use. This can help you understand the types and names of pipelines, providing a clearer overview of your data processing infrastructure. ```sql select @@ -15,4 +25,4 @@ select etag from azure_data_factory_pipeline; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_data_lake_analytics_account.md b/docs/tables/azure_data_lake_analytics_account.md index 690cf909..6ece9e90 100644 --- a/docs/tables/azure_data_lake_analytics_account.md +++ b/docs/tables/azure_data_lake_analytics_account.md @@ -1,10 +1,20 @@ -# Table: azure_data_lake_analytics_account +--- +title: "Steampipe Table: azure_data_lake_analytics_account - Query Azure Data Lake Analytics Accounts using SQL" +description: "Allows users to query Azure Data Lake Analytics Accounts" +--- -Azure Data Lake Analytics is an on-demand analytics job service that simplifies big data. Instead of deploying, configuring, and tuning hardware, you write queries to transform your data and extract valuable insights. The analytics service can handle jobs of any scale instantly by setting the dial for how much power you need. You only pay for your job when it is running, making it cost-effective. +# Table: azure_data_lake_analytics_account - Query Azure Data Lake Analytics Accounts using SQL + +Azure Data Lake Analytics is an on-demand analytics job service that simplifies big data. It allows you to focus on writing, running and managing jobs, rather than operating distributed infrastructure. Instead of deploying, configuring and tuning hardware, you write queries to transform your data and extract valuable insights. + +## Table Usage Guide + +The 'azure_data_lake_analytics_account' table provides insights into Azure Data Lake Analytics Accounts. As a data analyst or a big data engineer, explore account-specific details through this table, including account status, creation date, last modified date, and associated metadata. Utilize it to uncover information about accounts, such as those with specific firewall states, the maximum degree of parallelism per job, and the maximum job count. The schema presents a range of attributes of the Azure Data Lake Analytics Account for your analysis, like the account ID, name, type, and associated tags. ## Examples ### Basic info +Explore which Azure Data Lake Analytics accounts are currently provisioned to gain insights into your active data processing resources. This can help you manage your resources efficiently and plan for future capacity needs. ```sql select @@ -17,6 +27,7 @@ from ``` ### List suspended data lake analytics accounts +Identify instances where data lake analytics accounts are suspended to enable proactive management and prevent potential disruptions in data processing. ```sql select @@ -32,6 +43,7 @@ where ``` ### List data lake analytics accounts with firewall disabled +Identify instances where Azure Data Lake analytics accounts have their firewall disabled. This query is useful for assessing potential security vulnerabilities in your system. ```sql select @@ -43,4 +55,4 @@ from azure_data_lake_analytics_account where firewall_state = 'Disabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_data_lake_store.md b/docs/tables/azure_data_lake_store.md index 095bbb0e..860c670b 100644 --- a/docs/tables/azure_data_lake_store.md +++ b/docs/tables/azure_data_lake_store.md @@ -1,10 +1,20 @@ -# Table: azure_data_lake_store +--- +title: "Steampipe Table: azure_data_lake_store - Query Azure Data Lake Store using SQL" +description: "Allows users to query Azure Data Lake Stores" +--- -Azure Data Lake Storage is an enterprise-wide hyper-scale repository for big data analytic workloads. Azure Data Lake enables you to capture data of any size, type, and ingestion speed in one single place for operational and exploratory analytics. +# Table: azure_data_lake_store - Query Azure Data Lake Stores using SQL + +Azure Data Lake Store is a scalable and secure data lake that allows you to store and analyze large amounts of data. It is built to handle high volumes of small writes at low latency and is optimized for analytics. Azure Data Lake Store supports standard Hadoop Distributed File System (HDFS) interfaces. + +## Table Usage Guide + +The 'azure_data_lake_store' table provides insights into Data Lake Stores within Azure. As a Data Engineer, explore store-specific details through this table, including encryption settings, firewall rules, and associated metadata. Utilize it to uncover information about stores, such as those with specific firewall rules, the encryption type used, and the verification of virtual network rules. The schema presents a range of attributes of the Data Lake Store for your analysis, like the store name, creation date, encryption settings, and associated tags. ## Examples ### Basic info +Explore which Azure Data Lake stores are currently provisioned to gain insights into your data storage utilization and management. This can help you identify instances where resources may be underutilized or over-provisioned, aiding in efficient resource allocation. ```sql select @@ -17,6 +27,7 @@ from ``` ### List data lake stores with encryption disabled +This query helps identify Azure Data Lake stores where encryption is disabled, allowing you to pinpoint potential security vulnerabilities and take necessary measures to enhance data protection. It's a practical tool for maintaining the integrity of your stored data and ensuring compliance with data security standards. ```sql select @@ -31,6 +42,7 @@ where ``` ### List data lake stores with firewall disabled +Explore which Azure Data Lake stores have their firewall disabled. This is crucial for identifying potential security vulnerabilities within your system. ```sql select @@ -42,4 +54,4 @@ from azure_data_lake_store where firewall_state = 'Disabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_databox_edge_device.md b/docs/tables/azure_databox_edge_device.md index 68b021e1..b959958e 100644 --- a/docs/tables/azure_databox_edge_device.md +++ b/docs/tables/azure_databox_edge_device.md @@ -1,10 +1,20 @@ -# Table: azure_databox_edge_device +--- +title: "Steampipe Table: azure_databox_edge_device - Query Azure Databox Edge Devices using SQL" +description: "Allows users to query Azure Databox Edge Devices." +--- -Azure Data Box Gateway is a storage solution that enables you to seamlessly send data to Azure. This article provides you an overview of the Azure Data Box Gateway solution, benefits, key capabilities, and the scenarios where you can deploy this device. +# Table: azure_databox_edge_device - Query Azure Databox Edge Devices using SQL + +Azure Databox Edge is a physical network appliance, shipped by Microsoft, that brings compute, storage, and intelligence to the edge. It is designed to analyze, transform, and filter data at the edge, before it is transferred to Azure. This device is ideal for locations with limited or no network connectivity, and for reducing data transfer costs. + +## Table Usage Guide + +The 'azure_databox_edge_device' table provides insights into Databox Edge Devices within Azure. As a DevOps engineer, explore device-specific details through this table, including the device model, status, and associated metadata. Utilize it to uncover information about devices, such as those with high capacity, the network connectivity between devices, and the verification of transfer costs. The schema presents a range of attributes of the Databox Edge Device for your analysis, like the device name, serial number, model description, and associated tags. ## Examples ### Basic info +Explore the status and regional distribution of your Azure Databox Edge devices to gain insights into their operational efficiency and geographical spread. This can help in managing resources and enhancing data access performance. ```sql select @@ -18,6 +28,7 @@ from ``` ### List offline data box edge devices +Discover the segments that are offline in your Azure Data Box Edge devices. This helps in identifying devices that may require attention or troubleshooting for connectivity issues. ```sql select @@ -29,4 +40,4 @@ from azure_databox_edge_device where data_box_edge_device_status = 'Offline'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_databricks_workspace.md b/docs/tables/azure_databricks_workspace.md index 03024402..517afff7 100644 --- a/docs/tables/azure_databricks_workspace.md +++ b/docs/tables/azure_databricks_workspace.md @@ -1,10 +1,20 @@ -# Table: azure_databricks_workspace +--- +title: "Steampipe Table: azure_databricks_workspace - Query Azure Databricks Workspaces using SQL" +description: "Allows users to query Azure Databricks Workspaces." +--- -A workspace is an environment for accessing all of your Azure Databricks assets. A workspace organizes objects (notebooks, libraries, dashboards, and experiments) into folders and provides access to data objects and computational resources. +# Table: azure_databricks_workspace - Query Azure Databricks Workspaces using SQL + +Azure Databricks is an Apache Spark-based analytics platform optimized for the Microsoft Azure cloud services platform. It provides a collaborative environment for data scientists, data engineers, and business analysts to work together. Azure Databricks allows you to build, train, and deploy AI solutions at scale. + +## Table Usage Guide + +The 'azure_databricks_workspace' table provides insights into Databricks Workspaces within Azure Databricks. As a data scientist or engineer, explore workspace-specific details through this table, including configurations, locations, and associated metadata. Utilize it to uncover information about workspaces, such as those with specific configurations, the relationships between workspaces, and the verification of workspace settings. The schema presents a range of attributes of the Databricks Workspace for your analysis, like the workspace ID, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore the basic information about Azure Databricks workspaces, such as their names and IDs. This can be useful to understand the distribution and usage of workspaces across your Azure environment. ```sql select @@ -19,6 +29,7 @@ from ``` ### List workspaces created in the last 30 days +Explore which workspaces have been established within the past month. This is useful for keeping track of recent additions and understanding the growth of your workspace environment. ```sql select @@ -35,6 +46,7 @@ where ``` ### List failed workspaces +Discover the segments that have experienced unsuccessful provisioning in Azure Databricks to understand where issues might have occurred. This is useful in identifying potential problems in your setup that may need troubleshooting. ```sql select @@ -51,6 +63,7 @@ where ``` ### List all encrypted workspaces +Discover the segments that utilize encrypted workspaces in Azure Databricks. This is beneficial in assessing the security measures in place within your organization's data processing environment. ```sql select @@ -67,6 +80,7 @@ where ``` ### List workspaces that allow public IP +Identify the Azure Databricks workspaces that are configured to allow public IP access. This can be useful for assessing potential security risks and ensuring compliance with company policies. ```sql select @@ -80,4 +94,4 @@ from azure_databricks_workspace where parameters -> 'enableNoPublicIp' ->> 'value' = 'false'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_diagnostic_setting.md b/docs/tables/azure_diagnostic_setting.md index 8392b812..17224e96 100644 --- a/docs/tables/azure_diagnostic_setting.md +++ b/docs/tables/azure_diagnostic_setting.md @@ -1,10 +1,20 @@ -# Table: azure_diagnostic_setting +--- +title: "Steampipe Table: azure_diagnostic_setting - Query Azure Monitor Diagnostic Settings using SQL" +description: "Allows users to query Azure Monitor Diagnostic Settings" +--- -Azure diagnostic settings are used to send platform logs and metrics to different destinations. +# Table: azure_diagnostic_setting - Query Azure Monitor Diagnostic Settings using SQL + +Azure Monitor Diagnostic Settings is a feature within Microsoft Azure that enables the streaming of log data from an Azure service to a storage account, event hub, or Azure Monitor logs. It provides a unified way to route detailed telemetry for specific Azure resources. This feature aids in auditing, debugging, and archival purposes, enhancing the monitoring and troubleshooting of Azure resources. + +## Table Usage Guide + +The 'azure_diagnostic_setting' table provides insights into the diagnostic settings of Azure Monitor. As a DevOps engineer, explore setting-specific details through this table, including the destination of the diagnostic data, the categories of logs and metrics, and associated metadata. Utilize it to uncover information about settings, such as those with enabled logs, the categories of logs and metrics, and the verification of event hub authorization rules. The schema presents a range of attributes of the diagnostic setting for your analysis, like the storage account ID, event hub name, log enabled status, and associated tags. ## Examples ### Basic info +Explore which diagnostic settings are in use within your Azure environment. This can help you maintain a clear overview of your configurations and ensure they are set up as desired. ```sql select @@ -16,6 +26,7 @@ from ``` ### List diagnostic settings that capture Alert category logs +Identify the diagnostic settings that are set to capture logs categorized as 'Alert'. This is useful in monitoring and troubleshooting activities as it allows you to track and analyze alerts in your system. ```sql select @@ -31,6 +42,7 @@ where ``` ### List diagnostic settings that capture Security category logs +Discover the segments that have diagnostic settings enabled for capturing security category logs. This can be particularly useful in identifying potential security vulnerabilities and maintaining robust security measures. ```sql select @@ -46,6 +58,7 @@ where ``` ### List diagnostic settings that capture Policy category logs +Explore the diagnostic settings that are actively capturing logs under the 'Policy' category. This can be useful for monitoring policy compliance and identifying potential issues in your Azure environment. ```sql select @@ -61,6 +74,7 @@ where ``` ### List diagnostic settings that capture Administrative category logs +Discover the segments that have diagnostic settings enabled for capturing Administrative category logs. This can be useful for administrators to understand and manage the specific settings that are actively logging administrative activities. ```sql select @@ -73,4 +87,4 @@ from where l ->> 'category' = 'Administrative' and l ->> 'enabled' = 'true'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_dns_zone.md b/docs/tables/azure_dns_zone.md index 399c31c8..319be076 100644 --- a/docs/tables/azure_dns_zone.md +++ b/docs/tables/azure_dns_zone.md @@ -1,10 +1,20 @@ -# Table: azure_dns_zone +--- +title: "Steampipe Table: azure_dns_zone - Query Azure DNS Zones using SQL" +description: "Allows users to query Azure DNS Zones, providing detailed information about each DNS zone in the Azure account." +--- -Azure DNS zone is used to host the DNS records for a particular domain. Please note that this table only retrieves public DNS zones, use the `azure_private_dns_zone` table for private DNS zones. +# Table: azure_dns_zone - Query Azure DNS Zones using SQL + +Azure DNS Zones is a service within Microsoft Azure that allows you to host your DNS domain in Azure. It provides name resolution using Microsoft Azure infrastructure, and you can use it to manage and resolve domain names in a virtual network. Azure DNS Zones is globally distributed, highly available, and designed to handle millions of queries per second. + +## Table Usage Guide + +The 'azure_dns_zone' table delivers comprehensive insights into DNS Zones within Microsoft Azure. As a network administrator, you can leverage this table to explore detailed information about each DNS zone, including its properties, record sets, and associated metadata. The table is particularly useful for understanding the configuration of DNS zones, such as which record sets are associated with each zone, the number of record sets in each zone, and the type of each record set. The schema presents a wide range of attributes of the DNS zone for your analysis, such as the zone name, resource group name, record set count, and associated tags. ## Examples ### Basic info +Explore which resource groups in your Azure DNS Zone are tagged for specific purposes. This allows for efficient management and organization of resources within your network. ```sql select @@ -16,6 +26,7 @@ from ``` ### List public DNS zones with record sets +Determine the areas in which public DNS zones have more than one record set in Azure. This can help in understanding the complexity of your DNS configuration and identify potential areas for consolidation or simplification. ```sql select @@ -28,6 +39,7 @@ where ``` ### List public DNS zones with delegated name servers +Explore the public DNS zones that have been delegated to non-Azure name servers, which can be essential in assessing the distribution of your DNS management responsibilities. This query can help identify potential areas of risk or inefficiency in your current DNS management strategy. ```sql select @@ -39,4 +51,4 @@ from where zone_type = 'Public' and ns not like '%.azure-dns.%.'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_eventgrid_domain.md b/docs/tables/azure_eventgrid_domain.md index c22e6acc..2162d852 100644 --- a/docs/tables/azure_eventgrid_domain.md +++ b/docs/tables/azure_eventgrid_domain.md @@ -1,10 +1,20 @@ -# Table: azure_eventgrid_domain +--- +title: "Steampipe Table: azure_eventgrid_domain - Query Azure Event Grid Domains using SQL" +description: "Allows users to query Azure Event Grid Domains" +--- -An event domain is a management tool for large numbers of Event Grid topics related to the same application. You can think of it as a meta-topic that can have thousands of individual topics. +# Table: azure_eventgrid_domain - Query Azure Event Grid Domains using SQL + +Azure Event Grid Domain is an Azure service that simplifies event routing and delivery from source to destination. It is a management and organization layer for event publishing, allowing you to route events from many sources to many destinations. Azure Event Grid Domains provide a single service for managing routing of events from various sources, all with the same security and authentication model. + +## Table Usage Guide + +The 'azure_eventgrid_domain' table provides insights into Event Grid Domains within Azure Event Grid. As a DevOps engineer, explore domain-specific details through this table, including endpoint, provision state, and associated metadata. Utilize it to uncover information about domains, such as those with specific input schema, the provisioning state, and the endpoint. The schema presents a range of attributes of the Event Grid Domain for your analysis, like the domain name, resource group, and associated tags. ## Examples ### Basic info +Explore the status and types of your EventGrid Domains in Azure. This can help you manage and organize your resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List domains not configured with private endpoint connections +Uncover the details of domains lacking private endpoint connections within the Azure EventGrid. This query is useful for identifying potential security vulnerabilities and ensuring proper configuration for secure data transmission. ```sql select @@ -31,6 +42,7 @@ where ``` ### List domains with local authentication disabled +This query helps identify domains where local authentication has been disabled, providing a quick way to review security settings and ensure proper access control measures are in place. This can be particularly useful in large-scale environments where manual review would be time-consuming. ```sql select @@ -42,4 +54,4 @@ from azure_eventgrid_domain where disable_local_auth; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_eventgrid_topic.md b/docs/tables/azure_eventgrid_topic.md index 6457672f..e1b69515 100644 --- a/docs/tables/azure_eventgrid_topic.md +++ b/docs/tables/azure_eventgrid_topic.md @@ -1,10 +1,20 @@ -# Table: azure_eventgrid_topic +--- +title: "Steampipe Table: azure_eventgrid_topic - Query Azure Event Grid Topics using SQL" +description: "Allows users to query Azure Event Grid Topics." +--- -The event grid topic provides an endpoint where the source sends events. The publisher creates the event grid topic, and decides whether an event source needs one topic or more than one topic. A topic is used for a collection of related events. To respond to certain types of events, subscribers decide which topics to subscribe to. +# Table: azure_eventgrid_topic - Query Azure Event Grid Topics using SQL + +Azure Event Grid is a service within Microsoft Azure that allows you to build applications with event-based architectures. It provides a centralized way to manage and react to events from various Azure resources, such as Blob Storage, Resource Groups, and Subscriptions. Azure Event Grid helps you stay informed about the status changes and take appropriate actions when certain conditions are met. + +## Table Usage Guide + +The 'azure_eventgrid_topic' table provides insights into Event Grid Topics within Azure Event Grid. As a DevOps engineer, explore topic-specific details through this table, including endpoint details, provisioning state, and associated metadata. Utilize it to uncover information about topics, such as those with specific endpoint types, the provisioning state of topics, and the verification of endpoint details. The schema presents a range of attributes of the Event Grid Topic for your analysis, like the topic name, id, type, provisioning state, and associated tags. ## Examples ### Basic info +Explore which Azure Event Grid topics are currently active. This can be useful in assessing the state of your event-driven applications and ensuring they are functioning as expected. ```sql select @@ -17,6 +27,7 @@ from ``` ### List domains not configured with private endpoint connections +Discover the segments that are lacking private endpoint connections within the Azure EventGrid topic. This allows for pinpointing potential security vulnerabilities in your network configuration. ```sql select @@ -31,6 +42,7 @@ where ``` ### List domains with local authentication disabled +Analyze the settings to understand which domains have local authentication disabled in your Azure EventGrid topic. This can help enhance security by identifying potential vulnerabilities and ensuring appropriate authentication measures are in place. ```sql select @@ -42,4 +54,4 @@ from azure_eventgrid_topic where disable_local_auth; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_eventhub_namespace.md b/docs/tables/azure_eventhub_namespace.md index 19eec8ad..8c1b0820 100644 --- a/docs/tables/azure_eventhub_namespace.md +++ b/docs/tables/azure_eventhub_namespace.md @@ -1,10 +1,20 @@ -# Table: azure_eventhub_namespace +--- +title: "Steampipe Table: azure_eventhub_namespace - Query Azure Event Hubs Namespaces using SQL" +description: "Allows users to query Azure Event Hubs Namespaces." +--- -An Event Hubs namespace provides DNS integrated network endpoints and a range of access control and network integration management features such as IP filtering, virtual network service endpoint, and Private Link and is the management container for one of multiple Event Hub instances (or topics, in Kafka parlance). +# Table: azure_eventhub_namespace - Query Azure Event Hubs Namespaces using SQL + +Azure Event Hubs is a big data streaming platform and event ingestion service, capable of receiving and processing millions of events per second. Event Hubs can process and analyze the data produced by connected devices and applications. A namespace is a container for all messaging components, multiple event hubs can reside within a single namespace, and namespaces are used as a way to isolate different sets of messaging components in separate environments. + +## Table Usage Guide + +The 'azure_eventhub_namespace' table provides insights into Azure Event Hubs Namespaces. As a DevOps engineer, explore namespace-specific details through this table, including the SKU name, capacity, tier, and associated metadata. Utilize it to uncover information about namespaces, such as their maximum throughput units, whether auto-inflate is enabled, and the network rules set. The schema presents a range of attributes of the namespace for your analysis, like the resource group, region, subscription ID, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Eventhub namespaces, including their names, IDs, types, and provisioning states. This allows you to gain insights into their creation dates and current operational status for effective management and monitoring. ```sql select @@ -18,6 +28,7 @@ from ``` ### List namespaces not configured to use virtual network service endpoint +Determine the areas in which Azure EventHub namespaces are not making use of the virtual network service endpoint. This can be useful to identify potential network security gaps in your Azure environment. ```sql select @@ -32,6 +43,7 @@ where ``` ### List unencrypted namespaces +Explore which Azure EventHub namespaces are unencrypted. This is useful for identifying potential security vulnerabilities within your Azure EventHub configuration. ```sql select @@ -46,6 +58,7 @@ where ``` ### List namespaces with auto-inflate disabled +Identify Azure EventHub namespaces where the auto-inflate feature is disabled. This can be useful for optimizing resource usage and managing costs. ```sql select @@ -60,6 +73,7 @@ where ``` ### List private endpoint connection details +Explore the details of private endpoint connections within your Azure EventHub Namespace. This can be useful in assessing the security and connectivity status of your system. ```sql select @@ -74,4 +88,4 @@ select from azure_eventhub_namespace, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_express_route_circuit.md b/docs/tables/azure_express_route_circuit.md index 71357c30..2689af94 100644 --- a/docs/tables/azure_express_route_circuit.md +++ b/docs/tables/azure_express_route_circuit.md @@ -1,10 +1,20 @@ -# Table: azure_express_route_circuit +--- +title: "Steampipe Table: azure_express_route_circuit - Query Azure ExpressRoute Circuits using SQL" +description: "Allows users to query Azure ExpressRoute Circuits" +--- -An ExpressRoute circuit represents a logical connection between your on-premises infrastructure and Microsoft cloud services through a connectivity provider. You can order multiple ExpressRoute circuits. Each circuit can be in the same or different regions, and can be connected to your premises through different connectivity providers. +# Table: azure_express_route_circuit - Query Azure ExpressRoute Circuits using SQL + +Azure ExpressRoute is a cloud integration solution for creating private data connections between your on-premises infrastructure and Microsoft Azure. These connections do not go over the public Internet, providing higher security, reliability, and speeds with lower latencies than typical connections over the Internet. ExpressRoute connections are ideal for data migration, replication for business continuity, disaster recovery, and other high-availability strategies. + +## Table Usage Guide + +The 'azure_express_route_circuit' table provides insights into ExpressRoute Circuits within Azure Networking. As a network engineer, explore circuit-specific details through this table, including peering locations, service provider details, and associated metadata. Utilize it to uncover information about circuits, such as those with high bandwidth usage, the peering relationships between circuits, and the verification of service key. The schema presents a range of attributes of the ExpressRoute Circuit for your analysis, like the circuit ARN, creation date, attached peering locations, and associated tags. ## Examples ### Basic info +Explore which Azure Express Route Circuits allow classic operations and analyze their provisioning states to understand their current status and configuration. This can be useful for identifying any circuits that may require updates or changes. ```sql select @@ -17,6 +27,7 @@ from ``` ### List express route circuits with global reach enabled +Analyze the settings to understand which Azure Express Route Circuits have global reach enabled. This can be useful to determine the areas in which your network traffic can extend globally, thus optimizing your network strategy. ```sql select @@ -30,6 +41,7 @@ where ``` ### List premium express route circuits +Discover the segments that are using premium tier Express Route Circuits in Azure. This can be beneficial for assessing the distribution of resources and optimizing cost management within your cloud infrastructure. ```sql select @@ -40,4 +52,4 @@ from azure_express_route_circuit where sku_tier = 'Premium'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_firewall.md b/docs/tables/azure_firewall.md index e4716814..1b7157d6 100644 --- a/docs/tables/azure_firewall.md +++ b/docs/tables/azure_firewall.md @@ -1,10 +1,20 @@ -# Table: azure_firewall +--- +title: "Steampipe Table: azure_firewall - Query Azure Network Firewalls using SQL" +description: "Allows users to query Azure Network Firewalls for detailed information about their configuration, status, rules, and more." +--- -Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. +# Table: azure_firewall - Query Azure Network Firewalls using SQL + +Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. + +## Table Usage Guide + +The 'azure_firewall' table provides insights into Network Firewalls within Azure Networking. As a network administrator, explore firewall-specific details through this table, including network rules, application rules, and associated metadata. Utilize it to uncover information about firewalls, such as rules with broad coverage, the relationships between different rules, and the verification of application rules. The schema presents a range of attributes of the Network Firewall for your analysis, like the firewall name, resource group, subscription ID, and associated tags. ## Examples ### Azure firewall location and availability zone count info +Explore the distribution of Azure firewalls across different regions and gain insights into their availability zone count to optimize network security and resource allocation. ```sql select @@ -16,6 +26,7 @@ from ``` ### Basic IP configuration info +Determine the configuration of IP addresses in your Azure firewall. This query allows you to identify private and public IP addresses, their allocation methods, and the virtual network they're associated with, helping you maintain an overview of your network's structure and security. ```sql select @@ -34,6 +45,7 @@ from ``` ### List the premium category firewalls +Explore which firewalls fall under the premium category in Azure. This is beneficial for assessing your current security infrastructure and planning future upgrades or budget allocation. ```sql select @@ -47,6 +59,7 @@ where ``` ### List of firewalls where threat intel mode is off +Discover the segments that have their firewall's threat intelligence mode turned off. This could be useful for identifying potential security gaps in your Azure services. ```sql select @@ -56,4 +69,4 @@ from azure_firewall where threat_intel_mode = 'Off'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_firewall_policy.md b/docs/tables/azure_firewall_policy.md index 1247b26a..91cf8a84 100644 --- a/docs/tables/azure_firewall_policy.md +++ b/docs/tables/azure_firewall_policy.md @@ -1,10 +1,20 @@ -# Table: azure_firewall_policy +--- +title: "Steampipe Table: azure_firewall_policy - Query Azure Firewall Policies using SQL" +description: "Allows users to query Azure Firewall Policies" +--- -Azure Firewall Policy is the recommended method to configure your Azure Firewall. It's a global resource that can be used across multiple Azure Firewall instances in Secured Virtual Hubs and Hub Virtual Networks. Policies work across regions and subscriptions. +# Table: azure_firewall_policy - Query Azure Firewall Policies using SQL + +Azure Firewall Policy is a configuration schema for Azure Firewall that can be used across multiple instances. It provides threat intelligence, service tags, application rules, and network rules as top level properties. Firewall policies can be managed independently from firewall instances, allowing for centralized management of your firewall security rules. + +## Table Usage Guide + +The 'azure_firewall_policy' table provides insights into Firewall Policies within Azure Firewall. As a security engineer, explore policy-specific details through this table, including threat intelligence, service tags, application rules, and network rules. Utilize it to uncover information about policies, such as those associated with specific firewall instances, the rules they enforce, and their overall configuration. The schema presents a range of attributes of the Firewall Policy for your analysis, like the policy ID, name, type, subscription ID, and associated tags. ## Examples ### Basic info +Explore which firewall policies are currently active within your Azure environment. This can help you assess your security measures and identify any areas that may need additional coverage or modifications. ```sql select @@ -21,6 +31,7 @@ from ``` ### List policies that are in failed state +Identify the firewall policies that are currently in a failed state. This can assist in troubleshooting and maintaining the overall health of your Azure firewall policies. ```sql select @@ -35,6 +46,7 @@ where ``` ### Get firewall details of each policy +Determine the details of each firewall policy in Azure, including the number of public IP addresses each firewall has. This is useful for understanding the scope and scale of your firewall protection. ```sql select @@ -52,6 +64,7 @@ where ``` ### Get DNS setting details of each policy +Explore the DNS settings of each policy to understand whether a proxy is enabled or required for network rules. This can be useful for analyzing and managing network security configurations. ```sql select @@ -65,6 +78,7 @@ from ``` ### List threat intel whitelist IP addresses of firewall policies +Explore the firewall policies that have specific IP addresses whitelisted, aiding in the understanding of threat intelligence and enhancing security measures. ```sql select @@ -77,6 +91,7 @@ from ``` ### List threat intel whitelist FQDNs of firewall policies +Explore the whitelist domain names of firewall policies to understand potential safe sources of traffic in your Azure environment. This can help you maintain a secure network by identifying trusted entities. ```sql select diff --git a/docs/tables/azure_frontdoor.md b/docs/tables/azure_frontdoor.md index c4a7d315..5cef9d52 100644 --- a/docs/tables/azure_frontdoor.md +++ b/docs/tables/azure_frontdoor.md @@ -1,10 +1,20 @@ -# Table: azure_frontdoor +--- +title: "Steampipe Table: azure_frontdoor - Query Azure Front Door Services using SQL" +description: "Allows users to query Azure Front Door Services." +--- -Azure Front Door is a global, scalable entry-point that uses the Microsoft global edge network to create fast, secure, and widely scalable web applications. With Front Door, you can transform your global consumer and enterprise applications into robust, high-performing personalized modern applications with contents that reach a global audience through Azure. +# Table: azure_frontdoor - Query Azure Front Door Services using SQL + +Azure Front Door is a scalable and secure entry point for fast delivery of your global web applications. It provides global load balancing and site acceleration service for fast and reliable application delivery at global scale. It offers SSL offload, path-based routing, fast failover, and many more capabilities. + +## Table Usage Guide + +The 'azure_frontdoor' table provides insights into Front Door Services within Azure. As a DevOps engineer, explore service-specific details through this table, including routing rules, backend pools, frontend endpoints, and associated metadata. Utilize it to uncover information about services, such as those with specific routing rules, the health probes between backend pools, and the verification of frontend endpoints. The schema presents a range of attributes of the Front Door Service for your analysis, like the service ID, creation date, enabled state, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Front Door service to understand its current state and type. This can help you assess the overall setup and configuration for effective resource management. ```sql select @@ -18,6 +28,7 @@ from ``` ### List backend pools settings details +Explore the configuration settings of backend pools in an Azure Front Door service. This allows you to assess security measures, like enforcing certificate name checks, and performance parameters, such as send/receive timeout durations. ```sql select @@ -30,6 +41,7 @@ from ``` ### List routing rules details +Determine the specific details of routing rules, such as their enabled state, resource state, accepted protocols, and associated endpoints. This can assist in understanding how traffic is being directed and managed within your Azure Front Door service. ```sql select @@ -49,6 +61,7 @@ from ``` ### List load balancing settings details +Explore the specifics of load balancing settings to assess their properties and understand their configuration, which is crucial for managing traffic distribution and ensuring efficient resource utilization. ```sql select @@ -66,6 +79,7 @@ from ``` ### List frontend endpoints details +Explore the details of frontend endpoints to gain insights into their properties such as host name, session affinity enabled state, and resource state. This can be useful in understanding and managing the configuration of these endpoints, especially in terms of their security settings like the web application firewall policy link. ```sql select @@ -84,6 +98,7 @@ from ``` ### List health probe settings details +Explore the configuration of health probe settings to understand how they are set up and functioning. This can help in assessing the performance and reliability of your network connections. ```sql select @@ -100,4 +115,4 @@ select from azure_frontdoor, jsonb_array_elements(health_probe_settings) as setting; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_hdinsight_cluster.md b/docs/tables/azure_hdinsight_cluster.md index a71a46c1..c1ca89ef 100644 --- a/docs/tables/azure_hdinsight_cluster.md +++ b/docs/tables/azure_hdinsight_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_hdinsight_cluster +--- +title: "Steampipe Table: azure_hdinsight_cluster - Query Azure HDInsight Clusters using SQL" +description: "Allows users to query Azure HDInsight Clusters." +--- -Azure HDInsight is a managed, full-spectrum, open-source analytics service in the cloud for enterprises. You can use open-source frameworks such as Hadoop, Apache Spark, Apache Hive, LLAP, Apache Kafka, Apache Storm, R, and more. +# Table: azure_hdinsight_cluster - Query Azure HDInsight Clusters using SQL + +Azure HDInsight is a cloud distribution of the Hadoop components from the Hortonworks Data Platform (HDP). Azure HDInsight makes it easy, fast, and cost-effective to process massive amounts of data. You can use the most popular open-source frameworks such as Hadoop, Spark, Hive, LLAP, Kafka, Storm, R, and more. + +## Table Usage Guide + +The 'azure_hdinsight_cluster' table provides insights into HDInsight Clusters within Azure HDInsight. As a DevOps engineer, you can explore cluster-specific details through this table, including the cluster type, version, state, and associated metadata. Utilize it to uncover information about clusters, such as the number of worker nodes, the type of storage used, and the networking configurations. The schema presents a range of attributes of the HDInsight Cluster for your analysis, like the cluster ID, creation date, tier, and associated tags. ## Examples ### Basic info +Explore the status and details of your Azure HDInsight clusters to understand their configuration and performance. This can help in maintaining optimal cluster health and efficiency. ```sql select @@ -22,6 +32,7 @@ from ``` ### List clusters with encryption in transit enabled +Assess the elements within your Azure HDInsight clusters to identify those with enabled encryption in transit. This can be useful to ensure data security and compliance with your organization's security policies. ```sql select @@ -35,6 +46,7 @@ where ``` ### List disk encryption details +Explore the encryption specifics of your disk resources to better understand your data's security. This query could be used to assess the encryption methods and algorithms in place, helping to identify potential vulnerabilities or areas for improvement. ```sql select @@ -51,6 +63,7 @@ from ``` ### List connectivity endpoint details +Explore the connectivity details of your Azure HDInsight clusters to understand their communication protocols, locations, and private IP addresses. This information can be useful in managing network configurations and optimizing data transfer between various clusters. ```sql select @@ -64,4 +77,4 @@ select from azure_hdinsight_cluster, jsonb_array_elements(connectivity_endpoints) as endpoint; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_healthcare_service.md b/docs/tables/azure_healthcare_service.md index 45311ec4..32af84ce 100644 --- a/docs/tables/azure_healthcare_service.md +++ b/docs/tables/azure_healthcare_service.md @@ -1,10 +1,20 @@ -# Table: azure_healthcare_service +--- +title: "Steampipe Table: azure_healthcare_service - Query Azure Healthcare Services using SQL" +description: "Allows users to query Azure Healthcare Services." +--- -Azure Healthcare APIs provides pipelines that help you manage protected health information (PHI) data at scale. +# Table: azure_healthcare_service - Query Azure Healthcare Services using SQL + +Azure Healthcare Service is a managed service that provides built-in support for industry standard health data protocols and data types. It enables health organizations to ingest, manage, and persist health information in the cloud. This service supports the FHIR (Fast Healthcare Interoperability Resources) standard for exchanging healthcare information electronically. + +## Table Usage Guide + +The 'azure_healthcare_service' table provides insights into Azure Healthcare Services. As a DevOps engineer, explore service-specific details through this table, including the service type, provisioning state, access policies, and associated metadata. Utilize it to uncover information about services, such as those with public network access, the kind of service, and the provisioning state. The schema presents a range of attributes of the Azure Healthcare Service for your analysis, like the service name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore the fundamental characteristics of your Azure healthcare services. This query helps you understand the types of services you have, their authorities, and whether they allow credentials, providing insights into your overall healthcare service configuration. ```sql select @@ -20,6 +30,7 @@ from ``` ### List healthcare services of fhir-R4 kind +Explore which healthcare services utilize the 'fhir-R4' type in Azure. This can be useful in identifying and managing services that employ this specific standard. ```sql select @@ -34,6 +45,7 @@ where ``` ### List private endpoint connection details for healthcare service +Explore the status and details of private connections for a healthcare service. This can be useful in managing and securing network connections within a healthcare service infrastructure. ```sql select @@ -49,6 +61,7 @@ from ``` ### List diagnostic settings for healthcare service +Analyze the settings to understand the diagnostic configurations for a healthcare service. This is useful for managing and monitoring the health of the service. ```sql select @@ -64,6 +77,7 @@ from ``` ### List Cosmos DB configuration settings +Review the configuration for Azure's Cosmos DB to determine the key vault key URI and offer throughput, which can be useful for assessing database performance and security settings. ```sql select @@ -73,4 +87,4 @@ select cosmos_db_configuration -> 'offerThroughput' as offer_throughput from azure_healthcare_service; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_hpc_cache.md b/docs/tables/azure_hpc_cache.md index 3773e3af..dcb6574d 100644 --- a/docs/tables/azure_hpc_cache.md +++ b/docs/tables/azure_hpc_cache.md @@ -1,10 +1,20 @@ -# Table: azure_hpc_cache +--- +title: "Steampipe Table: azure_hpc_cache - Query Azure Storage Cache using SQL" +description: "Allows users to query Azure Storage Caches" +--- -Azure HPC Cache speeds access to your data for high-performance computing (HPC) tasks. By caching files in Azure, Azure HPC Cache brings the scalability of cloud computing to your existing workflow. This service can be used even for workflows where your data is stored across WAN links, such as in your local datacenter network-attached storage (NAS) environment. +# Table: azure_hpc_cache - Query Azure Storage Cache using SQL + +Azure HPC Cache is a service that provides low-latency, high-throughput access to data located in Azure Blob storage. It creates a caching layer between compute clusters and storage to help you run more jobs, more iterations, and get results faster. It is designed to support high-performance computing (HPC) scenarios where data is read from and written to Azure Blob storage. + +## Table Usage Guide + +The 'azure_hpc_cache' table provides insights into the Azure HPC Cache within Azure Storage. As a DevOps engineer, explore cache-specific details through this table, including cache size, health, provisioning state, and associated metadata. Utilize it to uncover information about caches, such as their network settings, subnet ID, and usage model. The schema presents a range of attributes of the Azure HPC Cache for your analysis, like the cache ID, creation time, health, provisioning state, and associated tags. ## Examples ### Basic info +Explore which High Performance Computing (HPC) caches are currently active in your Azure environment and understand their types and provisioning states. This can help in assessing their performance and managing resources efficiently. ```sql select @@ -18,6 +28,7 @@ from ``` ### List network settings details +Explore the network settings of your Azure HPC Cache to gain insights into configurations such as DNS search domain, MTU, NTP server, DNS servers, and utility addresses. This can help you understand and manage your network's performance, security, and reliability. ```sql select @@ -33,6 +44,7 @@ from ``` ### List encryption settings details +Explore the encryption settings of your Azure HPC Cache to understand the configuration of your key encryption and network settings. This can be useful for maintaining security standards and ensuring proper data protection. ```sql select @@ -43,4 +55,4 @@ select network_settings -> 'rotationToLatestKeyVersionEnabled' as rotation_to_latest_key_version_enabled from azure_hpc_cache; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_hybrid_compute_machine.md b/docs/tables/azure_hybrid_compute_machine.md index 1ed52353..145d7978 100644 --- a/docs/tables/azure_hybrid_compute_machine.md +++ b/docs/tables/azure_hybrid_compute_machine.md @@ -1,10 +1,20 @@ -# Table: azure_hybrid_compute_machine +--- +title: "Steampipe Table: azure_hybrid_compute_machine - Query Azure Hybrid Compute Machines using SQL" +description: "Allows users to query Azure Hybrid Compute Machines" +--- -Azure Arc enables you to manage servers running outside of Azure using Azure Resource Manager. Each server is represented in Azure as a hybrid compute machine resource. Once a server is managed with Azure Arc, you can deploy agents, scripts, or configurations to the machine using extensions. The Hybrid Compute API allows you to create, list, update and delete your Azure Arc enabled servers and any extensions associated with them. +# Table: azure_hybrid_compute_machine - Query Azure Hybrid Compute Machines using SQL + +Azure Hybrid Compute Machines are a part of the Azure Arc service that extends Azure management and services to any infrastructure. It allows you to manage and govern Windows and Linux machines hosted outside of Azure, on your corporate network, or other cloud provider. This service simplifies complex and distributed environments across on-premises, edge, and multi-cloud into a unified central point. + +## Table Usage Guide + +The 'azure_hybrid_compute_machine' table provides insights into Hybrid Compute Machines within Azure Arc. As a DevOps engineer, explore machine-specific details through this table, including machine properties, operating system details, and associated metadata. Utilize it to uncover information about machines, such as their status, location, and the version of the Azure Arc agent installed on them. The schema presents a range of attributes of the Hybrid Compute Machine for your analysis, like the machine's ID, name, location, and operating system. ## Examples ### Basic info +Explore which machines in your Azure hybrid environment are active and where they are located. This can assist in managing resources and understanding the distribution of your infrastructure. ```sql select @@ -18,6 +28,7 @@ from ``` ### List disconnected machines +Identify instances where machines in the Azure hybrid compute environment are disconnected. This can be useful in diagnosing network issues or managing system availability. ```sql select diff --git a/docs/tables/azure_hybrid_kubernetes_connected_cluster.md b/docs/tables/azure_hybrid_kubernetes_connected_cluster.md index 9e67b678..c56f65f8 100644 --- a/docs/tables/azure_hybrid_kubernetes_connected_cluster.md +++ b/docs/tables/azure_hybrid_kubernetes_connected_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_hybrid_kubernetes_connected_cluster +--- +title: "Steampipe Table: azure_hybrid_kubernetes_connected_cluster - Query Azure Kubernetes Service Connected Clusters using SQL" +description: "Allows users to query Azure Kubernetes Service Connected Clusters" +--- -Hybrid Kubernetes Service allows you to manage your on-premise kubernetes clusters from azure by onboarding them to Azure Arc. The Hybrid Kubernetes API allows you to create, list, update and delete your Arc enabled kubernetes clusters. +# Table: azure_hybrid_kubernetes_connected_cluster - Query Azure Kubernetes Service Connected Clusters using SQL + +Azure Kubernetes Service (AKS) is a managed container orchestration service provided by Microsoft Azure. AKS simplifies the deployment, scaling, and operations of Kubernetes. The Connected Cluster feature allows users to bring their existing Kubernetes clusters running outside of Azure into the Azure Resource Model. + +## Table Usage Guide + +The 'azure_hybrid_kubernetes_connected_cluster' table provides insights into Connected Clusters within Azure Kubernetes Service (AKS). As a DevOps engineer, explore cluster-specific details through this table, including cluster versions, node counts, and associated metadata. Utilize it to uncover information about clusters, such as their provisioning states, the Kubernetes versions they are running, and their network profiles. The schema presents a range of attributes of the Connected Cluster for your analysis, like the cluster ID, creation date, provisioning state, and associated tags. ## Examples ### Basic info +Explore which Azure Hybrid Kubernetes clusters are provisioned and their respective connectivity statuses to understand their operational readiness across different regions. This is particularly useful in managing resources and ensuring optimal cluster performance. ```sql select @@ -18,6 +28,7 @@ from ``` ### List expired clusters +Explore which hybrid Kubernetes clusters in your Azure environment have expired. This is useful in maintaining optimal resource allocation and ensuring all active clusters are in good health. ```sql select @@ -31,4 +42,4 @@ from azure_hybrid_kubernetes_connected_cluster where connectivity_status = 'Expired'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_iothub.md b/docs/tables/azure_iothub.md index bc0f7b4e..cdb04ce0 100644 --- a/docs/tables/azure_iothub.md +++ b/docs/tables/azure_iothub.md @@ -1,10 +1,20 @@ -# Table: azure_iothub +--- +title: "Steampipe Table: azure_iothub - Query Azure IoT Hub using SQL" +description: "Allows users to query Azure IoT Hubs" +--- -Azure IoT Hub is Microsoft’s Internet of Things connector to the cloud. It’s a fully managed cloud service that enables reliable and secure bi-directional communications between millions of IoT devices and a solution back end. +# Table: azure_iothub - Query Azure IoT Hub using SQL + +Azure IoT Hub is a managed service, hosted in the cloud, that acts as a central message hub for bi-directional communication between your IoT application and the devices it manages. You can use Azure IoT Hub to build IoT solutions with reliable and secure communications between millions of IoT devices and a cloud-hosted solution backend. It supports communications both from the device to the cloud and from the cloud to the device. + +## Table Usage Guide + +The 'azure_iothub' table provides insights into IoT Hubs within Azure IoT Hub. As a DevOps engineer, explore hub-specific details through this table, including the status, SKU, tier, and associated metadata. Utilize it to uncover information about IoT Hubs, such as their location, the number of devices connected, and the verification of their properties. The schema presents a range of attributes of the IoT Hub for your analysis, like the resource group, subscription ID, public network access, and associated tags. ## Examples ### Basic info +Analyze the settings of your Azure IoT Hub to understand its geographical distribution and types. This can help in managing resources and improving the efficiency of IoT devices across different regions. ```sql select @@ -17,6 +27,7 @@ from ``` ### List hubs which are not active +Determine the areas in which inactive IoT hubs exist within the Azure platform. This can be beneficial in identifying potential issues or inefficiencies related to unused resources. ```sql select @@ -28,4 +39,4 @@ from azure_iothub where state <> 'Active'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_iothub_dps.md b/docs/tables/azure_iothub_dps.md index df15850a..20bb945a 100644 --- a/docs/tables/azure_iothub_dps.md +++ b/docs/tables/azure_iothub_dps.md @@ -1,10 +1,20 @@ -# Table: azure_iothub_dps +--- +title: "Steampipe Table: azure_iothub_dps - Query Azure IoT Hub Device Provisioning Services using SQL" +description: "Allows users to query Azure IoT Hub Device Provisioning Services." +--- -The IoT Hub Device Provisioning Service (DPS) is a helper service for IoT Hub that enables zero-touch, just-in-time provisioning to the right IoT hub without requiring human intervention, allowing customers to provision millions of devices in a secure and scalable manner. +# Table: azure_iothub_dps - Query Azure IoT Hub Device Provisioning Services using SQL + +Azure IoT Hub Device Provisioning Service is a helper service for IoT Hub that enables zero-touch, just-in-time provisioning to the right IoT hub without requiring human intervention, enabling customers to provision millions of devices in a secure and scalable manner. It brings the scalability, security, and reliability of Azure IoT Hub and Device Provisioning Service to your on-premises Internet of Things (IoT) applications. The service supports provisioning of both Azure IoT Edge devices and IoT devices running on other operating systems. + +## Table Usage Guide + +The 'azure_iothub_dps' table provides insights into Device Provisioning Services within Azure IoT Hub. As a DevOps engineer, explore service-specific details through this table, including the provisioning state, IoT Hub linked with the service, and associated metadata. Utilize it to uncover information about services, such as those with specific provisioning states, the IoT Hubs associated with the services, and the verification of the service operations monitoring level. The schema presents a range of attributes of the IoT Hub Device Provisioning Service for your analysis, like the service name, provisioning state, IoT Hub Device ID, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure IoT Hub Device Provisioning Services (DPS) to understand their locations and types. This can be useful to manage and organize your IoT devices across different regions. ```sql select @@ -17,6 +27,7 @@ from ``` ### List iot hub dps which are not active +Explore which IoT Hub Device Provisioning Services are not currently active, to potentially identify any issues or areas requiring attention. This could be beneficial in maintaining optimal network performance and avoiding potential service disruptions. ```sql select @@ -28,4 +39,4 @@ from azure_iothub_dps where state <> 'Active'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault.md b/docs/tables/azure_key_vault.md index 2097f42c..91ef8cc4 100644 --- a/docs/tables/azure_key_vault.md +++ b/docs/tables/azure_key_vault.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault +--- +title: "Steampipe Table: azure_key_vault - Query Azure Key Vault using SQL" +description: "Allows users to query Azure Key Vaults" +--- -Azure Key Vault is a cloud service used to manage keys, secrets, and certificates. +# Table: azure_key_vault - Query Azure Key Vault using SQL + +Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. Azure Key Vault handles the storage and management of these secrets in a secure and scalable manner, reducing the chances of accidental secret leakage. + +## Table Usage Guide + +The 'azure_key_vault' table provides insights into Key Vaults within Azure Key Vault service. As a security engineer, explore details specific to each Key Vault through this table, including the vault's URI, resource group, subscription, and location. Utilize it to uncover information about Key Vaults' properties, such as enabled for deployment, disk encryption, template deployment, and soft delete. The schema presents a range of attributes of the Key Vault for your analysis, like the tenant ID, SKU name, family, vault URI, access policies, and associated tags. ## Examples ### List of key vaults where soft deletion is not enabled +Determine the areas in which soft deletion is not enabled within key vaults. This query can be useful for identifying potential security risks and ensuring data recovery options are in place. ```sql select @@ -20,6 +30,7 @@ where ### List of key vaults where soft deletion retention period is less than 30 days +Determine the areas in which your Azure Key Vaults have a soft deletion retention period of less than 30 days. This is useful to ensure that your data retention policies are in line with your organization's security standards. ```sql select @@ -35,6 +46,7 @@ where ### Key vaults access information +Explore which Azure Key Vaults are enabled for deployment, disk encryption, and template deployment. This is useful for assessing your security configurations and identifying potential vulnerabilities. ```sql select @@ -49,6 +61,7 @@ from ### List of premium category key vaults +Explore which key vaults fall under the premium category. This can be beneficial for understanding your usage and cost distribution in Azure. ```sql select @@ -64,6 +77,7 @@ where ### Key vaults access policies details for certificates, keys and secrets +Explore the access policies for certificates, keys, and secrets within your Azure Key Vaults. This can help you understand the permissions set up in your environment, ensuring the right access controls are in place. ```sql select @@ -78,6 +92,7 @@ from ### List vaults with logging enabled +Discover the segments of your Azure Key Vaults where logging is enabled. This can be useful for auditing and compliance purposes, as it allows you to track and retain important security and access data. ```sql select @@ -95,4 +110,4 @@ where and (log ->> 'enabled')::boolean and log ->> 'category' = 'AuditEvent' and (log -> 'retentionPolicy' ->> 'days')::integer > 0; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_deleted_vault.md b/docs/tables/azure_key_vault_deleted_vault.md index 42397844..0e647afe 100644 --- a/docs/tables/azure_key_vault_deleted_vault.md +++ b/docs/tables/azure_key_vault_deleted_vault.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_deleted_vault +--- +title: "Steampipe Table: azure_key_vault_deleted_vault - Query Azure Key Vault Deleted Vaults using SQL" +description: "Allows users to query Azure Key Vault Deleted Vaults for detailed information." +--- -Azure Key Vault's soft-delete feature allows recovery of the deleted vaults and deleted key vault objects. +# Table: azure_key_vault_deleted_vault - Query Azure Key Vault Deleted Vaults using SQL + +Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. Azure Key Vault Deleted Vaults are vaults that have been deleted but are still recoverable for a certain period of time. + +## Table Usage Guide + +The 'azure_key_vault_deleted_vault' table provides insights into deleted vaults within Azure Key Vault. As a security analyst or DevOps engineer, explore deleted vault-specific details through this table, including deletion date, recovery level, and scheduled purge date. Utilize it to uncover information about deleted vaults, such as those scheduled for permanent deletion or those still recoverable. The schema presents a range of attributes of the deleted vault for your analysis, like the vault name, location, deletion date, and scheduled purge date. ## Examples ### Basic info +Explore which Azure Key Vault resources have been deleted and when they are scheduled for permanent removal. This can be useful for auditing purposes or to recover resources before they are permanently purged. ```sql select @@ -18,6 +28,7 @@ from ``` ### List deleted vaults with scheduled purge date more than 1 day +Identify instances where Azure Key Vaults have been deleted and are scheduled for purging in more than a day. This can be useful in assessing data cleanup strategies and preventing accidental loss of important keys. ```sql select @@ -30,4 +41,4 @@ from azure_key_vault_deleted_vault where scheduled_purge_date > (current_date - interval '1' day); -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_key.md b/docs/tables/azure_key_vault_key.md index a68dd9b5..7b5ebeaa 100644 --- a/docs/tables/azure_key_vault_key.md +++ b/docs/tables/azure_key_vault_key.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_key +--- +title: "Steampipe Table: azure_key_vault_key - Query Azure Key Vault Keys using SQL" +description: "Allows users to query Azure Key Vault Keys." +--- -Azure Key Vault Keys are 'Cryptographic keys' used to encrypt information without releasing the private key to the consumer. It acts like a black box to encrypt and decrypt content using the RSA algorithm. The RSA algorithm, involves a public key and private key. +# Table: azure_key_vault_key - Query Azure Key Vault Keys using SQL + +Azure Key Vault is a service that safeguards cryptographic keys and secrets used by cloud applications and services. It provides secure key management, ensures that keys are available when needed, and prevents unauthorized access. Azure Key Vault Keys are the keys that are stored in the Azure Key Vault for use in applications and services. + +## Table Usage Guide + +The 'azure_key_vault_key' table provides insights into keys within Azure Key Vault. As a security engineer, explore key-specific details through this table, including the key type, key state, and associated metadata. Utilize it to uncover information about keys, such as those that are disabled, the verification of key attributes, and the creation and expiry dates. The schema presents a range of attributes of the Key Vault key for your analysis, like the key ID, creation date, updated date, and vault details. ## Examples ### Basic info +This query allows you to review the details of your Azure Key Vault keys. It is particularly useful in auditing and managing these keys by providing information such as their status, creation and modification dates, and location. ```sql select @@ -20,6 +30,7 @@ from ``` ### List disabled keys +Explore which keys in your Azure Key Vault are currently disabled. This can help in maintaining security by identifying and managing inactive keys. ```sql select @@ -33,6 +44,7 @@ where ``` ### List keys with no expiration time set +Explore which keys in the Azure Key Vault have no expiration time set. This can help in identifying potential security risks, as keys without an expiration can be misused if they fall into the wrong hands. ```sql select @@ -46,6 +58,7 @@ where ``` ### List keys which have never been updated +Explore which keys in Azure Key Vault are active but have never been modified since their creation. This helps in identifying unused or potentially obsolete keys, aiding in better security management. ```sql select @@ -61,6 +74,7 @@ where ``` ### Count the number of keys by key vault +Explore which Azure Key Vault has the most keys, providing a useful overview of your key distribution and aiding in the management and organization of your security assets. ```sql select @@ -70,4 +84,4 @@ from azure_key_vault_key group by vault_name; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_key_version.md b/docs/tables/azure_key_vault_key_version.md index 138054cc..47275434 100644 --- a/docs/tables/azure_key_vault_key_version.md +++ b/docs/tables/azure_key_vault_key_version.md @@ -1,10 +1,21 @@ -# Table: azure_key_vault_key_version +--- +title: "Steampipe Table: azure_key_vault_key_version - Query Azure Key Vault Keys using SQL" +description: "Allows users to query versions of Azure Key Vault Keys." +--- + +# Table: azure_key_vault_key_version - Query Azure Key Vault Keys using SQL + +Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. Key Vault service supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value keys. + +## Table Usage Guide + +The 'azure_key_vault_key_version' table provides insights into versions of keys within Azure Key Vault. As a security analyst, explore key-specific details through this table, including key type, key size, and key state. Utilize it to uncover information about keys, such as their creation date, update date, and the recovery level. The schema presents a range of attributes of the key for your analysis, like the key ID, enabled status, expiration date, and associated tags. -Azure Key Vault Keys are 'Cryptographic keys' used to encrypt information without releasing the private key to the consumer. It acts like a black box to encrypt and decrypt content using the RSA algorithm. The RSA algorithm, involves a public key and private key. They can roll to a new version of the key, back it up, and do related tasks. ## Examples ### Basic info +Explore the settings of Azure Key Vault keys to understand their status and configuration. This is useful for assessing security measures and ensuring proper key management. ```sql select @@ -20,6 +31,7 @@ from ``` ### List disabled key versions +Discover the segments that contain disabled key versions in Azure Key Vault. This is useful for assessing security configurations and maintaining proper access controls. ```sql select @@ -34,6 +46,7 @@ where ``` ### List keys versions with no expiration time set +Explore which versions of keys in Azure Key Vault lack a set expiration time. This query is useful for identifying potential security risks, as keys without expiration times can be misused if they fall into the wrong hands. ```sql select @@ -47,6 +60,7 @@ where ``` ### Count the number of versions by key +Explore the distribution of different key versions within your Azure Key Vault. This is useful for assessing the overall version management and understanding if certain keys are being updated more frequently than others. ```sql select @@ -56,4 +70,4 @@ from azure_key_vault_key_version group by key_name; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_key_vault_managed_hardware_security_module.md b/docs/tables/azure_key_vault_managed_hardware_security_module.md index 2fa2cf5f..b0b5979b 100644 --- a/docs/tables/azure_key_vault_managed_hardware_security_module.md +++ b/docs/tables/azure_key_vault_managed_hardware_security_module.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_managed_hardware_security_module +--- +title: "Steampipe Table: azure_key_vault_managed_hardware_security_module - Query Azure Key Vault Managed Hardware Security Modules using SQL" +description: "Allows users to query Azure Key Vault Managed Hardware Security Modules." +--- -Azure Key Vault Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs. +# Table: azure_key_vault_managed_hardware_security_module - Query Azure Key Vault Managed Hardware Security Modules using SQL + +A Managed Hardware Security Module (HSM) is a service offered by Azure Key Vault that provides cryptographic key storage in Azure. It provides secure, FIPS 140-2 Level 3 validated, cryptographic key storage and operations using Azure Key Vault. It is designed to meet the stringent requirements of highly regulated industries that process, store, and use sensitive data. + +## Table Usage Guide + +The 'azure_key_vault_managed_hardware_security_module' table provides insights into Managed Hardware Security Modules within Azure Key Vault. As a security or DevOps engineer, explore module-specific details through this table, including its cryptographic keys, key operations, and associated metadata. Utilize it to uncover information about modules, such as their key identifiers, enabled status, and creation time. The schema presents a range of attributes of the Managed Hardware Security Module for your analysis, like the resource ID, name, type, and location. ## Examples ### Basic info +Analyze the settings to understand the configuration of your Azure Key Vault Managed Hardware Security Module. This query can help you assess the elements within your system, such as its name, ID, type, and region, as well as whether the soft delete option is enabled. ```sql select @@ -19,6 +29,7 @@ from ``` ### List soft delete disabled hsm managed key vaults +Identify instances where Azure Key Vault Managed Hardware Security Modules do not have the soft delete feature enabled. This is useful for ensuring data protection and recovery in case of accidental deletion. ```sql select diff --git a/docs/tables/azure_key_vault_secret.md b/docs/tables/azure_key_vault_secret.md index 9b99a729..9f11423d 100644 --- a/docs/tables/azure_key_vault_secret.md +++ b/docs/tables/azure_key_vault_secret.md @@ -1,10 +1,20 @@ -# Table: azure_key_vault_secret +--- +title: "Steampipe Table: azure_key_vault_secret - Query Azure Key Vault Secrets using SQL" +description: "Allows users to query Azure Key Vault Secrets." +--- -Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, or cryptographic keys. +# Table: azure_key_vault_secret - Query Azure Key Vault Secrets using SQL + +Azure Key Vault is a service in Microsoft Azure that allows you to securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. It provides a centralized way to manage application secrets and control their distribution. Azure Key Vault helps you control your applications' secrets by keeping them off the code and allowing secure access to them. + +## Table Usage Guide + +The 'azure_key_vault_secret' table provides insights into secrets within Azure Key Vault. As a security engineer, explore secret-specific details through this table, including secret versions, enabled status, and associated metadata. Utilize it to uncover information about secrets, such as those with expirations, the recovery level of each secret, and the verification of content types. The schema presents a range of attributes of the Azure Key Vault secret for your analysis, like the secret name, vault name, enabled status, and creation date. ## Examples ### Basic info +Discover the secrets stored in your Azure Key Vault by examining the details such as name, ID, vault name, and status. This can help you manage and track your secrets, ensuring they are enabled and updated as needed. ```sql select @@ -20,6 +30,7 @@ from ``` ### List disabled secrets +Discover the segments that contain disabled secrets within your Azure Key Vault, allowing you to assess potential security vulnerabilities or areas requiring further management. This is particularly useful for maintaining the integrity of your system by identifying inactive or unused secrets. ```sql select @@ -33,6 +44,7 @@ where ``` ### List secrets that do not expire +Discover the segments that contain secrets in your Azure Key Vault that do not have an expiration date set. This can help in identifying potential security risks and ensuring that all secrets are managed according to best practices. ```sql select @@ -46,6 +58,7 @@ where ``` ### List enabled secrets that have never been updated +Discover the segments that consist of active secrets within your Azure Key Vault that have remained unchanged since their creation. This is beneficial for maintaining good security practices, as it allows you to identify and update stagnant secrets. ```sql select @@ -61,6 +74,7 @@ where ``` ### Count the number of secrets by vault +Determine the quantity of secrets stored in each Azure Key Vault. This can help in managing and monitoring the distribution of secrets across your vaults. ```sql select @@ -70,4 +84,4 @@ from azure_key_vault_secret group by vault_name; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_kubernetes_cluster.md b/docs/tables/azure_kubernetes_cluster.md index c22050cc..993382e9 100644 --- a/docs/tables/azure_kubernetes_cluster.md +++ b/docs/tables/azure_kubernetes_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_kubernetes_cluster +--- +title: "Steampipe Table: azure_kubernetes_cluster - Query Azure Kubernetes Services using SQL" +description: "Allows users to query Azure Kubernetes Services" +--- -Azure Kubernetes orchestrates clusters of virtual machines and schedules containers to run on those virtual machines based on their available compute resources and the resource requirements of each container. +# Table: azure_kubernetes_cluster - Query Azure Kubernetes Services using SQL + +Azure Kubernetes Service (AKS) is a managed container orchestration service provided by Microsoft Azure. AKS simplifies the deployment, scaling, and operations of Kubernetes. It provides an integrated developer experience for building, deploying, and scaling containerized applications. + +## Table Usage Guide + +The 'azure_kubernetes_cluster' table provides insights into Kubernetes clusters within Azure Kubernetes Service (AKS). As a DevOps engineer, explore cluster-specific details through this table, including version, node count, and associated metadata. Utilize it to uncover information about clusters, such as those with specific configurations, the relationships between clusters, and the verification of cluster settings. The schema presents a range of attributes of the Kubernetes cluster for your analysis, like the cluster ID, creation date, attached network policies, and associated tags. ## Examples ### Basic Info +Explore which Azure Kubernetes clusters are available, by identifying their names, IDs, locations, types, and SKU details. This can help in managing resources and understanding the distribution of clusters across different locations and types. ```sql select @@ -19,6 +29,7 @@ from ### List clusters with a system assigned identity +Determine the areas in which clusters with a system-assigned identity are located. This query is useful to understand the distribution and arrangement of these clusters across different regions. ```sql select @@ -36,6 +47,7 @@ where ### List clusters that have role-based access control (RBAC) disabled +Determine the areas in which role-based access control (RBAC) is disabled on clusters. This is useful for identifying potential security vulnerabilities within your Azure Kubernetes clusters. ```sql select @@ -54,6 +66,7 @@ where ### List clusters with an undesirable version (older than 1.20.5) +Discover clusters that are running on an outdated version, specifically older than 1.20.5. This is useful for identifying potential security risks and planning necessary updates to maintain optimal performance. ```sql select @@ -66,4 +79,4 @@ from azure_kubernetes_cluster where kubernetes_version < '1.20.5'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_kubernetes_service_version.md b/docs/tables/azure_kubernetes_service_version.md index 95be7988..760bed0b 100644 --- a/docs/tables/azure_kubernetes_service_version.md +++ b/docs/tables/azure_kubernetes_service_version.md @@ -1,12 +1,20 @@ -# Table: azure_kubernetes_service_version +--- +title: "Steampipe Table: azure_kubernetes_service_version - Query Azure Kubernetes Services using SQL" +description: "Allows users to query Azure Kubernetes Service Versions." +--- -Azure AKS (Azure Kubernetes Service) orchestrator is a managed container orchestration service provided by Microsoft Azure. It simplifies the deployment, management, and scaling of containerized applications using Kubernetes. AKS allows you to deploy and manage containerized applications without the need to manage the underlying infrastructure. It provides automated Kubernetes upgrades, built-in monitoring and diagnostics, and seamless integration with other Azure services. AKS enables developers and DevOps teams to focus on application development and deployment, while Azure takes care of the underlying Kubernetes infrastructure. +# Table: azure_kubernetes_service_version - Query Azure Kubernetes Services using SQL -**Note:** You need to pass the `location` in the where clause to query this table. +Azure Kubernetes Service (AKS) is a managed container orchestration service provided by Microsoft Azure. AKS simplifies the deployment, scaling, and operations of Kubernetes by hosting the Kubernetes environment on Azure. With AKS, you can easily manage and scale your applications using Kubernetes, without the complexities of handling the underlying infrastructure. + +## Table Usage Guide + +The 'azure_kubernetes_service_version' table provides insights into the versions of Azure Kubernetes Services (AKS). As a DevOps engineer, explore version-specific details through this table, including the release date, Kubernetes version, and whether it's a preview version. Utilize it to uncover information about the availability of different versions, their status, and the upgrade paths. The schema presents a range of attributes of the AKS version for your analysis, like the version name, release date, and whether it's a default version. ## Examples ### Basic info +Explore which versions of Azure Kubernetes Service are available in the 'eastus2' location. This could be useful when planning deployments or upgrades in that specific region. ```sql select @@ -22,6 +30,7 @@ where ``` ### List major kubernetes versions +Explore major versions of Kubernetes services deployed in the 'eastus2' region of Azure. This can help you understand the types of Kubernetes orchestrators used and their versions for better management and updates. ```sql select @@ -38,6 +47,7 @@ and ``` ### List kubernetes orchestrator type +Determine the areas in which Kubernetes is used as the orchestrator type within the Azure Kubernetes service in the East US 2 region to understand its prevalence and preview status. ```sql select @@ -55,6 +65,7 @@ and ``` ### List kubernetes versions that are not in preview +Explore the various versions of Kubernetes that are fully released and available for use in the East US 2 region. This can be useful for planning and implementing your Kubernetes deployments in that specific region. ```sql select @@ -72,6 +83,7 @@ and ``` ### Get upgrade details of each kubernetes version +Explore the details of each Kubernetes upgrade, including the orchestrator type and version, and understand whether it is a preview version. This is particularly useful for managing and planning upgrades in the 'eastus2' location. ```sql select @@ -84,4 +96,4 @@ from jsonb_array_elements(upgrades) as u where location = 'eastus2'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_kusto_cluster.md b/docs/tables/azure_kusto_cluster.md index 8e3aab8e..c538a79f 100644 --- a/docs/tables/azure_kusto_cluster.md +++ b/docs/tables/azure_kusto_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_kusto_cluster +--- +title: "Steampipe Table: azure_kusto_cluster - Query Azure Data Explorer Clusters using SQL" +description: "Allows users to query Azure Data Explorer Clusters." +--- -An Azure Data Explorer cluster (Previously known as Kusto) is a pair of engine and data management clusters which uses several Azure resources such as Azure Linux VM’s and Storage. The applicable VMs, Azure Storage, Azure Networking and Azure Load balancer costs are billed directly to the customer subscriptions, applications, websites, etc. +# Table: azure_kusto_cluster - Query Azure Data Explorer Clusters using SQL + +Azure Data Explorer, also known as Kusto, is a fast and scalable data exploration service for analyzing large volumes of diverse data from any data source, such as websites, applications, IoT devices, and more. A cluster in Azure Data Explorer is a set of compute resources, and it is the most basic resource you create when getting started with the service. It provides the basic resources and computing power required to run data explorations and carry out operations on the data. + +## Table Usage Guide + +The 'azure_kusto_cluster' table provides insights into Azure Data Explorer Clusters. As a data analyst or data scientist, you can explore cluster-specific details through this table, including cluster capacity, SKU name, and associated metadata. Utilize it to uncover information about clusters, such as their provisioning state, capacity, and SKU tier. The schema presents a range of attributes of the Azure Data Explorer Cluster for your analysis, like the cluster ID, name, type, location, and tags. ## Examples ### Basic Info +Explore which Azure Kusto clusters are present in your environment to understand their locations and types, helping you manage and optimize your resources effectively. ```sql select @@ -19,6 +29,7 @@ from ``` ### List kusto clusters with standard sku tier +Explore which Kusto clusters are operating under the standard SKU tier. This is useful for understanding your resource utilization and optimizing costs within your Azure environment. ```sql select @@ -34,6 +45,7 @@ where ``` ### List running kusto clusters +Explore which Kusto clusters are currently active in your Azure environment. This is useful for managing resources and ensuring optimal performance. ```sql select @@ -47,6 +59,7 @@ where ``` ### List the kusto clusters with system-assigned identity +Uncover the details of Kusto clusters that are using a system-assigned identity. This can be particularly useful to understand the state of your clusters and to ensure that the identity assignment aligns with your security and management policies. ```sql select diff --git a/docs/tables/azure_lb.md b/docs/tables/azure_lb.md index 99e826e8..d2179e21 100644 --- a/docs/tables/azure_lb.md +++ b/docs/tables/azure_lb.md @@ -1,10 +1,20 @@ -# Table: azure_lb +--- +title: "Steampipe Table: azure_lb - Query Azure Load Balancers using SQL" +description: "Allows users to query Azure Load Balancers." +--- -Azure Load Balancer operates at layer 4 of the Open Systems Interconnection (OSI) model. It's the single point of contact for clients. Load balancer distributes inbound flows that arrive at the load balancer's front end to backend pool instances. These flows are according to configured load-balancing rules and health probes. The backend pool instances can be Azure Virtual Machines or instances in a virtual machine scale set. +# Table: azure_lb - Query Azure Load Balancers using SQL + +Azure Load Balancers support the distribution of network traffic across Azure resources in a manner that is scalable and highly available. They provide low latency and high throughput, making applications highly responsive and robust. Load Balancers can be configured to provide public or private network access, and support both inbound and outbound scenarios. + +## Table Usage Guide + +The 'azure_lb' table provides insights into Load Balancers within Azure. As a DevOps engineer, explore Load Balancer-specific details through this table, including SKU, type, and associated metadata. Utilize it to uncover information about Load Balancers, such as those with specific provisioning states, the IP configurations, and the verification of backend address pools. The schema presents a range of attributes of the Load Balancer for your analysis, like the resource group name, subscription ID, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Load Balancer to understand its operational state and location. This could be useful for assessing the load distribution and performance optimization in your network. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed load balancers +Identify instances where Azure load balancers have failed to provision correctly. This can help in diagnosing issues and ensuring optimal system performance. ```sql select diff --git a/docs/tables/azure_lb_backend_address_pool.md b/docs/tables/azure_lb_backend_address_pool.md index 3f4ce930..d1be93a7 100644 --- a/docs/tables/azure_lb_backend_address_pool.md +++ b/docs/tables/azure_lb_backend_address_pool.md @@ -1,10 +1,20 @@ -# Table: azure_lb_backend_address_pool +--- +title: "Steampipe Table: azure_lb_backend_address_pool - Query Azure Load Balancer Backend Address Pools using SQL" +description: "Allows users to query Azure Load Balancer Backend Address Pools" +--- -An Azure load balancer's backend address pool consists of IP addresses associated with the virtual machine NICs. This pool is used to distribute traffic to the virtual machines behind the load balancer. +# Table: azure_lb_backend_address_pool - Query Azure Load Balancer Backend Address Pools using SQL + +A Backend Address Pool is a part of Azure Load Balancer, which contains IP addresses for the backend servers. Azure Load Balancer distributes inbound flows that arrive at the load balancer's front end to backend pool instances. These flows are according to configured load balancing rules and health probes. + +## Table Usage Guide + +The 'azure_lb_backend_address_pool' table provides insights into Backend Address Pools within Azure Load Balancer. As a DevOps engineer, explore details specific to Backend Address Pools through this table, including the backend IP configurations, load balancing rules, and associated metadata. Utilize it to uncover information about Backend Address Pools, such as their health probe settings, load balancing rules, and the verification of backend IP configurations. The schema presents a range of attributes of the Backend Address Pool for your analysis, like the name, ID, type, region, and associated tags. ## Examples ### Basic info +Discover the segments that are part of your Azure load balancer's backend address pool. This query can help you assess the elements within your infrastructure, particularly useful in understanding the provisioning state and types of your resources for better resource management. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer backend address pools +Identify instances where load balancer backend address pools in Azure have failed to provision. This can help in troubleshooting and ensuring optimal resource allocation. ```sql select @@ -29,4 +40,4 @@ from azure_lb_backend_address_pool where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_lb_nat_rule.md b/docs/tables/azure_lb_nat_rule.md index 5ac1f80f..fde97a19 100644 --- a/docs/tables/azure_lb_nat_rule.md +++ b/docs/tables/azure_lb_nat_rule.md @@ -1,10 +1,20 @@ -# Table: azure_lb_nat_rule +--- +title: "Steampipe Table: azure_lb_nat_rule - Query Azure Load Balancer NAT Rules using SQL" +description: "Allows users to query Azure Load Balancer NAT Rules." +--- -An inbound NAT rule forwards incoming traffic sent to frontend IP address and port combination. The traffic is sent to a specific virtual machine or instance in the backend pool. Port forwarding is done by the same hash-based distribution as load balancing. +# Table: azure_lb_nat_rule - Query Azure Load Balancer NAT Rules using SQL + +Azure Load Balancer is a high-performance, ultra low-latency Layer 4 load-balancing service (inbound and outbound) for all UDP and TCP protocols. Load Balancer NAT Rules are resources within Azure Load Balancer that allow you to control IP address translations. NAT rules use source network address translation (SNAT) and destination network address translation (DNAT) to translate IP addresses and ports. + +## Table Usage Guide + +The 'azure_lb_nat_rule' table provides insights into NAT rules within Azure Load Balancer. As a network administrator, explore NAT rule-specific details through this table, including inbound and outbound IP address translations, associated front-end IP configurations, and protocol types. Utilize it to uncover information about NAT rules, such as those with specific IP address translations, the associated load balancer, and the verification of protocol types. The schema presents a range of attributes of the NAT rule for your analysis, like the rule ID, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Load Balancer Network Address Translation (NAT) rules are currently in use. This can help in understanding the provisioning state and type of each rule for better management and optimization of network resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer nat rules +Explore which load balancer NAT rules in Azure have failed to provision, allowing you to identify potential issues and take corrective action. ```sql select @@ -32,6 +43,7 @@ where ``` ### List load balancer nat rules order by idle timeout +Determine the areas in which load balancer NAT rules are prioritized based on their idle timeout duration. This helps in managing and optimizing network traffic flow by identifying rules that are inactive for longer periods. ```sql select diff --git a/docs/tables/azure_lb_outbound_rule.md b/docs/tables/azure_lb_outbound_rule.md index 4564abf6..2c454b58 100644 --- a/docs/tables/azure_lb_outbound_rule.md +++ b/docs/tables/azure_lb_outbound_rule.md @@ -1,10 +1,20 @@ -# Table: azure_lb_outbound_rule +--- +title: "Steampipe Table: azure_lb_outbound_rule - Query Azure Load Balancer Outbound Rules using SQL" +description: "Allows users to query Azure Load Balancer Outbound Rules" +--- -Outbound rules allow you to explicitly define SNAT(source network address translation) for a public standard load balancer. This configuration allows you to use the public IP(s) of your load balancer to provide outbound internet connectivity for your backend instances. +# Table: azure_lb_outbound_rule - Query Azure Load Balancer Outbound Rules using SQL + +An Azure Load Balancer is a network performance utility within Microsoft Azure that enables you to manage network traffic to your applications. It operates at layer four of the Open Systems Interconnection (OSI) model and provides high availability by distributing incoming traffic among healthy service instances in cloud services or virtual machines in a load balancer set. Outbound Rules in Azure Load Balancer are used to control outbound connectivity for virtual machines (VMs) in your virtual network. + +## Table Usage Guide + +The 'azure_lb_outbound_rule' table provides insights into Outbound Rules within Azure Load Balancer. As a network administrator, explore rule-specific details through this table, including protocol type, backend pool, frontend IP configuration, and associated metadata. Utilize it to uncover information about outbound rules, such as those with specific protocols, the associated backend pool, and the configured frontend IP. The schema presents a range of attributes of the Outbound Rule for your analysis, like the rule id, provisioning state, protocol type, and associated tags. ## Examples ### Basic info +Explore which outbound rules are currently being provisioned within your Azure load balancer. This query allows you to keep track of the state of your rules, ensuring that your network traffic is being managed effectively. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer outbound rules +Identify instances where load balancer outbound rules have failed in Azure. This can be beneficial in troubleshooting and understanding the network issues that might be affecting your services. ```sql select @@ -32,6 +43,7 @@ where ``` ### List load balancer outbound rules order by idle timeout +Explore which load balancer outbound rules have the longest idle timeouts to optimize resource allocation and efficiency. This could help in identifying areas where resources might be underutilized and could be better deployed elsewhere. ```sql select diff --git a/docs/tables/azure_lb_probe.md b/docs/tables/azure_lb_probe.md index f69b41e8..acfb43bc 100644 --- a/docs/tables/azure_lb_probe.md +++ b/docs/tables/azure_lb_probe.md @@ -1,10 +1,20 @@ -# Table: azure_lb_probe +--- +title: "Steampipe Table: azure_lb_probe - Query Azure Load Balancer Probes using SQL" +description: "Allows users to query Azure Load Balancer Probes." +--- -When using load-balancing rules with Azure Load Balancer, you need to specify health probes to allow Load Balancer to detect the backend endpoint status. The configuration of the health probe and probe responses determine which backend pool instances will receive new flows. You can use health probes to detect the failure of an application on a backend endpoint. +# Table: azure_lb_probe - Query Azure Load Balancer Probes using SQL + +Azure Load Balancer is a high-performance, ultra low-latency Layer 4 load-balancing service for all UDP and TCP protocols. Probes in Azure Load Balancer monitor the health of the resources in your load balancer's backend pool. They automatically detect failures and take steps to ensure that traffic only goes to healthy resources. + +## Table Usage Guide + +The 'azure_lb_probe' table provides insights into the probes within Azure Load Balancer. As a DevOps engineer, explore probe-specific details through this table, including protocol, port, request path, and associated metadata. Utilize it to uncover information about probes, such as their interval and timeout settings, the number of unhealthy responses before marking a resource as "unhealthy", and the load balancer that each probe is associated with. The schema presents a range of attributes of the probe for your analysis, like the probe's ID, name, and type, as well as the resource group and subscription it belongs to. ## Examples ### Basic info +Explore which Azure load balancer probes are currently active. This can help in determining the operational status and managing the load balancing configuration effectively. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed load balancer probes +Discover the segments that have failed load balancer probes to identify potential issues with your Azure load balancer setup. This could help in troubleshooting and enhancing the overall performance and reliability of your network infrastructure. ```sql select @@ -33,6 +44,7 @@ where ``` ### List load balancer probes order by interval +Analyze the settings to understand the frequency of load balancer probes within your Azure environment. This can help optimize network performance by identifying probes with unusually high or low intervals. ```sql select diff --git a/docs/tables/azure_lb_rule.md b/docs/tables/azure_lb_rule.md index a0186e3a..51c2e3d1 100644 --- a/docs/tables/azure_lb_rule.md +++ b/docs/tables/azure_lb_rule.md @@ -1,10 +1,20 @@ -# Table: azure_lb_rule +--- +title: "Steampipe Table: azure_lb_rule - Query Azure Load Balancer Rules using SQL" +description: "Allows users to query Azure Load Balancer Rules." +--- -A load balancer rule is used to define how traffic is distributed to the VMs. You define the front-end IP configuration for the incoming traffic and the back-end IP pool to receive the traffic, along with the required source and destination port. +# Table: azure_lb_rule - Query Azure Load Balancer Rules using SQL + +Azure Load Balancer is a highly available network performance utility that distributes incoming network traffic across many servers. It ensures the delivery of network traffic to various services in the Microsoft Azure public cloud, virtual machines (VMs) and other operations. Azure Load Balancer supports inbound and outbound scenarios, provides low latency and high throughput, and scales up to millions of flows for all Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) applications. + +## Table Usage Guide + +The 'azure_lb_rule' table provides insights into Load Balancer Rules within Azure Load Balancer. As a network administrator, explore rule-specific details through this table, including protocol type, frontend and backend port, and associated metadata. Utilize it to uncover information about rules, such as the load distribution method, whether direct server return is enabled, and the idle timeout in minutes. The schema presents a range of attributes of the Load Balancer Rule for your analysis, like the rule ID, provisioning state, and associated tags. ## Examples ### Basic info +Analyze the settings of your Azure load balancer rules to understand their current state and type. This can be beneficial for assessing your network traffic management and ensuring it aligns with your intended configuration. ```sql select @@ -18,6 +28,7 @@ from ``` ### List failed load balancer rules +Analyze the settings to understand which load balancer rules have failed in their setup process, providing insights to troubleshoot and rectify the issues. ```sql select @@ -32,6 +43,7 @@ where ``` ### List load balancer rules order by idle timeout +Pinpoint the specific load balancer rules based on their idle timeout duration. This can help in optimizing system performance and managing resource allocation effectively. ```sql select diff --git a/docs/tables/azure_location.md b/docs/tables/azure_location.md index 6ecacdcf..47c57f52 100644 --- a/docs/tables/azure_location.md +++ b/docs/tables/azure_location.md @@ -1,10 +1,20 @@ -# Table: azure_location +--- +title: "Steampipe Table: azure_location - Query Azure Locations using SQL" +description: "Allows users to query Azure Locations" +--- -Azure offers the scale and data residency options you need to bring your apps closer to your users around the world. +# Table: azure_location - Query Azure Locations using SQL + +Azure Locations represent the regional presence of Azure resources. These locations are datacenters that are geographically dispersed and cater to specific geopolitical regions. They provide users with the flexibility to deploy Azure resources where they need them. + +## Table Usage Guide + +The 'azure_location' table provides insights into Azure Locations within Microsoft Azure. As a DevOps engineer, explore location-specific details through this table, including the name of the location, the region type, and the geographical information. Utilize it to uncover information about locations, such as those that are paired with other locations, the regions that are available for resource deployment, and the verification of geographical data. The schema presents a range of attributes of the Azure Location for your analysis, like the location name, region type, and geographical data. ## Examples ### Display name of each azure location +Explore the different Azure locations by identifying their names. This can help in understanding the distribution of your resources across different geographic regions. ```sql select @@ -16,6 +26,7 @@ from ### Latitude and Longitude of the azure locations +Discover the geographical coordinates of your Azure locations. This is useful for pinpointing the exact global positions of your resources, aiding in strategic planning and decision making. ```sql select diff --git a/docs/tables/azure_log_alert.md b/docs/tables/azure_log_alert.md index b8b7834e..2523ee83 100644 --- a/docs/tables/azure_log_alert.md +++ b/docs/tables/azure_log_alert.md @@ -1,10 +1,20 @@ -# Table: azure_log_alert +--- +title: "Steampipe Table: azure_log_alert - Query Azure Monitor Log Alerts using SQL" +description: "Allows users to query Azure Monitor Log Alerts." +--- -Activity log alerts are the alerts that get activated when a new activity log event occurs that matches the conditions specified in the alert. +# Table: azure_log_alert - Query Azure Monitor Log Alerts using SQL + +Azure Monitor Log Alerts is a feature within Microsoft Azure Monitor that enables the detection of specific conditions in the logs collected and stored in Azure Monitor Logs. It allows users to create alert rules based on log search queries where an alert is fired when the results of the query match particular criteria. This feature is beneficial for identifying issues across applications and infrastructure, automating responses, and taking appropriate actions when predefined conditions are met. + +## Table Usage Guide + +The 'azure_log_alert' table provides insights into Log Alerts within Azure Monitor. As a DevOps engineer, explore alert-specific details through this table, including alert rules, severity, and associated metadata. Utilize it to uncover information about alerts, such as those with high severity, the frequency of alerts, and the verification of alert rules. The schema presents a range of attributes of the Log Alert for your analysis, like the alert rule, creation date, alert severity, and associated tags. ## Examples ### Basic info +Explore which Azure log alerts are currently active. This can help in identifying potential areas of concern and ensuring that all necessary alerts are functioning as expected. ```sql select @@ -17,6 +27,7 @@ from ``` ### List log alerts that check for create policy assignment events +Determine the areas in which log alerts are monitoring for policy assignment creation events within the Azure environment. This can be useful for managing security and compliance, by ensuring that policy changes are being adequately tracked. ```sql select @@ -28,4 +39,4 @@ from jsonb_array_elements(condition -> 'allOf') as l where l ->> 'equals' = 'Microsoft.Authorization/policyAssignments/write'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_log_profile.md b/docs/tables/azure_log_profile.md index fb674de5..9e36e6b6 100644 --- a/docs/tables/azure_log_profile.md +++ b/docs/tables/azure_log_profile.md @@ -1,10 +1,20 @@ -# Table: azure_log_profile +--- +title: "Steampipe Table: azure_log_profile - Query Azure Management Activity Logs using SQL" +description: "Allows users to query Azure Management Activity Logs." +--- -Log profiles are the legacy method for sending the Activity log to Azure storage or event hubs. Use the following procedure to continue working with a log profile or to disable it in preparation for migrating to a diagnostic setting. +# Table: azure_log_profile - Query Azure Management Activity Logs using SQL + +Azure Log Profiles are a key aspect of Azure Monitor Logs, providing a way to route system and resource logs for an Azure subscription. They provide valuable insights into the operation of your Azure resources. Log Profiles are used to control how your Activity Log is exported to Azure Event Hubs, Azure Storage Accounts, and Log Analytics Workspaces. + +## Table Usage Guide + +The 'azure_log_profile' table provides insights into log profiles within Azure Monitor Logs. As a DevOps engineer, explore log profile-specific details through this table, including retention policy, and associated storage account ID. Utilize it to uncover information about log profiles, such as those with longer retention policies, the storage account associated with the log profile, and the categories of logs collected. The schema presents a range of attributes of the log profile for your analysis, like the log profile name, categories, locations, and retention policy. ## Examples ### Basic info +Explore which Azure log profiles are associated with specific storage accounts and service bus rules. This can be particularly useful for managing and monitoring your Azure resources. ```sql select diff --git a/docs/tables/azure_logic_app_workflow.md b/docs/tables/azure_logic_app_workflow.md index d04ca1ca..cb3e475d 100644 --- a/docs/tables/azure_logic_app_workflow.md +++ b/docs/tables/azure_logic_app_workflow.md @@ -1,10 +1,20 @@ -# Table: azure_logic_app_workflow +--- +title: "Steampipe Table: azure_logic_app_workflow - Query Azure Logic Apps Workflows using SQL" +description: "Allows users to query Azure Logic Apps Workflows." +--- -Azure Logic Apps helps you simplify and implement scalable integrations and workflows in the cloud. You can model and automate your process visually as a series of steps known as a workflow in the Logic App Designer. +# Table: azure_logic_app_workflow - Query Azure Logic Apps Workflows using SQL + +Azure Logic Apps is a cloud service that helps you schedule, automate, and orchestrate tasks, business processes, and workflows when you need to integrate apps, data, systems, and services across enterprises or organizations. It provides a way to simplify and implement scalable integrations and workflows in the cloud. Logic Apps allows you to develop and deliver powerful integration solutions with ease. + +## Table Usage Guide + +The 'azure_logic_app_workflow' table provides insights into the workflows within Azure Logic Apps. As an engineer, you can explore workflow-specific details through this table, including workflow status, integration account, endpoints, and associated metadata. Utilize it to uncover information about workflows, such as those with enabled or disabled state, the integration account associated with the workflow, and the endpoints used by the workflow. The schema presents a range of attributes of the workflow for your analysis, like the workflow ID, creation date, state, and associated tags. ## Examples ### Basic info +Explore which Azure Logic App Workflows are currently active by identifying their names and types. This can help in assessing the elements within your Azure environment and managing your resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List disabled workflows +Identify instances where specific workflows in Azure Logic App have been disabled. This enables users to manage and rectify any potential disruptions in their workflow processes. ```sql select @@ -31,6 +42,7 @@ where ``` ### List suspended workflows +Uncover the details of workflows that are currently suspended within your Azure Logic App, allowing you to identify and address any potential issues or disruptions in your workflow processes. ```sql select @@ -42,4 +54,4 @@ from azure_logic_app_workflow where state = 'Suspended'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_machine_learning_workspace.md b/docs/tables/azure_machine_learning_workspace.md index c29130b2..a7bdd5a7 100644 --- a/docs/tables/azure_machine_learning_workspace.md +++ b/docs/tables/azure_machine_learning_workspace.md @@ -1,10 +1,20 @@ -# Table: azure_machine_learning_workspace +--- +title: "Steampipe Table: azure_machine_learning_workspace - Query Azure Machine Learning Workspaces using SQL" +description: "Allows users to query Azure Machine Learning Workspaces." +--- -The workspace is the top-level resource for Azure Machine Learning, providing a centralized place to work with all the artifacts you create when you use Azure Machine Learning. The workspace keeps a history of all training runs, including logs, metrics, output, and a snapshot of your scripts. You use this information to determine which training run produces the best model. +# Table: azure_machine_learning_workspace - Query Azure Machine Learning Workspaces using SQL + +Azure Machine Learning is a cloud-based service for creating and managing machine learning solutions. It's designed to help data scientists and developers to prepare data, develop experiments, and deploy models at cloud scale. The service supports a wide range of open-source machine learning frameworks like TensorFlow, PyTorch, and scikit-learn. + +## Table Usage Guide + +The 'azure_machine_learning_workspace' table provides insights into Machine Learning Workspaces within Azure Machine Learning. As a data scientist or developer, explore workspace-specific details through this table, including SKUs, identities, and associated metadata. Utilize it to uncover information about workspaces, such as their provisioning states, their associated application insights, and their linked storage accounts. The schema presents a range of attributes of the Machine Learning Workspace for your analysis, like the workspace name, creation time, and associated tags. ## Examples ### Basic info +Explore the status and types of your Azure Machine Learning workspaces to better understand your resource allocation and management. This can help you identify areas for optimization or reallocation to improve your machine learning workflows. ```sql select @@ -17,6 +27,7 @@ from ``` ### List system assigned identity type workspace +Gain insights into Azure Machine Learning Workspaces that are using system-assigned identities. This is beneficial for managing and auditing security and access controls within your Azure environment. ```sql select @@ -31,6 +42,7 @@ where ``` ### List key vault used by workspaces with soft deletion disabled +Explore which workspaces are using key vaults that have soft deletion disabled. This can help identify potential areas of risk and ensure data protection measures are in place. ```sql select diff --git a/docs/tables/azure_management_group.md b/docs/tables/azure_management_group.md index fb834008..fd70463a 100644 --- a/docs/tables/azure_management_group.md +++ b/docs/tables/azure_management_group.md @@ -1,12 +1,20 @@ -# Table: azure_management_group +--- +title: "Steampipe Table: azure_management_group - Query Azure Management Groups using SQL" +description: "Allows users to query Azure Management Groups" +--- -Management groups provide a governance scope above subscriptions. You organize subscriptions into management groups in the governance conditions you apply cascade by inheritance to all associated subscriptions. Management groups give you enterprise-grade management at a scale no matter what type of subscriptions you might have. However, all subscriptions within a single management group must trust the same Azure Active Directory (Azure AD) tenant. +# Table: azure_management_group - Query Azure Management Groups using SQL -Note: To query this table, you need to have at least read access to the specific management group. +Azure Management Groups provide a way to manage access, policies, and compliance across multiple Azure subscriptions. They offer the flexibility to manage the details of Azure resources, such as Azure subscriptions and policies, at a high level. Management groups are containers for managing access, policies, and compliance across multiple subscriptions. + +## Table Usage Guide + +The 'azure_management_group' table provides insights into Management Groups within Azure. As a DevOps engineer, explore group-specific details through this table, including group IDs, names, types, and associated metadata. Utilize it to uncover information about groups, such as the parent and children of each group, and the level of each group in the hierarchy. The schema presents a range of attributes of the Management Group for your analysis, like the group ID, name, type, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure Management Groups to understand their types and update history. This information is useful for assessing your current Azure configurations and identifying any necessary changes. ```sql select @@ -20,6 +28,7 @@ from ``` ### List children for management groups +This query is used to examine the hierarchical structure of management groups within an Azure environment. It provides insights into which groups are nested within others and who last updated them, helping to understand the organization's resource management structure. ```sql select @@ -31,6 +40,7 @@ from ``` ### List parent details for management groups +Explore the details of parent groups within the management hierarchy to understand who made the most recent updates. This can be useful for tracking changes and maintaining organizational structure in Azure. ```sql select @@ -39,4 +49,4 @@ select jsonb_pretty(parent) as parent from azure_management_group; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_management_lock.md b/docs/tables/azure_management_lock.md index 791ef30c..f907afcc 100644 --- a/docs/tables/azure_management_lock.md +++ b/docs/tables/azure_management_lock.md @@ -1,10 +1,20 @@ -# Table: azure_management_lock +--- +title: "Steampipe Table: azure_management_lock - Query Azure Management Locks using SQL" +description: "Allows users to query Azure Management Locks." +--- -Management locks help you prevent accidental deletion or modification of your Azure resources. +# Table: azure_management_lock - Query Azure Management Locks using SQL + +Azure Management Locks are a feature in Microsoft Azure that provides the ability to apply a lock with different levels of access control to any resource in Azure. These locks help prevent accidental deletion or modification of your Azure resources. Management Locks can be applied to resource groups, subscriptions, and individual resources, providing a flexible and robust mechanism for safeguarding your critical cloud resources. + +## Table Usage Guide + +The 'azure_management_lock' table provides insights into Management Locks within Microsoft Azure. As a DevOps engineer, explore lock-specific details through this table, including the lock level, notes, and owners. Utilize it to uncover information about locks, such as those with 'CanNotDelete' or 'ReadOnly' access levels, the resources associated with each lock, and the lock's owners. The schema presents a range of attributes of the Management Lock for your analysis, like the lock name, id, type, and associated tags. ## Examples ### List of resources where the management locks are applied +Determine the areas in which management locks are applied within Azure resources. This query is beneficial for understanding where your resources are secured, helping to maintain and enhance your security posture. ```sql select @@ -17,6 +27,7 @@ from ### Resources and lock levels +Explore which resources in your Azure Management are locked and the level of these locks. This can help in understanding the security measures in place and aid in managing resource accessibility. ```sql select @@ -26,4 +37,4 @@ select lock_level from azure_management_lock; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mariadb_server.md b/docs/tables/azure_mariadb_server.md index 6814c417..08117899 100644 --- a/docs/tables/azure_mariadb_server.md +++ b/docs/tables/azure_mariadb_server.md @@ -1,10 +1,20 @@ -# Table: azure_mariadb_server +--- +title: "Steampipe Table: azure_mariadb_server - Query Azure MariaDB Servers using SQL" +description: "Allows users to query Azure MariaDB Servers." +--- -Azure Database for MariaDB is a relational database service based on the open-source MariaDB Server engine. It's a fully managed database as a service offering that can handle mission-critical workloads with predictable performance and dynamic scalability. +# Table: azure_mariadb_server - Query Azure MariaDB Servers using SQL + +Azure Database for MariaDB is a fully managed relational database service provided by Microsoft Azure. It's based on the open-source MariaDB Server engine and allows developers to leverage the capabilities of MariaDB for their applications. The service offers built-in high availability, automatic backups, and scaling of resources in minutes without application downtime. + +## Table Usage Guide + +The 'azure_mariadb_server' table provides insights into MariaDB servers within Azure Database for MariaDB. As a DevOps engineer, explore server-specific details through this table, including server configurations, performance tiers, and associated metadata. Utilize it to uncover information about servers, such as their performance characteristics, the storage capacity, and the server version. The schema presents a range of attributes of the MariaDB server for your analysis, like the server name, creation date, SKU name, and associated tags. ## Examples ### Basic info +Explore which MariaDB servers in your Azure environment are visible to users. This can help you manage your resources and understand the distribution of your servers across different regions and resource groups. ```sql select @@ -19,6 +29,7 @@ from ``` ### List servers with Geo-redundant backup disabled +Identify the servers that have their geo-redundant backup feature disabled. This can be useful to ensure all servers are adequately protected and to pinpoint any potential areas of risk. ```sql select @@ -33,6 +44,7 @@ where ``` ### List servers with SSL enabled +Determine the areas in which servers have SSL enabled to enhance security measures within your Azure MariaDB server environment. ```sql select @@ -47,6 +59,7 @@ where ``` ### List servers with backup retention days greater than 90 days +Identify Azure MariaDB servers that have a backup retention period of over 90 days. This could be useful in assessing long-term data storage and recovery strategies. ```sql select @@ -58,4 +71,4 @@ from azure_mariadb_server where backup_retention_days > 90; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_monitor_activity_log_event.md b/docs/tables/azure_monitor_activity_log_event.md index 00cd8bca..d669db3b 100644 --- a/docs/tables/azure_monitor_activity_log_event.md +++ b/docs/tables/azure_monitor_activity_log_event.md @@ -1,21 +1,20 @@ -# Table: azure_monitor_activity_log_event +--- +title: "Steampipe Table: azure_monitor_activity_log_event - Query Azure Monitor Activity Log Events using SQL" +description: "Allows users to query Azure Monitor Activity Log Events" +--- -Azure Monitor Activity Log is a service in Microsoft Azure that provides insights into the operations that have been performed on resources in your Azure subscription. It captures a comprehensive set of data about each operation, including who performed the operation, what resources were involved, what operation was performed, and when it occurred. This information is crucial for auditing, compliance, and troubleshooting purposes. +# Table: azure_monitor_activity_log_event - Query Azure Monitor Activity Log Events using SQL -**Important notes:** +Azure Monitor collects, analyzes, and acts on telemetry data from your Azure and on-premises environments. It helps you understand how your applications are performing and proactively identifies issues affecting them and the resources they depend on. Activity Log Events in Azure Monitor provides insight into subscription-level events that have occurred in Azure. -- This table can provide event details for the previous 90 days. -- For improved performance, it is advised that you use the optional qual `event_timestamp` to limit the result set to a specific time period. -- This table supports optional quals. Queries with optional quals are optimized to use Monitor Activity Log filters. Optional quals are supported for the following columns: - - `event_timestamp` - - `resource_group` - - `correlation_id` - - `resource_id` - - `resource_provider_name` +## Table Usage Guide + +The 'azure_monitor_activity_log_event' table provides insights into activity log events within Azure Monitor. As a DevOps engineer, explore event-specific details through this table, including event categories, event data, and associated metadata. Utilize it to uncover information about events, such as those related to service health, resource management, and security. The schema presents a range of attributes of the activity log event for your analysis, like the event timestamp, resource group, event ID, and associated tags. ## Examples ### Basic info +Explore the Azure Monitor activity log to gain insights into the events occurring in your Azure resources. This query can help you understand the scope and impact of each event, making it easier to manage your resources and respond to issues. ```sql select @@ -31,6 +30,7 @@ from ``` ### List events with event-level critical +Identify instances where critical events have occurred in your Azure Monitor activity log. This could be useful in troubleshooting and understanding the severity of issues within your Azure environment. ```sql select @@ -47,6 +47,7 @@ where ``` ### List events that occurred over the last five minutes +This query is used to monitor recent activities within a system, specifically events that have occurred in the last five minutes. It's useful for real-time tracking and immediate response to any critical changes or anomalies in the system. ```sql select @@ -63,6 +64,7 @@ where ``` ### List ordered events that occurred in the past five to ten minutes +Explore the sequence of events that happened in the recent past to understand any system changes or unusual activity. This allows for real-time monitoring and swift response to any unexpected events. ```sql select @@ -81,6 +83,7 @@ order by ``` ### Get authorization details for events +Determine the authorization details associated with specific events to gain insights into the actions, roles, and scopes involved. This can be beneficial for understanding the security context of activities within your Azure environment. ```sql select @@ -93,6 +96,7 @@ from ``` ### Get HTTP request details of events +Analyze the details of HTTP requests associated with specific events to understand their operational patterns and time-stamps. This can help in tracking the client's request ID, IP address, and the methods used, which could be beneficial in enhancing security and monitoring network traffic. ```sql select @@ -110,6 +114,7 @@ from ## Filter examples ### List evens by resource group +Explore the activities within a specific resource group in Azure Monitor, helping you understand the operations and status of resources for effective management and troubleshooting. ```sql select @@ -126,6 +131,7 @@ where ``` ### List events for a resource provider +Determine the areas in which specific events are occurring for a particular resource provider in Azure. This can help in analyzing the operation status and type of resources being used, which can be useful for optimizing resource allocation and troubleshooting issues. ```sql select @@ -143,6 +149,7 @@ where ``` ### List events for a particular resource +Explore the history of events tied to a specific resource within Azure Monitor. This is useful for tracking changes, troubleshooting issues, and auditing activities related to that resource. ```sql select @@ -156,4 +163,4 @@ from azure_monitor_activity_log_event where resource_id = '/subscriptions/hsjekr16-f95f-4771-bbb5-8237jsa349sl/resourceGroups/my_rg/providers/Microsoft.Network/publicIPAddresses/test-backup-ip'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mssql_elasticpool.md b/docs/tables/azure_mssql_elasticpool.md index 5c050e6e..1b3b5959 100644 --- a/docs/tables/azure_mssql_elasticpool.md +++ b/docs/tables/azure_mssql_elasticpool.md @@ -1,10 +1,20 @@ -# Table: azure_mssql_elasticpool +--- +title: "Steampipe Table: azure_mssql_elasticpool - Query Azure SQL Database Elastic Pools using SQL" +description: "Allows users to query Azure SQL Database Elastic Pools" +--- -Azure SQL Database elastic pools are a simple, cost-effective solution for managing and scaling multiple databases that have varying and unpredictable usage demands. +# Table: azure_mssql_elasticpool - Query Azure SQL Database Elastic Pools using SQL + +An Azure SQL Database Elastic Pool is a shared resource model that enables higher resource utilization efficiency. It allows for the management of multiple databases that have varying and unpredictable usage demands. The databases within an elastic pool are on a single Azure SQL Database server and share a set number of resources at a set price. + +## Table Usage Guide + +The 'azure_mssql_elasticpool' table provides insights into Elastic Pools within Azure SQL Database. As a database administrator, explore details specific to each Elastic Pool through this table, including the number of databases, storage limit, and associated metadata. Utilize it to uncover information about each Elastic Pool, such as the maximum and minimum data storage capacity, the number of databases it contains, and its resource usage statistics. The schema presents a range of attributes of the Elastic Pool for your analysis, like the pool's ID, name, type, region, and associated tags. ## Examples ### Basic info +Gain insights into the status and redundancy of your Microsoft SQL Server elastic pools in Azure. This can help you manage resources and ensure your databases are resilient and available. ```sql select @@ -18,6 +28,7 @@ from ``` ### List zone redundant elastic pools +Identify the state and capacity of your elastic pools in Azure SQL Database that are configured for zone redundancy. This can help ensure high availability and disaster recovery for your databases. ```sql select @@ -30,4 +41,4 @@ from azure_mssql_elasticpool where zone_redundant; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mssql_managed_instance.md b/docs/tables/azure_mssql_managed_instance.md index ed37f4b4..dac97048 100644 --- a/docs/tables/azure_mssql_managed_instance.md +++ b/docs/tables/azure_mssql_managed_instance.md @@ -1,10 +1,20 @@ -# Table: azure_mssql_managed_instance +--- +title: "Steampipe Table: azure_mssql_managed_instance - Query Azure Managed SQL Server Instances using SQL" +description: "Allows users to query Azure Managed SQL Server Instances." +--- -Azure SQL Managed Instance is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine compatibility with all the benefits of a fully managed and evergreen platform as a service. +# Table: azure_mssql_managed_instance - Query Azure Managed SQL Server Instances using SQL + +An Azure Managed SQL Server Instance is a fully managed relational database service provided by Microsoft Azure. It offers the broadest SQL Server engine compatibility and automates most of the database management functions such as upgrading, patching, backups, and monitoring. It also provides built-in intelligence that learns app patterns and adapts to maximize performance, reliability, and data protection. + +## Table Usage Guide + +The 'azure_mssql_managed_instance' table provides insights into Managed SQL Server Instances within Microsoft Azure. As a Database Administrator, explore instance-specific details through this table, including the instance's administrative settings, network settings, and associated metadata. Utilize it to uncover information about instances, such as their current state, the number of vCores, the maximum storage size, and the license type. The schema presents a range of attributes of the Managed SQL Server Instance for your analysis, like the instance's ID, name, type, location, and SKU. ## Examples ### Basic info +Explore the status and security settings of your managed instances in Azure's SQL service. This can be useful in assessing compliance with your organization's security policies. ```sql select @@ -18,6 +28,7 @@ from ``` ### List managed instances with public endpoint enabled +Discover the segments that have the public data endpoint enabled in your managed instances. This can help identify potential security vulnerabilities, as these instances can be accessed publicly. ```sql select @@ -33,6 +44,7 @@ where ``` ### List security alert policies of the managed instances +Explore the security alert policies of managed instances to understand their creation time, the alerts that have been disabled, and the email addresses linked to the policies. This can help in assessing the current security measures and making necessary improvements for better data protection. ```sql select @@ -52,4 +64,4 @@ select from azure_mssql_managed_instance, jsonb_array_elements(security_alert_policies) as policy; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mssql_virtual_machine.md b/docs/tables/azure_mssql_virtual_machine.md index 54c373e7..ab3039eb 100644 --- a/docs/tables/azure_mssql_virtual_machine.md +++ b/docs/tables/azure_mssql_virtual_machine.md @@ -1,10 +1,20 @@ -# Table: azure_mssql_virtual_machine +--- +title: "Steampipe Table: azure_mssql_virtual_machine - Query Azure SQL Server Virtual Machines using SQL" +description: "Allows users to query Azure SQL Server Virtual Machines." +--- -Azure SQL virtual machines are lift-and-shift ready for existing applications that require fast migration to the cloud with minimal changes or no changes. SQL virtual machines offer full administrative control over the SQL Server instance and underlying OS for migration to Azure. +# Table: azure_mssql_virtual_machine - Query Azure SQL Server Virtual Machines using SQL + +Azure SQL Server Virtual Machine is a service that offers the full control and features of a fully managed SQL Server instance. It provides the flexibility to choose the version, edition, and OS of SQL Server. You can also manage the VM size to meet your performance requirements. + +## Table Usage Guide + +The 'azure_mssql_virtual_machine' table provides insights into SQL Server Virtual Machines within Microsoft Azure. As a DevOps engineer, explore VM-specific details through this table, including the SQL Server version, edition, OS type, VM size, and associated metadata. Utilize it to uncover information about virtual machines, such as those with specific SQL Server versions or OS types, and the verification of SQL Server configurations. The schema presents a range of attributes of the SQL Server Virtual Machine for your analysis, like the VM ID, resource group, location, SQL Server license type, and associated tags. ## Examples ### Basic info +Explore the configuration and status of your Azure SQL virtual machines. This query is useful for gaining insights into the types of SQL images and licenses in use, as well as where these resources are located geographically. ```sql select @@ -20,6 +30,7 @@ from ``` ### List failed virtual machines +Explore which virtual machines have failed to provision in your Azure MSSQL environment, helping you to identify potential issues and take corrective action. ```sql select @@ -31,4 +42,4 @@ from azure_mssql_virtual_machine where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mysql_flexible_server.md b/docs/tables/azure_mysql_flexible_server.md index b6bbf799..0aa9474e 100644 --- a/docs/tables/azure_mysql_flexible_server.md +++ b/docs/tables/azure_mysql_flexible_server.md @@ -1,10 +1,20 @@ -# Table: azure_mysql_flexible_server +--- +title: "Steampipe Table: azure_mysql_flexible_server - Query Azure MySQL Flexible Servers using SQL" +description: "Allows users to query Azure MySQL Flexible Servers" +--- -Azure Database for MySQL Flexible Server is a fully managed MySQL database as a service offering that can handle mission-critical workloads with predictable performance and dynamic scalability. +# Table: azure_mysql_flexible_server - Query Azure MySQL Flexible Servers using SQL + +Azure MySQL Flexible Server is a fully managed database service with built-in high availability and the flexibility to adjust compute and storage resources on demand. It supports the diverse needs of your workloads requiring MySQL and allows you to choose the right compute and storage resources for your server. Azure MySQL Flexible Server also provides cost-effectiveness with stop/start capabilities and burstable compute tier. + +## Table Usage Guide + +The 'azure_mysql_flexible_server' table provides insights into MySQL Flexible Servers within Azure. As a DevOps engineer, explore server-specific details through this table, including server state, version, storage capacity, and associated metadata. Utilize it to uncover information about servers, such as those with high storage capacity, the administrator login name, and the verification of SSL enforcement. The schema presents a range of attributes of the MySQL Flexible Server for your analysis, like the server name, creation date, SKU name, and associated tags. ## Examples ### Basic info +Explore the settings of your Azure MySQL flexible servers to understand their locations, backup retention periods, storage IOPS, and public network access status. This helps in managing resources efficiently and ensuring optimal server configuration. ```sql select @@ -19,6 +29,7 @@ from ``` ### List servers with public network access disabled +Explore which servers have disabled public network access to ensure a higher level of security and prevent unauthorized access. This can be beneficial in maintaining data privacy and safeguarding sensitive information. ```sql select @@ -32,6 +43,7 @@ where ``` ### List servers with storage auto grow disabled +Identify servers where the automatic storage growth feature is turned off. This is useful for understanding which servers might run out of storage unexpectedly, potentially disrupting operations. ```sql select @@ -45,6 +57,7 @@ where ``` ### List servers with backup retention days greater than 90 days +Explore which servers in your Azure MySQL Flexible Server have a backup retention period exceeding 90 days. This is beneficial in understanding your organization's data retention practices and ensuring compliance with internal or regulatory data backup policies. ```sql select @@ -58,9 +71,10 @@ where ``` ### List server configuration details - +Explore the configuration details of your servers on Azure's MySQL Flexible Server. This can be useful to understand and manage the properties of your servers, such as identifying any unusual settings that may impact your server's performance. **Note:** `Flexible Server configurations` is the same as `Server parameters` as shown in Azure MySQL Flexible Server console + ```sql select name as server_name, @@ -73,6 +87,7 @@ from ``` ### Current state of audit_log_enabled parameter for the servers +Analyze the settings to understand the status of the audit log enablement feature across your Azure MySQL flexible servers. This can help ensure that audit logs are active for security and compliance monitoring. ```sql select @@ -88,6 +103,7 @@ where ``` ### List servers with slow_query_log parameter enabled +Discover the segments that have the 'slow_query_log' parameter enabled on Azure MySQL Flexible servers. This can be useful for identifying servers that may be experiencing performance issues due to slow queries. ```sql select @@ -104,6 +120,7 @@ where ``` ### List servers with log_output parameter set to file +Discover the segments that have the 'log_output' parameter set to 'FILE' within Azure's MySQL Flexible Server. This is particularly useful when you need to identify servers that are logging output to files for auditing or troubleshooting purposes. ```sql select @@ -117,4 +134,4 @@ from where configurations ->'ConfigurationProperties' ->> 'value' = 'FILE' and configurations ->> 'Name' = 'log_output'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_mysql_server.md b/docs/tables/azure_mysql_server.md index 32870cb1..eca8812a 100644 --- a/docs/tables/azure_mysql_server.md +++ b/docs/tables/azure_mysql_server.md @@ -1,10 +1,20 @@ -# Table: azure_mysql_server +--- +title: "Steampipe Table: azure_mysql_server - Query Azure MySQL Servers using SQL" +description: "Allows users to query Azure MySQL Servers, fetching detailed information about the configuration and status of these database servers." +--- -Azure Database for MySQL Server is a fully managed database service designed to provide more granular control and flexibility over database management functions and configuration settings. +# Table: azure_mysql_server - Query Azure MySQL Servers using SQL + +Azure MySQL Server is a fully managed database service that makes it easy to set up, maintain, manage, and administer your MySQL relational databases on the cloud. It provides built-in high availability with no additional cost and you can scale up or down quickly to meet your workload needs. Azure MySQL Server also supports connecting your MySQL databases to popular analytics tools for comprehensive insights and business intelligence. + +## Table Usage Guide + +The 'azure_mysql_server' table provides insights into MySQL servers within Azure. As a DevOps engineer, explore server-specific details through this table, including server name, location, resource group, SKU name, and associated metadata. Utilize it to uncover information about servers, such as the version of MySQL running, SSL enforcement status, and storage auto-grow settings. The schema presents a range of attributes of the MySQL server for your analysis, like the server ID, creation date, administrator login name, and more. ## Examples ### Basic info +Explore the settings of your Azure MySQL server to understand its location and security enforcement policies, such as SSL enforcement and the minimum TLS version. This is useful for ensuring your server is properly configured for secure data transmission. ```sql select @@ -18,6 +28,7 @@ from ``` ### List servers with SSL enabled +Explore which servers in your Azure MySQL Server have SSL enforcement enabled. This is useful for ensuring that your servers are secure and adhering to best practices for data protection. ```sql select @@ -32,6 +43,7 @@ where ``` ### List servers with public network access disabled +Explore which servers within your Azure MySQL setup have public network access disabled. This can help enhance security by identifying servers that are not exposed to potential external threats. ```sql select @@ -45,6 +57,7 @@ where ``` ### List servers with storage profile auto growth disabled +Identify instances where Azure MySQL servers have their storage profile auto growth feature disabled. This is useful to manage storage and avoid unexpected database growth. ```sql select @@ -58,6 +71,7 @@ where ``` ### List servers with 'backup_retention_days' greater than 90 days +Analyze the settings to understand which servers have their backup retention period set for more than 90 days. This is useful for ensuring data retention compliance and managing storage costs. ```sql select @@ -71,6 +85,7 @@ where ``` ### List servers with minimum TLS version lower than 1.2 +Discover the servers that are potentially vulnerable due to lower than recommended TLS versions. This is useful in identifying and addressing security risks in your Azure MySQL server configurations. ```sql select @@ -85,6 +100,7 @@ where ``` ### List private endpoint connection details +Determine the areas in which private endpoint connections are needed for your Azure MySQL server. This query helps you understand the state of these connections, including any actions required, providing valuable insights for managing and optimizing your server's security. ```sql select @@ -102,6 +118,7 @@ from ``` ### List server keys +This query is used to examine the keys associated with each server in your Azure MySQL database. It's useful for understanding the types and creation dates of these keys, which can aid in managing security and access controls. ```sql select @@ -120,9 +137,10 @@ from ``` ### List server configuration details - +Explore the configuration details of your servers to gain insights into their set-up and manage them effectively. This query is particularly useful for understanding and managing the settings of your Azure MySQL servers. **Note:** `Server configurations` is the same as `Server parameters` as shown in Azure MySQL server console + ```sql select name as server_name, @@ -135,6 +153,7 @@ from ``` ### Current state of audit_log_enabled parameter for the servers +Analyze the settings to understand the current status of the audit log feature for your servers. This can be useful for ensuring compliance with security protocols and maintaining a record of server activity. ```sql select @@ -150,6 +169,7 @@ where ``` ### List servers with slow_query_log parameter enabled +Determine the areas in which certain servers have the 'slow_query_log' parameter enabled. This can be useful to identify potential performance issues and optimize server configurations accordingly. ```sql select @@ -166,6 +186,7 @@ where ``` ### List servers with log_output parameter set to file +Explore which Azure MySQL servers have their log output parameter set to a file. This is useful to identify servers that are storing their logs as files, which could potentially take up a lot of storage space. ```sql select @@ -182,6 +203,7 @@ where ``` ### Get VNET rules details of the server +Explore the configuration of a server to understand its Virtual Network (VNET) rules. This is useful for assessing network security and connectivity settings for your Azure MySQL server. ```sql select @@ -195,6 +217,7 @@ from ``` ### Get the security alert policy for a particular server +Analyze the settings to understand the security alert policy associated with a specific server in a given resource group. This is particularly useful when you need to assess the security configurations of your servers for compliance or auditing purposes. ```sql select diff --git a/docs/tables/azure_nat_gateway.md b/docs/tables/azure_nat_gateway.md index 760c5ec8..37b5ab5f 100644 --- a/docs/tables/azure_nat_gateway.md +++ b/docs/tables/azure_nat_gateway.md @@ -1,10 +1,20 @@ -# Table: azure_nat_gateway +--- +title: "Steampipe Table: azure_nat_gateway - Query Azure NAT Gateways using SQL" +description: "Allows users to query Azure NAT Gateways." +--- -NAT gateway provides outbound internet connectivity for one or more subnets of a virtual network. Once NAT gateway is associated to a subnet, NAT provides source network address translation (SNAT) for that subnet. NAT gateway specifies which static IP addresses virtual machines use when creating outbound flows. +# Table: azure_nat_gateway - Query Azure NAT Gateways using SQL + +Azure NAT (Network Address Translation) Gateway is a resource that provides outbound internet connectivity for virtual networks. The NAT gateway sends outbound traffic from a virtual network to the internet. It also enables you to configure a static, outbound public IP address, which can be used for the services in your virtual network. + +## Table Usage Guide + +The 'azure_nat_gateway' table provides insights into NAT Gateways within Azure Networking. As a Network Engineer, explore NAT Gateway-specific details through this table, including subnet details, IP configuration, and associated metadata. Utilize it to uncover information about NAT Gateways, such as those with specific IP configurations, the subnet relationships, and the verification of IP addresses. The schema presents a range of attributes of the NAT Gateway for your analysis, like the NAT Gateway ID, creation date, subnet count, and associated tags. ## Examples ### Basic info +Explore the basic information of your Azure NAT Gateway to understand its provisioning state and type. This can be useful in managing resources and troubleshooting potential issues. ```sql select @@ -18,6 +28,7 @@ from ``` ### List public IP address details for each nat gateway +This query aids in identifying the details of public IP addresses associated with each NAT gateway. It's useful for managing network traffic and ensuring secure and efficient data routing. ```sql select @@ -35,6 +46,7 @@ where ``` ### List subnet details associated with each nat gateway +Analyze the settings to understand the association between each NAT gateway and the related subnet details in your Azure environment. This can be beneficial in managing network topology and ensuring correct routing configurations. ```sql select @@ -47,4 +59,4 @@ from jsonb_array_elements(n.subnets) as sb where sb ->> 'id' = s.id; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_network_interface.md b/docs/tables/azure_network_interface.md index 075c70c2..05d98d80 100644 --- a/docs/tables/azure_network_interface.md +++ b/docs/tables/azure_network_interface.md @@ -1,10 +1,20 @@ -# Table: azure_network_interface +--- +title: "Steampipe Table: azure_network_interface - Query Azure Network Interfaces using SQL" +description: "Allows users to query Azure Network Interfaces." +--- -A network interface enables an Azure Virtual Machine to communicate with internet, Azure, and on-premises resources. +# Table: azure_network_interface - Query Azure Network Interfaces using SQL + +An Azure Network Interface is a virtual network interface card (NIC) in Azure that is attached to a virtual machine (VM). It enables Azure VMs to communicate with internet, Azure, and on-premises resources. Network Interfaces can include IP addresses, subnets, and network security groups. + +## Table Usage Guide + +The 'azure_network_interface' table offers insights into Network Interfaces within Azure. As a DevOps engineer, you can delve into interface-specific details via this table, including private and public IP addresses, network security group associations, and subnet information. Utilize it to uncover information about interfaces, such as their IP configurations, DNS settings, and associated subnets. The schema presents a range of attributes of the Network Interface for your analysis, like the interface ID, IP configurations, associated network security groups, and subnet details. ## Examples ### Basic IP address info +Explore network configurations by identifying the private IP addresses, their versions, and allocation methods in Azure. This can be beneficial in understanding the distribution and management of IP addresses within your Azure network interface. ```sql select @@ -19,6 +29,7 @@ from ``` ### Find all network interfaces with private IPs that are in a given subnet (10.66.0.0/16) +This query is useful for pinpointing specific network interfaces within a designated subnet that are utilizing private IP addresses. This can aid in network management and security by identifying potential areas of vulnerability or inefficiency. ```sql select @@ -33,6 +44,7 @@ where ``` ### Security groups attached to each network interface +Analyze the settings to understand the security groups linked with each network interface in your Azure network. This can be useful for assessing your network's security configuration and identifying potential vulnerabilities. ```sql select diff --git a/docs/tables/azure_network_security_group.md b/docs/tables/azure_network_security_group.md index b80ab466..08d459d9 100644 --- a/docs/tables/azure_network_security_group.md +++ b/docs/tables/azure_network_security_group.md @@ -1,10 +1,20 @@ -# Table: azure_network_security_group +--- +title: "Steampipe Table: azure_network_security_group - Query Azure Network Security Groups using SQL" +description: "Allows users to query Azure Network Security Groups" +--- -A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. +# Table: azure_network_security_group - Query Azure Network Security Groups using SQL + +An Azure Network Security Group is a feature in Microsoft Azure that provides inbound and outbound network traffic filtering for various types of Azure resources. It acts as a virtual firewall, offering a layer of security by enabling you to configure network traffic rules. Network Security Groups can be associated with subnets, network interfaces, or both, providing control over traffic flowing in and out of Azure resources within a virtual network. + +## Table Usage Guide + +The 'azure_network_security_group' table provides insights into Network Security Groups within Azure Networking. As a Network Administrator, explore specific details through this table, including security rules, default rules, and associated subnets. Utilize it to uncover information about Network Security Groups, such as those with open inbound or outbound rules, the associated resources, and the verification of rule priorities. The schema presents a range of attributes of the Network Security Group for your analysis, like the group name, location, type, and associated tags. ## Examples ### Subnets and network interfaces attached to the network security groups +Discover the segments that are linked to your network security groups by analyzing network interfaces and subnets. This allows you to better understand and assess your Azure network configuration and security posture. ```sql select @@ -19,6 +29,7 @@ from ``` ### List the network security groups whose inbound is not restricted from the internet +Determine the network security groups in your Azure environment that have unrestricted inbound access from the internet. This can help you identify potential security risks and take necessary actions to secure your network. ```sql select @@ -43,6 +54,7 @@ where ``` ### Default security group rules info +Gain insights into the default security rules of your Azure network security group. This query can help you understand the access, description, direction, priority, and protocol of each rule, which is crucial for maintaining network security and troubleshooting connectivity issues. ```sql select diff --git a/docs/tables/azure_network_watcher.md b/docs/tables/azure_network_watcher.md index 0270de88..a024be04 100644 --- a/docs/tables/azure_network_watcher.md +++ b/docs/tables/azure_network_watcher.md @@ -1,10 +1,20 @@ -# Table: azure_network_watcher +--- +title: "Steampipe Table: azure_network_watcher - Query Azure Network Watchers using SQL" +description: "Allows users to query Azure Network Watchers" +--- -Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level. +# Table: azure_network_watcher - Query Azure Network Watchers using SQL + +Azure Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Network diagnostic and visualization tools available with Network Watcher help you understand, diagnose, and gain insights to your network in Azure. Network Watcher is designed to monitor and repair the network health of IaaS (Infrastructure-as-a-Service) products, including virtual machines (VM) and virtual networks. + +## Table Usage Guide + +The 'azure_network_watcher' table provides insights into Azure Network Watchers within Azure Network Management. As a network administrator, explore Network Watcher-specific details through this table, including its status, location, and associated tags. Utilize it to uncover information about Network Watchers, such as those with problematic network scenarios, the diagnostic and visualization tools used, and the verification of network health. The schema presents a range of attributes of the Network Watcher for your analysis, like the ID, name, type, and provisioning state. ## Examples ### List of regions where network watcher is enabled +Explore which regions have the network watcher feature enabled. This is useful for maintaining security and performance monitoring within your Azure environment. ```sql select @@ -15,6 +25,7 @@ from ``` ### List of Network watcher without application tag key +Determine the areas in which Azure Network Watchers are not tagged with the 'application' key. This can help ensure proper organization and management of your resources. ```sql select diff --git a/docs/tables/azure_network_watcher_flow_log.md b/docs/tables/azure_network_watcher_flow_log.md index 5a156985..1106461a 100644 --- a/docs/tables/azure_network_watcher_flow_log.md +++ b/docs/tables/azure_network_watcher_flow_log.md @@ -1,10 +1,20 @@ -# Table: azure_network_watcher_flow_log +--- +title: "Steampipe Table: azure_network_watcher_flow_log - Query Azure Network Watcher Flow Logs using SQL" +description: "Allows users to query Azure Network Watcher Flow Logs." +--- -Network security group (NSG) flow logs is a feature of Azure Network Watcher that allows user to log information about IP traffic flowing through an NSG. Flow data is sent to Azure Storage accounts from where the user can access it. +# Table: azure_network_watcher_flow_log - Query Azure Network Watcher Flow Logs using SQL + +Azure Network Watcher is a service in Azure that provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. Flow logs are a feature of Network Watcher that allows users to view information about ingress and egress IP traffic on a network security group. These logs can be used to check for anomalies and gain insight into your network traffic flow. + +## Table Usage Guide + +The 'azure_network_watcher_flow_log' table provides insights into the flow logs within Azure Network Watcher. As a network administrator, you can explore detailed information about your network traffic through this table, including the source and destination IP addresses, ports, protocol, traffic flow, and associated metadata. Use it to uncover information about your network traffic, such as identifying potential security risks, analyzing traffic patterns, and troubleshooting network issues. The schema presents a range of attributes of the flow log for your analysis, like the network watcher name, flow log name, enabled status, traffic analytics configuration, and associated tags. ## Examples ### Basic info +Explore which network flow logs are enabled in Azure. This can assist in identifying potential security risks or network anomalies by pinpointing specific resources. ```sql select @@ -17,6 +27,7 @@ from ``` ### List disabled flow logs +Explore which flow logs in the Azure Network Watcher are currently disabled. This can help in identifying potential network monitoring gaps and ensuring comprehensive data collection. ```sql select @@ -31,6 +42,7 @@ where ``` ### List flow logs with a retention period less than 90 days +Explore the Azure network watcher flow logs that are enabled and have a retention period of less than 90 days. This is useful for identifying potential areas where data retention policies may need to be adjusted to meet organizational requirements. ```sql select @@ -45,6 +57,7 @@ where ``` ### Get storage account details for each flow log +Analyze the settings of each flow log to understand the specific storage account details associated with it. This is useful for managing and optimizing the storage resources in your Azure Network Watcher. ```sql select @@ -53,4 +66,4 @@ select storage_id from azure_network_watcher_flow_log; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_policy_assignment.md b/docs/tables/azure_policy_assignment.md index c8374ea2..5039b570 100644 --- a/docs/tables/azure_policy_assignment.md +++ b/docs/tables/azure_policy_assignment.md @@ -1,10 +1,20 @@ -# Table: azure_policy_assignment +--- +title: "Steampipe Table: azure_policy_assignment - Query Azure Policy Assignments using SQL" +description: "Allows users to query Azure Policy Assignments." +--- -Policy assignments are used by Azure Policy to define which resources are assigned which policies or initiatives in a subscription. +# Table: azure_policy_assignment - Query Azure Policy Assignments using SQL + +Azure Policy is a service in Azure that you use to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy meets this need by evaluating your resources for non-compliance with assigned policies. + +## Table Usage Guide + +The 'azure_policy_assignment' table provides insights into policy assignments within Azure Policy. As a DevOps engineer, explore policy-specific details through this table, including policy definition, scope, and associated metadata. Utilize it to uncover information about policy assignments, such as those with specific effects, the resource groups they are applied to, and the compliance state of your resources. The schema presents a range of attributes of the policy assignment for your analysis, like the assignment name, id, type, and associated parameters. ## Examples ### Basic info +Explore the specific policies applied within your Azure environment. This query can help you gain insights into policy assignments, which is beneficial for maintaining compliance and managing resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### Get SQL auditing and threat detection monitoring status for the subscription +Assess the status of SQL auditing and threat detection monitoring for a specific subscription. This can help improve your security measures by identifying areas that need attention or improvement. ```sql select @@ -29,6 +40,7 @@ from ``` ### Get SQL encryption monitoring status for the subscription +Explore the status of SQL encryption monitoring for your subscription. This allows you to assess the security measures in place and ensure that sensitive data is appropriately protected. ```sql select @@ -38,4 +50,4 @@ select parameters -> 'sqlEncryptionMonitoringEffect' -> 'value' as sqlEncryptionMonitoringEffect from azure_policy_assignment; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_policy_definition.md b/docs/tables/azure_policy_definition.md index 2db60338..48e6bed8 100644 --- a/docs/tables/azure_policy_definition.md +++ b/docs/tables/azure_policy_definition.md @@ -1,10 +1,20 @@ -# Table: azure_policy_definition +--- +title: "Steampipe Table: azure_policy_definition - Query Azure Policy Definitions using SQL" +description: "Allows users to query Azure Policy Definitions to gain insights into the policy definitions within Azure Policy service. The table provides details such as policy definition ID, name, type, mode, and metadata." +--- -Azure Policy establishes conventions for resources. Policy definitions describe resource compliance conditions and the effect to take if a condition is met. A condition compares a resource property field or a value to a required value. +# Table: azure_policy_definition - Query Azure Policy Definitions using SQL + +Azure Policy is a service in Azure that you use to create, assign and, manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy meets this need by evaluating your resources for non-compliance with assigned policies. + +## Table Usage Guide + +The 'azure_policy_definition' table provides insights into policy definitions within Azure Policy service. As a security engineer, explore policy-specific details through this table, including policy definition ID, name, type, mode, and metadata. Utilize it to uncover information about policies, such as their compliance status, the specific rules they enforce, and their effects on your resources. The schema presents a range of attributes of the policy definition for your analysis, like the policy definition ID, name, type, mode, and associated metadata. ## Examples ### Basic info +Explore policy definitions within your Azure environment to gain insights into their specific details such as ID, name, and type. This can be particularly useful for understanding and managing the rules and regulations applied to your resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### Get the policy definition by display name +Explore the policy definitions by their display names to understand their rules and types. This is particularly useful for managing and enforcing specific policies, such as enabling private endpoint connections on Batch accounts. ```sql select @@ -30,4 +41,4 @@ from azure_policy_definition where display_name = 'Private endpoint connections on Batch accounts should be enabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_postgresql_flexible_server.md b/docs/tables/azure_postgresql_flexible_server.md index 7597f12f..840e26b1 100644 --- a/docs/tables/azure_postgresql_flexible_server.md +++ b/docs/tables/azure_postgresql_flexible_server.md @@ -1,10 +1,20 @@ -# Table: azure_postgresql_flexible_server +--- +title: "Steampipe Table: azure_postgresql_flexible_server - Query Azure Database for PostgreSQL Flexible Servers using SQL" +description: "Allows users to query Azure Database for PostgreSQL Flexible Servers." +--- -Azure Database for PostgreSQL - Flexible Server is a fully managed database service designed to provide more granular control and flexibility over database management functions and configuration settings. The service generally provides more flexibility and server configuration customizations based on user requirements. The flexible server architecture allows users to collocate the database engine with the client tier for lower latency and choose high availability within a single availability zone and across multiple availability zones. Flexible servers also provide better cost optimization controls with the ability to stop/start your server and a burstable compute tier ideal for workloads that don't need full compute capacity continuously. +# Table: azure_postgresql_flexible_server - Query Azure Database for PostgreSQL Flexible Servers using SQL + +Azure Database for PostgreSQL Flexible Server is a fully managed database service designed for developers. It offers built-in high availability with no additional cost. It also provides the capability to scale compute resources up or down based on your application's need. + +## Table Usage Guide + +The 'azure_postgresql_flexible_server' table provides insights into PostgreSQL Flexible Servers within Azure Database for PostgreSQL. As a DevOps engineer, explore server-specific details through this table, including server version, state, and associated metadata. Utilize it to uncover information about servers, such as those with public network access, the backup retention period, and the geo-redundant backup setting. The schema presents a range of attributes of the PostgreSQL Flexible Server for your analysis, like the server name, creation date, SKU name, and associated tags. ## Examples ### Basic info +Discover the details of your Azure PostgreSQL Flexible Server configurations, including their names, IDs, and cloud environments. This can be particularly useful for understanding the geographic distribution of your servers and assessing their various configurations. ```sql select @@ -18,6 +28,7 @@ from ``` ### List SKU details of the flexible servers +Explore the specific details of your flexible servers, such as their SKU name and tier, to better understand and manage your resources within the Azure PostgreSQL environment. This can be particularly useful for resource allocation, cost management, and strategic planning. ```sql select @@ -30,6 +41,7 @@ from ``` ### List flexible servers that have geo-redundant backup enabled +Explore which flexible servers have geo-redundant backup enabled to ensure data security and continuity in case of a regional outage. This query is useful in identifying servers that have additional data protection measures in place. ```sql select @@ -46,6 +58,7 @@ where ``` ### List flexible servers configured in more than one availability zones +Explore which flexible servers are configured across multiple availability zones in Azure. This is particularly useful for ensuring high availability and disaster recovery, as it allows you to identify any servers that might be at risk due to being confined to a single zone. ```sql select diff --git a/docs/tables/azure_postgresql_server.md b/docs/tables/azure_postgresql_server.md index ade0800e..e5cacd64 100644 --- a/docs/tables/azure_postgresql_server.md +++ b/docs/tables/azure_postgresql_server.md @@ -1,10 +1,20 @@ -# Table: azure_postgresql_server +--- +title: "Steampipe Table: azure_postgresql_server - Query Azure Database for PostgreSQL Servers using SQL" +description: "Allows users to query Azure Database for PostgreSQL Servers." +--- -Azure Database for PostgreSQL is a relational database service based on the open-source Postgres database engine. It's a fully managed database-as-a-service that can handle mission-critical workloads with predictable performance, security, high availability, and dynamic scalability. +# Table: azure_postgresql_server - Query Azure Database for PostgreSQL Servers using SQL + +Azure Database for PostgreSQL is a fully managed database service provided by Microsoft Azure. It is built on the open-source PostgreSQL database engine and offers compatibility with PostgreSQL, which allows users to use familiar PostgreSQL tools and scripts. This service provides built-in high availability, automatic backups, and scaling of resources in minutes without application downtime. + +## Table Usage Guide + +The 'azure_postgresql_server' table provides insights into PostgreSQL servers within Azure Database for PostgreSQL. As a database administrator or DevOps engineer, explore server-specific details through this table, including configurations, network settings, and associated metadata. Utilize it to uncover information about servers, such as those with specific configurations, the networking rules applied to servers, and the verification of server statuses. The schema presents a range of attributes of the PostgreSQL server for your analysis, like the server name, resource group, region, version, SSL enforcement, and storage capacity. ## Examples ### Basic info +Explore the details of your Azure PostgreSQL servers, such as their names, IDs, and locations. This can be useful for managing and organizing your servers across various locations. ```sql select @@ -16,6 +26,7 @@ from ``` ### List servers with encryption disabled +Discover the segments that have encryption disabled on their servers. This is crucial for identifying potential security risks and ensuring data protection standards are upheld. ```sql select @@ -30,6 +41,8 @@ where ``` ### List servers that allow access to Azure services +1. Discover the segments that allow access to Azure services from any location, which could potentially indicate a security risk. +2. Identify instances where servers lack an assigned Active Directory admin, which could pose a management or security issue. ```sql select @@ -62,6 +75,7 @@ where ``` ### List servers with log checkpoints disabled +Explore which servers have disabled log checkpoints, which could potentially compromise data integrity and recovery. This can be useful for auditing server configurations and ensuring optimal data safety practices. ```sql select @@ -77,6 +91,7 @@ where ``` ### List servers with a logging retention period greater than 3 days +This query is useful for identifying servers that maintain logs for more than three days, which can be beneficial for organizations that need to keep track of server activities for extended periods for auditing or troubleshooting purposes. ```sql select @@ -92,6 +107,7 @@ where ``` ### List servers with geo-redundant backup storage disabled +Uncover the details of servers that have disabled geo-redundant backup storage, helping to highlight potential areas of risk in your Azure PostgreSQL Server setup. This is useful for ensuring data redundancy and disaster recovery planning. ```sql select @@ -106,6 +122,7 @@ where ``` ### List private endpoint connection details +Explore the status and details of private endpoint connections within a server. This can be useful to monitor and manage the connections' state and actions required for maintaining optimal server performance. ```sql select @@ -120,4 +137,4 @@ select from azure_postgresql_server, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_private_dns_zone.md b/docs/tables/azure_private_dns_zone.md index ed45fa13..c5316f7f 100644 --- a/docs/tables/azure_private_dns_zone.md +++ b/docs/tables/azure_private_dns_zone.md @@ -1,10 +1,20 @@ -# Table: azure_private_dns_zone +--- +title: "Steampipe Table: azure_private_dns_zone - Query Azure Private DNS Zones using SQL" +description: "Allows users to query Azure Private DNS Zones." +--- -Azure private DNS zone is used to host the DNS records for a particular domain. Please note that this table only retrieves private DNS zones, use the `azure_dns_zone` table for public DNS zones. +# Table: azure_private_dns_zone - Query Azure Private DNS Zones using SQL + +Azure Private DNS is a service that provides reliable resolution of domain names in a Virtual Network, without the need for you to create and manage custom DNS solution. This service supports Azure services like VMs and Azure Kubernetes Service (AKS) clusters within a virtual network to securely and privately resolve and connect to the services running in the virtual network. It provides name resolution for virtual machines (VMs) within a VNet and between VNets. + +## Table Usage Guide + +The 'azure_private_dns_zone' table provides insights into Private DNS Zones within Azure DNS. As a DevOps engineer, explore zone-specific details through this table, including record sets, virtual network links, and associated metadata. Utilize it to uncover information about zones, such as those with private DNS records, the virtual networks linked to the zones, and the verification of DNS records. The schema presents a range of attributes of the Private DNS Zone for your analysis, like the zone name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which private DNS zones are present in your Azure infrastructure, including their associated resource groups and any attached tags. This can help you track and manage your resources more effectively. ```sql select @@ -16,6 +26,7 @@ from ``` ### List private DNS zones with record sets +Analyze the configuration of your Azure private DNS zones to identify those with more than one record set. This can be useful in pinpointing specific locations where multiple resources might be sharing the same DNS zone. ```sql select @@ -28,6 +39,7 @@ where ``` ### List private DNS zones linked to no virtual networks +Explore which private DNS zones in Azure are not linked to any virtual networks. This can help identify potential areas for optimization or detect configuration errors. ```sql select @@ -37,4 +49,4 @@ from azure_private_dns_zone where number_of_virtual_network_links_with_registration = 0; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_provider.md b/docs/tables/azure_provider.md index 9dd32da8..aeac6728 100644 --- a/docs/tables/azure_provider.md +++ b/docs/tables/azure_provider.md @@ -1,10 +1,20 @@ -# Table: azure_provider +--- +title: "Steampipe Table: azure_provider - Query Azure Resource Providers using SQL" +description: "Allows users to query Azure Resource Providers." +--- -A Azure Resource Provider (RP, for short) is simply an HTTPS RESTful API contract that Add-on owners will implement so a trusted Azure endpoint can provision, delete, and manage services on a user's behalf. +# Table: azure_provider - Query Azure Resource Providers using SQL + +Azure Resource Providers are services that supply the resources you can deploy and manage through Resource Manager. Each resource provider offers operations for working with the resources that are deployed. Some common resource providers are Microsoft.Compute, which supplies the virtual machine resource, Microsoft.Storage, which supplies the storage account resource, and Microsoft.Web, which supplies resources related to web apps. + +## Table Usage Guide + +The 'azure_provider' table provides insights into Resource Providers within Microsoft Azure. As a DevOps engineer, explore provider-specific details through this table, including the provider's namespace, registration state, and resource types. Utilize it to uncover information about providers, such as those that are registered or unregistered, the resources they supply, and their capabilities. The schema presents a range of attributes of the Resource Provider for your analysis, like the provider ID, registration state, and resource types. ## Examples ### Basic info +Explore the registration status of your Azure provider to understand its operational state and ensure it's properly configured. This can be useful in maintaining the efficiency of your cloud infrastructure. ```sql select @@ -16,6 +26,7 @@ from ``` ### List of azure providers which are not registered for use +Explore which Azure providers are not registered for use. This can be particularly useful in identifying potential gaps in your Azure services setup, helping to ensure all necessary providers are correctly registered and operational. ```sql select @@ -25,4 +36,4 @@ from azure_provider where registration_state = 'NotRegistered'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_public_ip.md b/docs/tables/azure_public_ip.md index 8230d04c..984f051e 100644 --- a/docs/tables/azure_public_ip.md +++ b/docs/tables/azure_public_ip.md @@ -1,10 +1,20 @@ -# Table: azure_public_ip +--- +title: "Steampipe Table: azure_public_ip - Query Azure Public IP Addresses using SQL" +description: "Allows users to query Azure Public IP Addresses." +--- -Public IP addresses enable Azure resources to communicate to Internet and public-facing Azure services. +# Table: azure_public_ip - Query Azure Public IP Addresses using SQL + +Azure Public IP Address is a resource within Microsoft Azure that allows you to assign public IP addresses to Azure resources such as virtual machines, Azure Load Balancers, and Azure VPN Gateways. These public IP addresses are used to communicate with internet resources, and can be either dynamic or static. Azure Public IP Addresses provide a reliable and secure connection to the internet for your Azure resources. + +## Table Usage Guide + +The 'azure_public_ip' table provides insights into Public IP Addresses within Microsoft Azure. As a Network Administrator, explore IP-specific details through this table, including the IP version, IP configuration, and associated metadata. Utilize it to uncover information about IP addresses, such as their allocation method, their assigned resource, and their location. The schema presents a range of attributes of the Public IP Address for your analysis, like the IP address, the SKU name, the domain name label, and the reverse FQDN. ## Examples ### List of unassociated elastic IPs +Explore which Azure public IP addresses are not associated with any IP configuration. This is useful to identify any unused resources that could potentially be costing you money. ```sql select @@ -17,6 +27,7 @@ where ``` ### List of IP addresses with corresponding associations +Explore which IP addresses are associated with specific resources in your Azure environment. This can help you manage your network configuration and identify potential issues or inefficiencies. ```sql select @@ -29,6 +40,7 @@ from ``` ### List of dynamic IP addresses +Determine the areas in which Azure's public IP addresses are dynamically allocated to gain insights into the flexibility and scalability of your network resources. ```sql select @@ -38,4 +50,4 @@ from azure_public_ip where public_ip_allocation_method = 'Dynamic'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_recovery_services_backup_job.md b/docs/tables/azure_recovery_services_backup_job.md index f2fc5a45..da7d477b 100644 --- a/docs/tables/azure_recovery_services_backup_job.md +++ b/docs/tables/azure_recovery_services_backup_job.md @@ -1,10 +1,20 @@ -# Table: azure_recovery_services_backup_job +--- +title: "Steampipe Table: azure_recovery_services_backup_job - Query Azure Recovery Services Backup Jobs using SQL" +description: "Allows users to query Azure Recovery Services Backup Jobs." +--- -An Azure Backup job is a task that you can define and run to perform data protection operations on your Azure resources. These jobs are typically used to back up and restore data from various Azure services, such as virtual machines, databases, and files. +# Table: azure_recovery_services_backup_job - Query Azure Recovery Services Backup Jobs using SQL + +Azure Recovery Services is a service within Microsoft Azure that provides data protection and disaster recovery capabilities. It enables backup and restore functionalities for Azure Virtual Machines, SQL workloads, and on-premises Windows Servers. Azure Recovery Services helps maintain data availability and ensures business continuity during planned and unplanned outages. + +## Table Usage Guide + +The 'azure_recovery_services_backup_job' table provides insights into backup jobs within Azure Recovery Services. As a DevOps engineer, explore job-specific details through this table, including job status, start and end times, and associated metadata. Utilize it to uncover information about jobs, such as those with errors, the duration of jobs, and the verification of backup items. The schema presents a range of attributes of the backup job for your analysis, like the job ID, backup management type, duration, and associated tags. ## Examples ### Basic info +Analyze the settings to understand the specifics of backup jobs in a particular Azure recovery services vault. This can help in evaluating the backup strategy and ensuring data recovery measures are in line with your organization's policies. ```sql select @@ -20,6 +30,7 @@ where ``` ### Get job properties of jobs +Explore the specifics of different jobs, such as the type, associated activities, management methods, and operational status. This can provide insights into job performance and help identify areas for optimization. ```sql select @@ -35,4 +46,4 @@ select properties ->> 'Status' as Status from azure_recovery_services_backup_job; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_recovery_services_vault.md b/docs/tables/azure_recovery_services_vault.md index 4094d91d..9ef5fe66 100644 --- a/docs/tables/azure_recovery_services_vault.md +++ b/docs/tables/azure_recovery_services_vault.md @@ -1,10 +1,20 @@ -# Table: azure_recovery_services_vault +--- +title: "Steampipe Table: azure_recovery_services_vault - Query Azure Recovery Services Vaults using SQL" +description: "Allows users to query Azure Recovery Services Vaults" +--- -A Recovery Services vault is a storage entity in Azure that houses data. The data is typically copies of data, or configuration information for virtual machines (VMs), workloads, servers, or workstations. You can use Recovery Services vaults to hold backup data for various Azure services such as IaaS VMs (Linux or Windows) and Azure SQL databases. +# Table: azure_recovery_services_vault - Query Azure Recovery Services Vaults using SQL + +Azure Recovery Services vault is a management entity that stores recovery points created over time and provides an interface to perform backup related operations. These operations include taking on-demand backups, performing restores, and creating backup policies. It offers backup support for Azure virtual machines, SQL workloads, and on-premises VMware machines. + +## Table Usage Guide + +The 'azure_recovery_services_vault' table provides insights into Recovery Services Vaults within Azure Recovery Services. As a DevOps engineer, explore vault-specific details through this table, such as the vault's location, resource group, subscription ID, and associated tags. Utilize it to uncover information about each vault, including its storage redundancy and soft delete feature status. The schema presents a range of attributes of the Recovery Services Vault for your analysis, like the vault name, type, SKU name, and provisioning state. ## Examples ### Basic info +Explore the different types of recovery services vaults available in various regions of your Azure environment. This can help in managing and organizing your backup and disaster recovery resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List failed recovery service vaults +Discover the segments that have unsuccessful recovery service vaults in Azure. This is useful to pinpoint specific locations where the provisioning process failed, allowing for targeted troubleshooting and resolution. ```sql select @@ -29,4 +40,4 @@ from azure_recovery_services_vault where provisioning_state = 'Failed'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_redis_cache.md b/docs/tables/azure_redis_cache.md index f2bc9a42..11a8b30d 100644 --- a/docs/tables/azure_redis_cache.md +++ b/docs/tables/azure_redis_cache.md @@ -1,10 +1,20 @@ -# Table: azure_redis_cache +--- +title: "Steampipe Table: azure_redis_cache - Query Azure Cache for Redis instances using SQL" +description: "Allows users to query Azure Cache for Redis instances." +--- -Azure Cache for Redis provides an in-memory data store based on the Redis software. Redis improves the performance and scalability of an application that uses backend data stores heavily. It's able to process large volumes of application requests by keeping frequently accessed data in the server memory, which can be written to and read from quickly. Redis brings a critical low-latency and high-throughput data storage solution to modern applications. +# Table: azure_redis_cache - Query Azure Cache for Redis instances using SQL + +Azure Cache for Redis is an in-memory data store that is used to power fast, scalable applications. It provides secure and dedicated Redis server instances and additional features like Azure Virtual Network, full Redis command-set support, and premium tier features like clustering, persistence, and virtual network support. + +## Table Usage Guide + +The 'azure_redis_cache' table provides insights into Azure Cache for Redis instances. As a DevOps engineer, explore instance-specific details through this table, including configuration, access keys, and associated metadata. Utilize it to uncover information about instances, such as configuration settings, the number of clients connected, and the memory usage. The schema presents a range of attributes of the Redis instances for your analysis, like the Redis version, creation date, SKU name, and associated tags. ## Examples ### Basic info +Explore the configuration and status of your Azure Redis Cache instances. This is useful for understanding the versions in use, their locations, and the state of provisioning to ensure optimal performance and resource allocation. ```sql select @@ -20,6 +30,7 @@ from ``` ### List cache servers not using latest TLS protocol +Explore which cache servers in your Azure Redis Cache are not utilizing the latest TLS protocol. This helps ensure optimal security by identifying areas where updates may be needed. ```sql select @@ -35,6 +46,7 @@ where ``` ### List cache servers with in-transit encryption disabled +Explore which cache servers in Azure have in-transit encryption disabled. This is useful to identify potential security risks and ensure that all your data is securely transmitted. ```sql select @@ -49,6 +61,7 @@ where ``` ### List premium cache servers +Explore which cache servers are of premium type in your Azure Redis Cache setup. This can help in managing resources and costs more effectively. ```sql select @@ -60,4 +73,4 @@ from azure_redis_cache where sku_name = 'Premium'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_resource_group.md b/docs/tables/azure_resource_group.md index e671fb38..40a96fb5 100644 --- a/docs/tables/azure_resource_group.md +++ b/docs/tables/azure_resource_group.md @@ -1,10 +1,20 @@ -# Table: azure_resource_group +--- +title: "Steampipe Table: azure_resource_group - Query Azure Resource Groups using SQL" +description: "Allows users to query Azure Resource Groups." +--- -A resource group is a container that holds related resources for an Azure solution. +# Table: azure_resource_group - Query Azure Resource Groups using SQL + +Azure Resource Groups are basic units in Azure that provide a logical grouping for resources deployed on Azure. These groups hold related resources for an Azure solution. Resource groups are used to manage and organize Azure resources so you can monitor, control access, provision and manage billing. + +## Table Usage Guide + +The 'azure_resource_group' table provides insights into Resource Groups within Azure. As a DevOps engineer, explore Resource Group-specific details through this table, including locations, managed_by details, and associated metadata. Utilize it to uncover information about Resource Groups, such as those with specific provisioning states, the tags associated with each group, and the time they were last updated. The schema presents a range of attributes of the Resource Group for your analysis, like the group ID, name, type, and associated tags. ## Examples ### List of resource groups with their locations +Explore which resource groups are located in different regions to better manage and organize your resources in Azure. This can help streamline operations and ensure resources are optimally allocated across various geographical locations. ```sql select @@ -15,6 +25,7 @@ from ``` ### List of resource groups without owner tag key +Identify the Azure resource groups that lack an 'owner' tag. This is useful for pinpointing potential areas of unaccountability or mismanagement within your resources. ```sql select diff --git a/docs/tables/azure_resource_link.md b/docs/tables/azure_resource_link.md index 1892c1ea..4b435adc 100644 --- a/docs/tables/azure_resource_link.md +++ b/docs/tables/azure_resource_link.md @@ -1,10 +1,20 @@ -# Table: azure_resource_link +--- +title: "Steampipe Table: azure_resource_link - Query Azure Resource Links using SQL" +description: "Allows users to query Azure Resource Links." +--- -Linking is a feature of the Resource Manager. It enables declaring relationships between resources even if they do not reside in the same resource group. +# Table: azure_resource_link - Query Azure Resource Links using SQL + +Azure Resource Links are a feature within Microsoft Azure that allows you to link resources across different resource groups and even across different subscriptions. This feature provides a way to visualize and manage the dependencies between resources, which can be helpful for tasks like application mapping and audit. It also enables you to set up and manage links for various Azure resources, including virtual machines, databases, web applications, and more. + +## Table Usage Guide + +The 'azure_resource_link' table provides insights into Resource Links within Microsoft Azure. As a DevOps engineer, explore link-specific details through this table, including the source and target of each link, as well as associated metadata. Utilize it to uncover information about the relationships between different resources, such as those spanning across different resource groups or subscriptions. The schema presents a range of attributes of the Resource Link for your analysis, like the link id, source id, target id, and notes. ## Examples ### Basic Info +Explore the connections between different Azure resources. This can be useful in understanding the structure of your Azure environment and identifying potential dependencies or bottlenecks. ```sql select @@ -18,6 +28,7 @@ from ``` ### List resource links with virtual machines +Explore the connections between various resources and virtual machines within your Azure environment. This query can be useful to understand the relationships and dependencies in your infrastructure, providing valuable insights for resource management and optimization. ```sql select @@ -29,4 +40,4 @@ from azure_resource_link where source_id LIKE '%virtualmachines%'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_role_assignment.md b/docs/tables/azure_role_assignment.md index 56832ade..2738c26f 100644 --- a/docs/tables/azure_role_assignment.md +++ b/docs/tables/azure_role_assignment.md @@ -1,10 +1,20 @@ -# Table: azure_role_assignment +--- +title: "Steampipe Table: azure_role_assignment - Query Azure Identity and Access Management Role Assignments using SQL" +description: "Allows users to query Azure Role Assignments" +--- -Azure role assignments is the authorization system to manage access to Azure resources. To grant access, you assign roles to users, groups, service principals, or managed identities at a particular scope. +# Table: azure_role_assignment - Query Azure Identity and Access Management Role Assignments using SQL + +Azure Role Assignments are a security mechanism used within Microsoft Azure to manage access to Azure resources. They define the operations that a user, group, service principal, or managed identity can perform on a particular resource. Role assignments are crucial for effective access management and security in Azure. + +## Table Usage Guide + +The 'azure_role_assignment' table provides insights into role assignments within Azure Identity and Access Management (IAM). As a security administrator, explore role assignment-specific details through this table, including role definitions, principals, and scope. Utilize it to uncover information about role assignments, such as those with broad permissions, the relationships between principals and roles, and the scope of each role assignment. The schema presents a range of attributes of the role assignment for your analysis, like the role ID, principal ID, scope, and role definition ID. ## Examples ### Basic info +Explore the identities and types of principals assigned to roles in your Azure environment, enabling you to better manage access and permissions. This is particularly useful in maintaining security and ensuring only authorized users have access to specific resources. ```sql select @@ -17,6 +27,7 @@ from ``` ### List of role assignments which has permission at root level +Determine the areas in which certain role assignments have root-level permissions. This is useful for understanding the distribution of access rights within your Azure environment. ```sql select @@ -30,6 +41,7 @@ where ``` ### List of role assignments which has subscription level permission and full access to the subscription +Explore which users have full access and subscription level permissions in Azure. This is beneficial for managing user permissions and ensuring the security of your Azure resources. ```sql select @@ -42,4 +54,4 @@ from where ra.scope like '/subscriptions/%' and perm -> 'actions' = '["*"]'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_role_definition.md b/docs/tables/azure_role_definition.md index a112456c..8b860a9a 100644 --- a/docs/tables/azure_role_definition.md +++ b/docs/tables/azure_role_definition.md @@ -1,10 +1,20 @@ -# Table: azure_role_definition +--- +title: "Steampipe Table: azure_role_definition - Query Azure Active Directory Role Definitions using SQL" +description: "Allows users to query Azure Active Directory Role Definitions." +--- -A role definition lists the operations that can be performed, such as read, write, and delete. +# Table: azure_role_definition - Query Azure Active Directory Role Definitions using SQL + +Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. Role Definitions are a collection of permissions. It’s a template that defines the operations that can be performed, such as read, write, and delete. + +## Table Usage Guide + +The 'azure_role_definition' table provides insights into role definitions within Azure Active Directory. As a DevOps engineer, you can explore role-specific details through this table, including permissions and associated metadata. Utilize it to uncover information about role definitions, such as those with specific permissions. The schema presents a range of attributes of the role definition for your analysis, like the role name, id, description, and type. ## Examples ### List the custom roles +Explore the custom roles within your Azure environment to understand their configurations and purposes. This can help in managing access and permissions more effectively. ```sql select @@ -20,6 +30,7 @@ where ``` ### List of roles whose assignable scope is set to root('/') scope +Discover the roles within the Azure environment that have the highest level of access, specifically those set to the root ('/') scope. This can be useful for auditing purposes, allowing you to ensure only the appropriate roles have such broad permissions. ```sql select @@ -34,6 +45,7 @@ where ``` ### Permissions of all custom roles +Explore the permissions associated with all custom roles in an Azure environment. This can be useful to understand and manage access control, ensuring the right roles have the appropriate permissions. ```sql select @@ -49,4 +61,4 @@ from cross join jsonb_array_elements(permissions) as permission where role_type = 'CustomRole'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_route_table.md b/docs/tables/azure_route_table.md index 3885ab0b..ff562f86 100644 --- a/docs/tables/azure_route_table.md +++ b/docs/tables/azure_route_table.md @@ -1,10 +1,20 @@ -# Table: azure_route_table +--- +title: "Steampipe Table: azure_route_table - Query Azure Networking Route Tables using SQL" +description: "Allows users to query Azure Networking Route Tables." +--- -Azure Route Tables allows to create network routes so that CloudGen Firewall VM can handle the traffic both between the subnets and to the Internet. +# Table: azure_route_table - Query Azure Networking Route Tables using SQL + +Azure Networking Route Tables are a resource within Microsoft Azure that allow for control over the routing paths of network traffic. They provide a way to direct network traffic based on source, destination, and other key factors. This enables more granular control over network communication within and across Azure services. + +## Table Usage Guide + +The 'azure_route_table' table provides insights into Route Tables within Azure Networking. As a Network Administrator, explore route-specific details through this table, including associated routes, subnets, and related metadata. Utilize it to uncover information about the routing paths, such as those with specific next hops, the association between subnets and routes, and the verification of route properties. The schema presents a range of attributes of the Route Table for your analysis, like the route table ID, creation date, attached subnets, and associated tags. ## Examples ### List of subnets associated with route table +Explore the association between subnets and route tables within a specific region in Azure. This can help in understanding the network infrastructure and identifying potential issues related to network routing. ```sql select @@ -17,6 +27,7 @@ from ``` ### List of route tables where route propagation is enabled +Explore the route tables in your Azure network where route propagation is enabled. This can be useful in understanding how your network traffic is being directed and managed. ```sql select @@ -30,6 +41,7 @@ where ``` ### Route info of each routes table +Explore the details of each route within your Azure network to understand the direction of traffic flow. This can help in optimizing network performance and managing traffic effectively. ```sql select @@ -40,4 +52,4 @@ select from azure_route_table cross join jsonb_array_elements(routes) as route; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_search_service.md b/docs/tables/azure_search_service.md index 16453f6f..4f61ef8c 100644 --- a/docs/tables/azure_search_service.md +++ b/docs/tables/azure_search_service.md @@ -1,10 +1,20 @@ -# Table: azure_search_service +--- +title: "Steampipe Table: azure_search_service - Query Azure Search Services using SQL" +description: "Allows users to query Azure Search Services." +--- -Azure Cognitive Search is the only cloud search service with built-in AI capabilities that enrich all types of information to help you identify and explore relevant content at scale. Use cognitive skills for vision, language and speech or use custom machine learning models to uncover insights from all types of content. +# Table: azure_search_service - Query Azure Search Services using SQL + +Azure Search Service is a cloud-based search-as-a-service solution that delegates server and infrastructure management to Microsoft, leaving you with a ready-to-use service that you can populate with your data and then use to add search to your web or mobile application. Azure Search Service supports a wide variety of features to provide a rich search experience, including full-text search, filters and facets, typeaheads, hit highlighting, and suggestions. It also provides capabilities for tuning the relevance of search results and offers a simple query syntax for a wide range of query types. + +## Table Usage Guide + +The 'azure_search_service' table provides insights into Search Services within Azure. As a DevOps engineer, explore service-specific details through this table, including the service name, resource group, subscription ID, and associated metadata. Utilize it to uncover information about search services, such as the service tier, the number of replicas and partitions, and the verification of public network access. The schema presents a range of attributes of the Search Service for your analysis, like the service name, location, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure Search services are currently active and assess their configuration, including the number of replicas. This is useful for managing resources and understanding the scale of your Azure Search services. ```sql select @@ -20,6 +30,7 @@ from ``` ### List publicly accessible search services +Discover the segments that have publicly accessible search services enabled within the Azure platform. This is useful for assessing potential security risks and ensuring appropriate access controls are in place. ```sql select diff --git a/docs/tables/azure_security_center_auto_provisioning.md b/docs/tables/azure_security_center_auto_provisioning.md index 3d075336..4581793f 100644 --- a/docs/tables/azure_security_center_auto_provisioning.md +++ b/docs/tables/azure_security_center_auto_provisioning.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_auto_provisioning +--- +title: "Steampipe Table: azure_security_center_auto_provisioning - Query Azure Security Center Auto Provisioning Settings using SQL" +description: "Allows users to query Azure Security Center Auto Provisioning Settings." +--- -Azure security center auto provisioning settings expose the auto provisioning settings of the subscriptions. +# Table: azure_security_center_auto_provisioning - Query Azure Security Center Auto Provisioning Settings using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not. Auto Provisioning settings in Azure Security Center enable you to control if security solutions are automatically deployed and provisioned for new resources. This feature is designed to ensure that as new resources are deployed, they are automatically onboarded to the security solutions and policies you have defined. + +## Table Usage Guide + +The 'azure_security_center_auto_provisioning' table provides insights into the auto provisioning settings within Azure Security Center. As a security administrator, explore setting-specific details through this table, including the current auto provisioning status and target resource type. Utilize it to uncover information about the auto provisioning settings, such as those that are currently active and the resource types they are applied to. The schema presents a range of attributes of the auto provisioning settings for your analysis, like the auto provisioning setting id, provisioning status, and target resource type. ## Examples ### Basic info +Discover the segments that have automatic provisioning enabled in your Azure Security Center to better manage your security policies and configurations. This is useful for maintaining security standards and ensuring consistent configurations across your environment. ```sql select @@ -17,6 +27,7 @@ from ``` ### List subscriptions that have automatic provisioning of VM monitoring agent enabled +Discover the subscriptions that have enabled automatic provisioning for their VM monitoring agent. This allows you to identify potential areas for increased security and efficiency. ```sql select @@ -28,4 +39,4 @@ from azure_security_center_auto_provisioning where auto_provision = 'On'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_automation.md b/docs/tables/azure_security_center_automation.md index 898574ed..906fce00 100644 --- a/docs/tables/azure_security_center_automation.md +++ b/docs/tables/azure_security_center_automation.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_automation +--- +title: "Steampipe Table: azure_security_center_automation - Query Azure Security Center Automations using SQL" +description: "Allows users to query Azure Security Center Automations, providing detailed information on their security automation configurations." +--- -Microsoft Defender for Cloud generates detailed security alerts and recommendations. You can view them in the portal or through programmatic tools. You might also need to export some or all of this information for tracking with other monitoring tools in your environment. +# Table: azure_security_center_automation - Query Azure Security Center Automations using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud. The Security Center Automations are part of this system, designed to provide automatic responses to specific security incidents. They offer an efficient way to remediate threats and misconfigurations, enabling a proactive approach to security management. + +## Table Usage Guide + +The 'azure_security_center_automation' table provides insights into the automations within Azure Security Center. As a security or DevOps engineer, explore automation-specific details through this table, including the associated resources, actions, and conditions. Utilize it to uncover information about automations, such as those related to specific security alerts, the actions taken in response, and the resources affected. The schema presents a range of attributes of the automation for your analysis, like the automation name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore the types and kinds of security automations set up in your Azure Security Center. This is useful for understanding the variety and scope of automated security measures currently in place. ```sql select @@ -17,6 +27,7 @@ from ``` ### List enabled continuously export microsoft defender for cloud data +Analyze the configuration of your Microsoft Defender for cloud data to identify which aspects are continuously exporting. This helps in keeping track of the data and ensuring that all necessary information is being exported as required. ```sql select @@ -31,6 +42,7 @@ where ``` ### List event source details for continuously export microsoft defender for cloud data +Determine the details of event sources for continuous data export in Microsoft Defender for Cloud. This is useful for understanding the configuration and operators of your security automation rules, as well as identifying expected values and property types. ```sql select diff --git a/docs/tables/azure_security_center_contact.md b/docs/tables/azure_security_center_contact.md index 2a4ecff4..f25bf8a3 100644 --- a/docs/tables/azure_security_center_contact.md +++ b/docs/tables/azure_security_center_contact.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_contact +--- +title: "Steampipe Table: azure_security_center_contact - Query Azure Security Center Contacts using SQL" +description: "Allows users to query Azure Security Center Contacts." +--- -Azure security center contact details for the subscription. +# Table: azure_security_center_contact - Query Azure Security Center Contacts using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud. It allows you to manage and enforce your security policies across your Azure environment, limit your exposure to threats, and detect and respond to attacks. A contact in Azure Security Center is an entity that contains the contact details for the security center. + +## Table Usage Guide + +The 'azure_security_center_contact' table provides insights into the contacts within Azure Security Center. As a security administrator, explore contact-specific details through this table, including email addresses, phone numbers, and alert notifications. Utilize it to uncover information about contacts, such as those who are set to receive security alerts, and the verification of alert notifications. The schema presents a range of attributes of the Security Center contact for your analysis, like the contact name, email, phone, and alert notifications. ## Examples ### Basic info +Analyze the settings to understand the alert preferences and email contact details in your Azure Security Center. This can help you ensure that alerts are being sent to the right people and that the notification settings are configured correctly. ```sql select @@ -17,6 +27,7 @@ from ``` ### List security center contacts not configured with email notifications +Discover the segments that have security center contacts without configured email notifications. This is useful to identify potential gaps in your alert system and ensure all relevant parties are receiving necessary security updates. ```sql select @@ -28,4 +39,4 @@ from azure_security_center_contact where email != ''; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_jit_network_access_policy.md b/docs/tables/azure_security_center_jit_network_access_policy.md index d1f5131e..af01bf70 100644 --- a/docs/tables/azure_security_center_jit_network_access_policy.md +++ b/docs/tables/azure_security_center_jit_network_access_policy.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_jit_network_access_policy +--- +title: "Steampipe Table: azure_security_center_jit_network_access_policy - Query Azure Security Center Just-In-Time Network Access Policies using SQL" +description: "Allows users to query Just-In-Time Network Access Policies in Azure Security Center." +--- -Azure Security Center's just-in-time (JIT) network access policy helps to lock down inbound traffic access to your virtual machines. This reduces exposure to attacks while providing easy access when you need to connect to a VM. +# Table: azure_security_center_jit_network_access_policy - Query Azure Security Center Just-In-Time Network Access Policies using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud. Just-In-Time Network Access Policies in Azure Security Center help you control access to your Azure Virtual Machines by providing a secure way to connect to a VM, reducing exposure to attacks while providing easy access to connect to VMs when needed. + +## Table Usage Guide + +The 'azure_security_center_jit_network_access_policy' table provides insights into Just-In-Time Network Access Policies within Azure Security Center. As a security engineer, explore policy-specific details through this table, including policy configurations, virtual machine details, and associated metadata. Utilize it to uncover information about policies, such as those with specific IP configurations, the access protocols allowed, and the verification of request status. The schema presents a range of attributes of the Just-In-Time Network Access Policy for your analysis, like the policy ID, provisioning state, location, and associated tags. ## Examples ### List virtual machines with JIT access enabled +Explore which virtual machines have Just-In-Time access enabled. This is particularly beneficial for enhancing security measures by only permitting access when needed. ```sql select @@ -17,4 +27,4 @@ from azure_compute_virtual_machine as vm where lower(vms ->> 'id') = lower(vm.id); -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_setting.md b/docs/tables/azure_security_center_setting.md index 9f386b88..34b381d8 100644 --- a/docs/tables/azure_security_center_setting.md +++ b/docs/tables/azure_security_center_setting.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_setting +--- +title: "Steampipe Table: azure_security_center_setting - Query Azure Security Center Settings using SQL" +description: "Allows users to query Azure Security Center Settings" +--- -Azure security center settings contains different configurations in security center. +# Table: azure_security_center_setting - Query Azure Security Center Settings using SQL + +Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not. It gives you the ability to protect your hybrid cloud workloads and get unified security management across your entire environment. Azure Security Center helps you prevent, detect, and respond to threats with increased visibility and control over the security of all your Azure resources. + +## Table Usage Guide + +The 'azure_security_center_setting' table provides insights into settings within Azure Security Center. As a Security Engineer, explore setting-specific details through this table, including the type of setting, whether it is enabled or not, and the kind of resource it is associated with. Utilize it to uncover information about settings, such as those that are disabled, those that are enabled, and the resources they are associated with. The schema presents a range of attributes of the Security Center setting for your analysis, like the setting name, type, kind, provisioning state, and associated metadata. ## Examples ### Basic info +Explore the status of your Azure Security Center settings to determine which ones are active. This can help streamline your security management by focusing on the settings currently in use. ```sql select @@ -16,6 +26,7 @@ from ``` ### List the enabled settings for security center +Explore which settings are enabled in the Azure Security Center to determine the areas of your system that are currently secured. This can help in identifying any potential vulnerabilities or gaps in security. ```sql select @@ -26,4 +37,4 @@ from azure_security_center_setting where enabled; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_security_center_sub_assessment.md b/docs/tables/azure_security_center_sub_assessment.md index 0a6a88b3..a4db262d 100644 --- a/docs/tables/azure_security_center_sub_assessment.md +++ b/docs/tables/azure_security_center_sub_assessment.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_sub_assessment +--- +title: "Steampipe Table: azure_security_center_sub_assessment - Query Azure Security Center Sub-Assessments using SQL" +description: "Allows users to query Azure Security Center Sub-Assessments" +--- -Azure security center sub-assessments helps identifying conditions to evaluate if there is a need to fix security vulnerabilities found in images before pushing anything further in the process on all your scanned resources inside a subscription scope +# Table: azure_security_center_sub_assessment - Query Azure Security Center Sub-Assessments using SQL + +Azure Security Center is a unified infrastructure security management system by Microsoft Azure that improves the security posture of your data centers. It provides advanced threat protection across your hybrid workloads in the cloud, whether they're in Azure or not. As part of this service, Sub-Assessments provide detailed security recommendations and potential vulnerabilities within your resources. + +## Table Usage Guide + +The 'azure_security_center_sub_assessment' table provides insights into Sub-Assessments within Azure Security Center. As a security professional, you can explore detailed security recommendations and potential vulnerabilities for your resources through this table. Utilize it to uncover information about each sub-assessment, such as its status, severity, and associated metadata. The schema presents a range of attributes of the sub-assessment for your analysis, like the resource ID, resource type, and associated recommendations. This can be particularly useful in identifying and mitigating potential security risks in your Azure environment. ## Examples ### Basic info +Explore which security assessments in your Azure Security Center have specific characteristics. This can help you identify potential risk areas and understand the security posture of your resources. ```sql select @@ -18,6 +28,7 @@ from ``` ### List unhealthy sub assessment details +Explore which sub-assessments in Azure Security Center are marked as unhealthy. This can help you identify areas of your Azure environment that may require immediate attention or remediation. ```sql select @@ -32,6 +43,7 @@ where ``` ### List all container registry vulnerabilities with corresponding remedies +Explore potential security vulnerabilities within your container registry and understand the corresponding solutions. This is useful for maintaining the security of your applications by identifying and addressing potential threats. ```sql select @@ -45,6 +57,7 @@ where ``` ### List all server vulnerabilities with corresponding remedies +Explore server vulnerabilities and their corresponding remedies within the Azure Security Center. This is useful for identifying potential security issues and understanding how to address them. ```sql select @@ -58,6 +71,7 @@ where ``` ### List all sql server vulnerabilities with corresponding remedies +Discover the segments that contain vulnerabilities in your SQL server and understand the corresponding remedies. This can help in ensuring your server's security by addressing these vulnerabilities promptly. ```sql select diff --git a/docs/tables/azure_security_center_subscription_pricing.md b/docs/tables/azure_security_center_subscription_pricing.md index 8302eeae..3ec62dcf 100644 --- a/docs/tables/azure_security_center_subscription_pricing.md +++ b/docs/tables/azure_security_center_subscription_pricing.md @@ -1,10 +1,20 @@ -# Table: azure_security_center_subscription_pricing +--- +title: "Steampipe Table: azure_security_center_subscription_pricing - Query Azure Security Center Subscription Pricings using SQL" +description: "Allows users to query Azure Security Center Subscription Pricings." +--- -Azure security center pricing configurations for the subscription. +# Table: azure_security_center_subscription_pricing - Query Azure Security Center Subscription Pricings using SQL + +Azure Security Center is a unified security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud, whether they're in Azure or not. It provides you with a set of policies and recommendations, tailored to your specific deployments. With Azure Security Center, you can understand the security state of your resources in Azure, on-premises, and in other cloud providers. + +## Table Usage Guide + +The 'azure_security_center_subscription_pricing' table provides insights into subscription pricings within Azure Security Center. As a security analyst, explore pricing-specific details through this table, including pricing tier, free trial status, and associated metadata. Utilize it to uncover information about subscription pricings, such as the pricing tier for each resource type and whether the free trial is still active. The schema presents a range of attributes of the subscription pricing for your analysis, like the pricing name, pricing tier, and free trial status. ## Examples ### Basic info +Analyze the settings to understand the different pricing tiers of your Azure Security Center subscriptions. This can help you assess your current cost structure and potentially identify areas for optimization. ```sql select @@ -16,6 +26,7 @@ from ``` ### List pricing information for virtual machines +Explore the cost implications of your virtual machines by determining their associated pricing tiers. This is useful for budget management and cost optimization within your Azure environment. ```sql select @@ -26,4 +37,4 @@ from azure_security_center_subscription_pricing where name = 'VirtualMachines'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_service_fabric_cluster.md b/docs/tables/azure_service_fabric_cluster.md index dcb1933f..f4a3bc91 100644 --- a/docs/tables/azure_service_fabric_cluster.md +++ b/docs/tables/azure_service_fabric_cluster.md @@ -1,10 +1,20 @@ -# Table: azure_service_fabric_cluster +--- +title: "Steampipe Table: azure_service_fabric_cluster - Query Azure Service Fabric Clusters using SQL" +description: "Allows users to query Azure Service Fabric Clusters." +--- -An Azure Service Fabric cluster is a network-connected set of virtual or physical machines into which your microservices are deployed and managed. It rebalances the partition replicas and instances across the increase or decreased number of nodes to make better use of the hardware on each node. It allows for the creation of clusters on any VMs or computers running Windows Server or Linux. +# Table: azure_service_fabric_cluster - Query Azure Service Fabric Clusters using SQL + +Azure Service Fabric is a distributed systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers. It also provides comprehensive runtime and lifecycle management capabilities to applications that are composed of these microservices or containers. This platform simplifies the delivery of cloud services and provides developers with a comprehensive, agnostic and intrinsically secure approach to building, scaling and updating cloud applications. + +## Table Usage Guide + +The 'azure_service_fabric_cluster' table provides insights into Service Fabric Clusters within Azure Service Fabric. As a DevOps engineer, explore cluster-specific details through this table, including cluster code versions, reliability levels, upgrade modes, and associated metadata. Utilize it to uncover information about clusters, such as those with specific reliability levels, the upgrade modes of the clusters, and the verification of cluster health policies. The schema presents a range of attributes of the Service Fabric Cluster for your analysis, like the cluster ID, creation date, upgrade mode, and associated tags. ## Examples ### Basic info +Explore which Azure Service Fabric Clusters are being used by reviewing their basic information. This helps in managing resources and understanding their provisioning states and upgrade modes. ```sql select @@ -21,6 +31,7 @@ from ``` ### List azure active directory details for clusters +Explore the Azure Active Directory details associated with your clusters to understand the client and cluster applications. This can be beneficial for assessing the elements within your Azure Service Fabric Cluster, such as the tenant ID. ```sql select @@ -34,6 +45,7 @@ from ``` ### List certificate details for clusters +Discover the segments that have specific certificate details for clusters. This can be useful in identifying potential security vulnerabilities or ensuring compliance with organizational policies. ```sql select @@ -47,6 +59,7 @@ from ``` ### List fabric setting details for clusters +Analyze the settings to understand the configuration details for specific clusters within the Azure Service Fabric. This can help in managing and troubleshooting your service fabric clusters effectively. ```sql select @@ -60,6 +73,7 @@ from ``` ### List node type details for clusters +Assess the configuration of cluster nodes to better understand their connection points, durability levels, and port settings. This information can be useful for optimizing resource allocation and enhancing network security. ```sql select @@ -76,4 +90,4 @@ select from azure_service_fabric_cluster, jsonb_array_elements(node_types) as types; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_servicebus_namespace.md b/docs/tables/azure_servicebus_namespace.md index 6e3e3a9e..19141a5a 100644 --- a/docs/tables/azure_servicebus_namespace.md +++ b/docs/tables/azure_servicebus_namespace.md @@ -1,10 +1,20 @@ -# Table: azure_servicebus_namespace +--- +title: "Steampipe Table: azure_servicebus_namespace - Query Azure Service Bus Namespaces using SQL" +description: "Allows users to query Azure Service Bus Namespaces, providing insights into their properties, statuses, and configurations." +--- -A ServiceBus namespace is a container for all messaging components (queues and topics). Multiple queues and topics can be in a single namespace, and namespaces often serve as application containers. A Service Bus namespace is your own capacity slice of a large cluster made up of dozens of all-active virtual machines. +# Table: azure_servicebus_namespace - Query Azure Service Bus Namespaces using SQL + +Azure Service Bus is a fully managed enterprise integration message broker. It can decouple applications and services, enabling them to communicate independently and reliably through messages. A namespace is a scoping container for all messaging components, providing a unique environment within the Service Bus where the queues, topics, and subscriptions reside. + +## Table Usage Guide + +The 'azure_servicebus_namespace' table provides insights into Azure Service Bus Namespaces, allowing you to explore details such as their properties, statuses, and configurations. As a DevOps engineer, leverage this table to understand the setup and management of your Service Bus Namespaces, including their SKU details, provisioning states, and associated tags. The schema presents a range of attributes of the Service Bus Namespace for your analysis, such as the name, region, resource group, subscription ID, and more. Utilize it to monitor the health and performance of your Azure Service Bus Namespaces, ensuring they meet predefined conditions and standards. ## Examples ### Basic info +Explore which Azure Service Bus namespaces are currently in use, to understand their provisioning status and when they were created. This can help in managing resources and planning for future capacity needs. ```sql select @@ -18,6 +28,7 @@ from ``` ### List premium namespaces +Explore which service bus namespaces in your Azure environment are operating on a premium tier, allowing you to assess your resource allocation and optimize cost management. ```sql select @@ -31,6 +42,7 @@ where ``` ### List unencrypted namespaces +Explore the premium tier of your Azure Service Bus to identify namespaces that lack encryption. This is useful for improving your security measures and ensuring data protection. ```sql select @@ -45,6 +57,7 @@ where ``` ### List namespaces not using a virtual network service endpoint +Identify premium Azure Service Bus namespaces that are not utilizing a virtual network service endpoint. This can be used to enhance network security by ensuring all namespaces are connected to a secure network. ```sql select @@ -69,6 +82,7 @@ where ``` ### List private endpoint connection details +Explore the details of private endpoint connections in your Azure Service Bus Namespace. This can be useful to understand the state and type of each connection, which can assist in managing and optimizing your network's performance. ```sql select @@ -86,6 +100,7 @@ from ``` ### List encryption details +Explore the encryption details of your Azure Service Bus namespaces to understand their security configurations and ensure that they meet your organization's requirements. This query is particularly useful for auditing and compliance purposes. ```sql select @@ -96,4 +111,4 @@ select encryption -> 'requireInfrastructureEncryption' as require_infrastructure_encryption from azure_servicebus_namespace; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_signalr_service.md b/docs/tables/azure_signalr_service.md index a63c1184..053160a9 100644 --- a/docs/tables/azure_signalr_service.md +++ b/docs/tables/azure_signalr_service.md @@ -1,10 +1,20 @@ -# Table: azure_signalr_service +--- +title: "Steampipe Table: azure_signalr_service - Query Azure SignalR Services using SQL" +description: "Allows users to query Azure SignalR Services." +--- -Azure SignalR Service is a fully-managed service which allows developers to focus on building real-time web experiences without worrying about capacity provisioning, reliable connections, scaling, encryption or authentication. +# Table: azure_signalr_service - Query Azure SignalR Services using SQL + +Azure SignalR Service is a fully-managed service that allows developers to focus on building real-time web experiences without worrying about capacity provisioning, reliable connections, scaling, encryption, or authentication. It is an Azure cloud-based service that is designed to support real-time web technologies like WebSockets and has built-in support for scaling your applications instantly. It also provides robust client SDKs for .NET, JavaScript, and Java, making it easier to build web applications with real-time features. + +## Table Usage Guide + +The 'azure_signalr_service' table provides insights into SignalR services within Azure. As a DevOps engineer, explore service-specific details through this table, including the service mode, primary and secondary connection strings, and associated metadata. Utilize it to uncover information about services, such as those with specific features, the connections between services, and the verification of connection strings. The schema presents a range of attributes of the SignalR service for your analysis, like the service tier, unit count, host name, and associated tags. ## Examples ### Basic info +Explore the status and types of Azure SignalR services to gain insights into their provisioning status, which can help in managing and troubleshooting these services efficiently. ```sql select @@ -18,6 +28,7 @@ from ``` ### List network ACL details for SignalR service +Explore the network access control lists (ACLs) for SignalR service to understand their configuration and status. This can help you assess security measures and pinpoint areas for potential improvement. ```sql select @@ -33,6 +44,7 @@ from ``` ### List private endpoint connection details for SignalR service +This example helps you identify the details of private endpoint connections for the SignalR service. It's useful for understanding the state and type of your connections, providing insights that can aid in service configuration and management. ```sql select @@ -46,4 +58,4 @@ select from azure_signalr_service, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_spring_cloud_service.md b/docs/tables/azure_spring_cloud_service.md index 98c4873d..fefae011 100644 --- a/docs/tables/azure_spring_cloud_service.md +++ b/docs/tables/azure_spring_cloud_service.md @@ -1,10 +1,20 @@ -# Table: azure_spring_cloud_service +--- +title: "Steampipe Table: azure_spring_cloud_service - Query Azure Spring Cloud Services using SQL" +description: "Allows users to query Azure Spring Cloud Services, providing data on various aspects of the service such as the service's ID, name, type, and location, as well as detailed information on the service's properties, tags, and encryption settings." +--- -Azure Spring Cloud is a platform as a service (PaaS) for Spring developers. It manages the lifecycle of your Spring Boot applications with comprehensive monitoring and diagnostics, configuration management, service discovery, CI/CD integration, blue-green deployments and more. +# Table: azure_spring_cloud_service - Query Azure Spring Cloud Services using SQL + +Azure Spring Cloud is a service that lets developers build, deploy, and scale Spring Boot applications on Azure. It provides a fully managed service for Spring Boot apps, allowing developers to focus on building their applications without the worry of managing infrastructure. Azure Spring Cloud is designed to be simple, safe, and scalable, providing a robust platform for enterprise-grade applications. + +## Table Usage Guide + +The 'azure_spring_cloud_service' table provides insights into Azure Spring Cloud Services. As a DevOps engineer, explore service-specific details through this table, including service properties, tags, and encryption settings. Utilize it to uncover information about services, such as the service's ID, name, type, and location. The schema presents a range of attributes of the Azure Spring Cloud Service for your analysis, like the service's provisioning state, active deployment name, and network profile. ## Examples ### Basic info +Explore the various features of your Azure Spring Cloud services, such as their current provisioning state, type, and version. This can help you manage and optimize your resources effectively. ```sql select @@ -20,6 +30,7 @@ from ``` ### List network profile details +This example helps you explore the details of your network profile in Azure Spring Cloud Service. It's particularly useful when you need to understand your network configuration for troubleshooting or optimizing your cloud services. ```sql select diff --git a/docs/tables/azure_sql_database.md b/docs/tables/azure_sql_database.md index 78dd3098..a0a79e37 100644 --- a/docs/tables/azure_sql_database.md +++ b/docs/tables/azure_sql_database.md @@ -1,10 +1,20 @@ -# Table: azure_sql_database +--- +title: "Steampipe Table: azure_sql_database - Query Azure SQL Databases using SQL" +description: "Allows users to query Azure SQL Databases." +--- -An Azure SQL Database is an intelligent, scalable, relational database service built for the cloud. +# Table: azure_sql_database - Query Azure SQL Databases using SQL + +Azure SQL Database is a managed cloud database provided as part of Microsoft Azure. A high-performance, reliable, and secure database you can use to build data-driven applications and websites in the programming language of your choice, without needing to manage infrastructure. + +## Table Usage Guide + +The 'azure_sql_database' table provides insights into SQL databases within Azure. As a DevOps engineer, you can explore database-specific details through this table, including server details, collation, status, and associated metadata. Utilize it to uncover information about databases, such as those with specific collation, the status of the databases, and the verification of server details. The schema presents a range of attributes of the SQL database for your analysis, like the database ID, creation date, server name, and associated tags. ## Examples ### Basic info +Explore the general attributes of your Azure SQL databases, such as their names, IDs, server names, locations, and editions. This is useful for gaining a broad overview of your database configurations and locations. ```sql select @@ -18,6 +28,7 @@ from ``` ### List databases that are not online +Discover the databases that are not currently online, enabling you to identify potential issues or areas for maintenance within your Azure SQL server. This can be useful for troubleshooting, ensuring optimal performance, and managing resources. ```sql select @@ -34,6 +45,7 @@ where ``` ### List databases that are not encrypted +Explore which databases in your Azure SQL server are not encrypted. This can help in identifying potential security risks and ensuring data protection compliance. ```sql select @@ -47,4 +59,4 @@ from azure_sql_database where transparent_data_encryption ->> 'status' != 'Enabled'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_sql_server.md b/docs/tables/azure_sql_server.md index 68070122..6def02e2 100644 --- a/docs/tables/azure_sql_server.md +++ b/docs/tables/azure_sql_server.md @@ -1,10 +1,20 @@ -# Table: azure_sql_server +--- +title: "Steampipe Table: azure_sql_server - Query Azure SQL Servers using SQL" +description: "Allows users to query Azure SQL Servers for information such as server names, locations, versions, administrator logins, and more." +--- -An Azure SQL server is a relational database management system. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet). +# Table: azure_sql_server - Query Azure SQL Servers using SQL + +Azure SQL Server is a relational database service in the Microsoft Azure cloud. It provides a scalable, highly available, and managed database service that handles most of the database management functions such as upgrading, patching, backups, and monitoring. Azure SQL Server offers the broadest SQL Server engine compatibility and an automated patching and version updates feature. + +## Table Usage Guide + +The 'azure_sql_server' table provides insights into SQL servers within Azure SQL Server service. As a database administrator, you can explore server-specific details through this table, including server names, locations, versions, administrator logins, and more. Utilize it to uncover information about servers, such as those with specific versions, the locations of the servers, and the administrator login details. The schema presents a range of attributes of the SQL server for your analysis, like the server name, location, version, administrator login, and associated tags. ## Examples ### List servers that have auditing disabled +Determine the areas in which auditing is disabled on your servers. This can be useful to maintain security standards and ensure all activities are properly recorded for future reference. ```sql select @@ -19,6 +29,7 @@ where ``` ### List servers with an audit log retention period less than 90 days +Determine the servers that have an audit log retention period of less than 90 days. This can be useful for identifying potential security risks and ensuring compliance with internal or external data retention policies. ```sql select @@ -33,6 +44,7 @@ where ``` ### List servers that have advanced data security disabled +Discover the segments that have advanced data security turned off in your Azure SQL servers. This is particularly useful for assessing potential vulnerabilities and ensuring optimal security practices. ```sql select @@ -47,6 +59,7 @@ where ``` ### List servers that have Advanced Threat Protection types set to All +Explore which Azure servers have their Advanced Threat Protection types set to 'All'. This is useful for assessing the security configuration of servers and identifying any potential vulnerabilities. ```sql select @@ -64,6 +77,7 @@ where ``` ### List servers that do not have an Active Directory admin set +Analyze your Azure SQL servers to identify those that lack an assigned Active Directory admin. This could be beneficial in pinpointing potential security vulnerabilities or compliance issues in your infrastructure. ```sql select @@ -76,6 +90,7 @@ where ``` ### List servers for which TDE protector is encrypted with the service-managed key +Explore which servers have their Transparent Data Encryption (TDE) protector encrypted with a service-managed key. This is useful for assessing the encryption status and understanding the key management scheme of your servers. ```sql select @@ -87,4 +102,4 @@ from jsonb_array_elements(encryption_protector) as encryption where encryption ->> 'kind' = 'servicemanaged'; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_account.md b/docs/tables/azure_storage_account.md index a73a6e8a..a4a4c1e3 100644 --- a/docs/tables/azure_storage_account.md +++ b/docs/tables/azure_storage_account.md @@ -1,10 +1,20 @@ -# Table: azure_storage_account +--- +title: "Steampipe Table: azure_storage_account - Query Azure Storage Accounts using SQL" +description: "Allows users to query Azure Storage Accounts." +--- -An Azure storage account contains all of your Azure Storage data objects: blobs, files, queues, tables, and disks. +# Table: azure_storage_account - Query Azure Storage Accounts using SQL + +Azure Storage Account is a service provided by Microsoft Azure that offers highly scalable and secure data storage. It allows you to store and retrieve large amounts of unstructured data, such as documents and media files, and structured data, such as databases. Azure Storage Account supports different data types including blobs, files, queues, tables, and disks. + +## Table Usage Guide + +The 'azure_storage_account' table provides insights into Storage Accounts within Microsoft Azure. As a DevOps engineer, explore account-specific details through this table, including creation time, primary location, and associated metadata. Utilize it to uncover information about accounts, such as those with public access, the replication type, and the status of primary and secondary locations. The schema presents a range of attributes of the Storage Account for your analysis, like the account name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore which Azure storage accounts are in use, their associated SKU names and tiers, and their primary and secondary locations. This can help in understanding the distribution and classification of storage resources within your Azure environment. ```sql select @@ -18,6 +28,7 @@ from ``` ### List storage accounts with versioning disabled +Discover the segments that have disabled versioning within their storage accounts, enabling you to identify potential risks and ensure data recovery options. ```sql select @@ -30,6 +41,7 @@ where ``` ### List storage accounts with blob soft delete disabled +Explore which Azure storage accounts have the blob soft delete feature disabled. This is useful in identifying potential data loss risks, as these accounts do not have a recovery option for accidentally deleted blobs. ```sql select @@ -43,6 +55,7 @@ where ``` ### List storage accounts that allow blob public access +Explore which Azure storage accounts permit public access to blob data. This is useful for assessing potential security risks and ensuring appropriate access controls are in place. ```sql select @@ -55,6 +68,7 @@ where ``` ### List storage accounts with encryption in transit disabled +Explore which Azure storage accounts lack encryption in transit, a feature crucial for maintaining data security during transmission. This query is useful for identifying potential security vulnerabilities within your cloud storage infrastructure. ```sql select @@ -67,6 +81,7 @@ where ``` ### List storage accounts that do not have a cannot-delete lock +Analyze the settings to understand which storage accounts lack a 'cannot-delete' lock, therefore potentially posing a risk of accidental deletion. This query is useful in identifying areas that need improved security measures. ```sql select @@ -85,6 +100,7 @@ where ``` ### List storage accounts with queue logging enabled +Explore which Azure storage accounts have queue logging enabled for all actions, such as delete, read, and write. This is useful in monitoring activity and maintaining security within your storage accounts. ```sql select @@ -101,6 +117,7 @@ where ``` ### List storage accounts without lifecycle +Discover the storage accounts that lack a lifecycle management policy. This is useful for identifying areas where data retention and deletion policies may not be properly enforced, potentially leading to unnecessary storage costs or compliance issues. ```sql select @@ -113,6 +130,7 @@ where ``` ### List diagnostic settings details +Explore the diagnostic settings of your Azure storage accounts. This can help you better understand and manage the logging and monitoring capabilities of your storage resources. ```sql select @@ -123,6 +141,7 @@ from ``` ### List storage accounts with replication but unavailable secondary +Determine the areas in which storage accounts have replication enabled but the secondary is unavailable. This is useful to identify potential risks and ensure data redundancy in case of primary failure. ```sql select @@ -139,6 +158,7 @@ where ``` ### Get table properties of storage accounts +Explore the properties of your storage accounts to understand their configurations, such as logging settings and metrics, which can help in optimizing storage usage and improving data management practices. ```sql select diff --git a/docs/tables/azure_storage_blob.md b/docs/tables/azure_storage_blob.md index f855fd30..54e283bf 100644 --- a/docs/tables/azure_storage_blob.md +++ b/docs/tables/azure_storage_blob.md @@ -1,10 +1,20 @@ -# Table: azure_storage_blob +--- +title: "Steampipe Table: azure_storage_blob - Query Azure Storage Blobs using SQL" +description: "Allows users to query Azure Storage Blobs." +--- -Azure Blob Storage helps you create data lakes for your analytics needs and provides storage to build powerful cloud-native and mobile apps. Optimise costs with tiered storage for your long-term data and flexibly scale up for high-performance computing and machine learning workloads. +# Table: azure_storage_blob - Query Azure Storage Blobs using SQL + +Azure Storage Blobs are scalable, object storage for unstructured data. They are ideal for serving images or documents directly to a browser, storing files for distributed access, streaming video and audio, writing to log files, storing data for backup and restore, disaster recovery, and archiving. Azure Storage Blobs are accessible from anywhere in the world via HTTP or HTTPS. + +## Table Usage Guide + +The 'azure_storage_blob' table provides insights into the storage blobs within Azure Storage. As a DevOps engineer, explore blob-specific details through this table, including type, content settings, and associated metadata. Utilize it to uncover information about blobs, such as their lease status, server encrypted status, and the last modified date. The schema presents a range of attributes of the Azure Storage Blob for your analysis, like the blob name, creation date, content type, and associated tags. ## Examples ### Basic info +Explore the details of specific Azure storage blobs within a designated resource group, storage account, and region. This is useful for managing and organizing your data storage in Azure, particularly when dealing with large numbers of blobs. ```sql select @@ -23,6 +33,7 @@ where ``` ### List snapshot type blobs with import data +Discover the segments that contain snapshot type blobs with import data in a specific Azure storage account located in a certain region. This could be useful to assess the elements within a particular resource group for better data management and security compliance. ```sql select @@ -43,4 +54,4 @@ where and storage_account_name = 'mystorageaccount' and region = 'eastus' and is_snapshot; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_blob_service.md b/docs/tables/azure_storage_blob_service.md index 85978986..8f416c41 100644 --- a/docs/tables/azure_storage_blob_service.md +++ b/docs/tables/azure_storage_blob_service.md @@ -1,10 +1,20 @@ -# Table: azure_storage_blob_service +--- +title: "Steampipe Table: azure_storage_blob_service - Query Azure Storage Blob Services using SQL" +description: "Allows users to query Azure Blob Services." +--- -The properties of a storage account's Blob service endpoint, including properties for Storage Analytics, CORS (Cross-Origin Resource Sharing) rules and soft delete settings. +# Table: azure_storage_blob_service - Query Azure Storage Blob Services using SQL + +Azure Blob storage is a service for storing large amounts of unstructured object data, such as text or binary data, that can be accessed from anywhere in the world via HTTP or HTTPS. You can use Blob storage to expose data publicly to the world, or to store application data privately. Common uses of Blob storage include serving images or documents directly to a browser, storing files for distributed access, streaming video and audio, writing to log files, storing data for backup and restore, disaster recovery, and archiving. + +## Table Usage Guide + +The 'azure_storage_blob_service' table provides insights into Blob Services within Azure Storage. As a DevOps engineer, explore service-specific details through this table, including the status of blob services, the CORS rules in place, and associated metadata. Utilize it to uncover information about each blob service, such as its default service version, whether or not it supports HTTPS traffic only, and the last modified time. The schema presents a range of attributes of the blob service for your analysis, like the storage account name, resource group, and Azure region. ## Examples ### Basic info +Analyze the settings to understand the tier and region of your Azure storage accounts. This can help you manage resources and costs effectively. ```sql select @@ -18,6 +28,7 @@ from ``` ### List of storage blob service where delete retention policy is not enabled +Determine the areas in which the delete retention policy is not enabled for your Azure storage blob service. This query is useful for identifying potential vulnerabilities and maintaining data security within your storage services. ```sql select @@ -31,6 +42,7 @@ where ``` ### List of storage blob service where versioning is not enabled +Identify instances where Azure Blob Storage services do not have versioning enabled. This is useful for ensuring data recovery options are in place, as versioning allows restoration of previous versions of blobs in the event of accidental deletion or alteration. ```sql select @@ -44,6 +56,7 @@ where ``` ### CORS rules info for storage blob service +Explore the Cross-Origin Resource Sharing (CORS) rules for your Azure Storage Blob Service to understand the permissions and restrictions in place. This can help ensure secure data transactions and identify potential areas for security optimization. ```sql select diff --git a/docs/tables/azure_storage_container.md b/docs/tables/azure_storage_container.md index 98bf3d4f..fb790d98 100644 --- a/docs/tables/azure_storage_container.md +++ b/docs/tables/azure_storage_container.md @@ -1,10 +1,20 @@ -# Table: azure_storage_container +--- +title: "Steampipe Table: azure_storage_container - Query Azure Storage Containers using SQL" +description: "Allows users to query Azure Storage Containers." +--- -A container organizes a set of blobs, similar to a directory in a file system. A storage account can include an unlimited number of containers, and a container can store an unlimited number of blobs. +# Table: azure_storage_container - Query Azure Storage Containers using SQL + +Azure Storage Containers are a part of Azure Blob Storage, which provides scalable, secure, performance-efficient storage services in the cloud. The containers organize blobs in a similar way that directories organize files in a file system. They are useful in storing and managing data objects, such as text or binary data, which can be accessed from anywhere in the world via HTTP or HTTPS. + +## Table Usage Guide + +The 'azure_storage_container' table provides insights into Azure Storage Containers within Azure Blob Storage. As a DevOps engineer, explore container-specific details through this table, including metadata, properties, and associated storage account information. Utilize it to uncover information about containers, such as public access level, last modified time, and the lease status. The schema presents a range of attributes of the Azure Storage Container for your analysis, like the storage account name, resource group name, and associated tags. ## Examples ### Basic info +Explore the basic details of your Azure storage containers to identify their types and associated accounts. This could be beneficial for managing resources and ensuring correct account allocation. ```sql select @@ -17,6 +27,7 @@ from ``` ### List containers which are publicly accessible +Discover the segments that are publicly accessible within your Azure storage containers to ensure data privacy and security. This query is useful for identifying potential vulnerabilities and implementing necessary access control measures. ```sql select @@ -32,6 +43,7 @@ where ``` ### List containers with legal hold enabled +Explore which Azure storage containers have the legal hold feature enabled. This is useful for identifying instances where data preservation is enforced for compliance or litigation purposes. ```sql select @@ -47,6 +59,7 @@ where ``` ### List containers which are either leased or have a broken lease state +Explore which Azure storage containers are currently leased or have a broken lease state. This query is useful for managing resources and troubleshooting issues related to container leases. ```sql select @@ -63,6 +76,7 @@ where ``` ### List containers with infinite lease duration +Explore which Azure storage containers have been set with an unlimited lease duration. This can help in managing storage resources effectively and identifying areas that may require attention to prevent unnecessary storage consumption. ```sql select @@ -78,6 +92,7 @@ where ``` ### List containers with a remaining retention period of 7 days +Explore which Azure storage containers have a remaining retention period of exactly 7 days. This is useful for managing resources and planning ahead for storage needs or potential data loss. ```sql select @@ -93,6 +108,7 @@ where ``` ### List containers ImmutabilityPolicy details +Explore the immutability policy details of your Azure storage containers to understand their data preservation settings. This can help in maintaining data integrity and ensuring compliance with data retention policies. ```sql select diff --git a/docs/tables/azure_storage_queue.md b/docs/tables/azure_storage_queue.md index e0f63bc2..78f8afb7 100644 --- a/docs/tables/azure_storage_queue.md +++ b/docs/tables/azure_storage_queue.md @@ -1,10 +1,20 @@ -# Table: azure_storage_queue +--- +title: "Steampipe Table: azure_storage_queue - Query Azure Storage Queues using SQL" +description: "Allows users to query Azure Storage Queues, which provide reliable messaging for workflow processing and for communication between components of cloud services." +--- -Azure Queue Storage is a service for storing large numbers of messages which allows to access messages from anywhere in the world via authenticated calls using HTTP or HTTPS. +# Table: azure_storage_queue - Query Azure Storage Queues using SQL + +Azure Storage Queues offer a simple way for components of a distributed application to communicate asynchronously. They are a part of Azure's scalable and secure cloud storage solution, providing reliable messaging for workflow processing and for communication between components of cloud services. Azure Storage Queues support a set of advanced messaging features, making them ideal for building flexible and reliable applications. + +## Table Usage Guide + +The 'azure_storage_queue' table provides insights into Azure Storage Queues within Azure's cloud storage solution. As a DevOps engineer, you can explore queue-specific details through this table, including metadata, approximate message count, and associated storage account information. Utilize it to uncover information about your queues, such as their message retention period, visibility timeout, and whether they are enabled for logging or not. The schema presents a range of attributes of the storage queue for your analysis, like the queue name, resource group, and associated tags. ## Examples ### List of queues and their corresponding storage accounts +This query allows you to identify the storage accounts associated with each queue in your Azure environment and their geographical locations. It can be used to manage and organize resources more effectively by understanding where data is stored and how it is distributed across different regions. ```sql select @@ -17,6 +27,7 @@ from ### List of storage queues without owner tag key +Discover the segments that lack an 'owner' tag within your Azure application security groups. This could be useful for identifying potential security gaps or for maintaining consistent tagging practices. ```sql select diff --git a/docs/tables/azure_storage_share_file.md b/docs/tables/azure_storage_share_file.md index 10780318..66fa06b2 100644 --- a/docs/tables/azure_storage_share_file.md +++ b/docs/tables/azure_storage_share_file.md @@ -1,10 +1,20 @@ -# Table: azure_storage_share_file +--- +title: "Steampipe Table: azure_storage_share_file - Query Azure Storage File Shares using SQL" +description: "Allows users to query Azure Storage File Shares, providing details about each file stored within these resources." +--- -Azure Files is Microsoft's easy-to-use cloud file system. Azure file shares can be mounted in Windows, Linux, and macOS. +# Table: azure_storage_share_file - Query Azure Storage File Shares using SQL + +Azure Storage File Shares service is a feature of Azure Storage that allows you to create a serverless file share in the cloud. It provides highly available network file shares that can be accessed by using the standard Server Message Block (SMB) protocol. Azure File Shares can be used to replace or supplement on-premises file servers or NAS devices. + +## Table Usage Guide + +The 'azure_storage_share_file' table provides insights into the files stored within Azure Storage File Shares. As a DevOps engineer, explore file-specific details through this table, including the file's URL, content type, last modification time, and associated metadata. Utilize it to uncover information about each file, such as its size, type, and any lease status. The schema presents a range of attributes of the file for your analysis, like the file's Etag, content MD5, and whether it is a directory or not. ## Examples ### Basic info +Explore which storage shares are available in your Azure account, focusing on their types and capabilities. This can help you understand your storage utilization and optimize resource allocation. ```sql select @@ -19,6 +29,7 @@ from ``` ### List file shares with default access tier +Explore which file shares are set with a default access tier of 'TransactionOptimized'. This is useful for understanding how your storage is optimized for transactional workloads. ```sql select @@ -36,6 +47,7 @@ where ``` ### Get file share with maximum share quota +Analyze the settings to understand which file share has the largest quota within your Azure storage. This can be useful to determine where the majority of your storage resources are allocated. ```sql select @@ -49,4 +61,4 @@ select from azure_storage_share_file order by share_quota desc limit 1; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_sync.md b/docs/tables/azure_storage_sync.md index 41eefcf5..7a20320e 100644 --- a/docs/tables/azure_storage_sync.md +++ b/docs/tables/azure_storage_sync.md @@ -1,10 +1,20 @@ -# Table: azure_storage_sync +--- +title: "Steampipe Table: azure_storage_sync - Query Azure Storage Sync Services using SQL" +description: "Allows users to query Azure Storage Sync Services, which are used to synchronize files across multiple Azure File shares." +--- -Azure File Sync is a service that allows you to cache several Azure file shares on an on-premises Windows Server or cloud VM. +# Table: azure_storage_sync - Query Azure Storage Sync Services using SQL + +Azure Storage Sync Services is a feature within Microsoft Azure that allows you to synchronize files across multiple Azure File shares. It provides a centralized way to manage and synchronize files across different regions and offices. Azure Storage Sync Services helps you to keep your data close to where it is being used, irrespective of whether it's being used on-premises or in the cloud. + +## Table Usage Guide + +The 'azure_storage_sync' table provides insights into Azure Storage Sync Services within Microsoft Azure. As a DevOps engineer, explore service-specific details through this table, including the synchronization status, last synchronization time, and associated metadata. Utilize it to uncover information about storage sync services, such as those with synchronization issues, the relationships between different services, and the verification of synchronization health. The schema presents a range of attributes of the Azure Storage Sync Services for your analysis, like the service name, id, type, and associated tags. ## Examples ### Basic info +Explore the status and types of your Azure storage synchronization services. This can help in managing and monitoring your storage resources effectively. ```sql select @@ -17,6 +27,7 @@ from ``` ### List storage sync which allows traffic through private endpoints only +Determine the areas in which your Azure storage sync is configured to allow traffic through private endpoints only. This is particularly useful for enhancing security by ensuring that network traffic is restricted to virtual networks only. ```sql select @@ -32,6 +43,7 @@ where ``` ### List private endpoint connection details for accounts +This query is useful for gaining insights into the details of private endpoint connections associated with your Azure storage sync accounts. It helps in analyzing the connection settings to understand the status and type of each connection, which can be critical for auditing and compliance purposes. ```sql select @@ -45,4 +57,4 @@ select from azure_storage_sync, jsonb_array_elements(private_endpoint_connections) as connections; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_table.md b/docs/tables/azure_storage_table.md index f49426ec..f682f47e 100644 --- a/docs/tables/azure_storage_table.md +++ b/docs/tables/azure_storage_table.md @@ -1,10 +1,20 @@ -# Table: azure_storage_table +--- +title: "Steampipe Table: azure_storage_table - Query Azure Storage Tables using SQL" +description: "Allows users to query Azure Storage Tables." +--- -Azure Table storage is a service that stores structured NoSQL data in the cloud, providing a key/attribute store with a schema less design. +# Table: azure_storage_table - Query Azure Storage Tables using SQL + +Azure Storage Tables are a service that stores structured NoSQL data in the cloud, providing a key/attribute store with a schema-less design. Because Table storage is schema-less, it's easy to adapt your data as the needs of your application evolve. Azure Table storage is now part of Azure Cosmos DB. + +## Table Usage Guide + +The 'azure_storage_table' table provides insights into Azure Storage Tables within Azure Storage Account service. As a DevOps engineer, explore table-specific details through this table, including the table name, resource group, and associated metadata. Utilize it to uncover information about tables, such as those with specific table names, the resource groups associated with the tables, and the region of storage. The schema presents a range of attributes of the Azure Storage Table for your analysis, like the table name, resource group, and region. ## Examples ### Basic info +Explore which Azure storage tables are currently in use across different regions and subscriptions. This can help manage resources more effectively by identifying where storage is allocated. ```sql select @@ -16,4 +26,4 @@ select subscription_id from azure_storage_table; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_storage_table_service.md b/docs/tables/azure_storage_table_service.md index 4b564d93..debcd036 100644 --- a/docs/tables/azure_storage_table_service.md +++ b/docs/tables/azure_storage_table_service.md @@ -1,10 +1,20 @@ -# Table: azure_storage_table_service +--- +title: "Steampipe Table: azure_storage_table_service - Query Azure Storage Table Services using SQL" +description: "Allows users to query Azure Storage Table Services." +--- -The properties of a storage account’s Table service endpoint, including properties for Storage Analytics and CORS (Cross-Origin Resource Sharing) rules. +# Table: azure_storage_table_service - Query Azure Storage Table Services using SQL + +The Azure Storage Table service is a NoSQL datastore providing a key-attribute store with a schemaless design. This service allows users to store large amounts of structured data. The service is a non-relational data store that allows for rapid development and fast access to data by scaling as needed. + +## Table Usage Guide + +The 'azure_storage_table_service' table provides insights into Azure Storage Table Services. As a DevOps engineer, explore specific details about this service through this table, including the storage account name, resource group, and subscription ID. Utilize it to uncover information about the service, such as the CORS (Cross-Origin Resource Sharing) rules, hour metrics, minute metrics, and the retention policy. The schema presents a range of attributes of the Azure Storage Table Service for your analysis, like the storage account ID, CORS rules, hour metrics enabled status, minute metrics enabled status, and the retention policy days. ## Examples ### Basic info +Explore which storage services are being utilized in your Azure environment. This can help in managing resources and optimizing storage allocation across different regions and resource groups. ```sql select @@ -17,6 +27,7 @@ from ``` ### CORS rules info of each storage table service +Discover the segments that have specific Cross-Origin Resource Sharing (CORS) rules in each Azure storage table service. This can be useful in understanding the security measures in place for data access and transfer across different origins. ```sql select diff --git a/docs/tables/azure_stream_analytics_job.md b/docs/tables/azure_stream_analytics_job.md index f3a5eeda..bbeb6129 100644 --- a/docs/tables/azure_stream_analytics_job.md +++ b/docs/tables/azure_stream_analytics_job.md @@ -1,10 +1,20 @@ -# Table: azure_stream_analytics_job +--- +title: "Steampipe Table: azure_stream_analytics_job - Query Azure Stream Analytics Jobs using SQL" +description: "Allows users to query Azure Stream Analytics Jobs." +--- -An Azure Stream Analytics job consists of an input, query, and an output. Stream Analytics ingests data from Azure Event Hubs (including Azure Event Hubs from Apache Kafka), Azure IoT Hub, or Azure Blob Storage. The query, which is based on SQL query language, can be used to easily filter, sort, aggregate, and join streaming data over a period of time. +# Table: azure_stream_analytics_job - Query Azure Stream Analytics Jobs using SQL + +Azure Stream Analytics is a real-time analytics and complex event-processing engine that is designed to analyze and visualize streaming data in real-time. It provides users with the ability to set up real-time analytic computations on streaming data which can originate from various sources such as devices, sensors, websites, social media feeds, applications, infrastructure systems, and more. Azure Stream Analytics is designed to process and analyze data as it's ingested in real-time, and can handle high volumes of data from multiple sources simultaneously. + +## Table Usage Guide + +The 'azure_stream_analytics_job' table provides insights into Stream Analytics Jobs within Azure Stream Analytics. As a Data Engineer, explore job-specific details through this table, including job topology, transformation query, output details, and associated metadata. Utilize it to uncover information about jobs, such as those with their current state, the events processed, and the input and output of the job. The schema presents a range of attributes of the Stream Analytics Job for your analysis, like the job name, resource group, location, compatibility level, data locale, and job type. ## Examples ### Basic info +Explore which Azure Stream Analytics jobs are currently active or inactive, and identify their respective locations and subscription IDs. This information can be useful for auditing purposes or for managing and optimizing streaming jobs across different regions. ```sql select @@ -19,6 +29,7 @@ from ``` ### List failed stream analytics jobs +Identify instances where stream analytics jobs have failed in Azure. This can be useful for troubleshooting and understanding the areas that may require additional resources or configuration adjustments. ```sql select diff --git a/docs/tables/azure_subnet.md b/docs/tables/azure_subnet.md index 58ae4e44..ea655405 100644 --- a/docs/tables/azure_subnet.md +++ b/docs/tables/azure_subnet.md @@ -1,10 +1,20 @@ -# Table: azure_subnet +--- +title: "Steampipe Table: azure_subnet - Query Azure Virtual Networks Subnets using SQL" +description: "Allows users to query Azure Virtual Networks Subnets." +--- -A subnet is a range of IP addresses in the VNet. You can divide a VNet into multiple subnets for organization and security +# Table: azure_subnet - Query Azure Virtual Networks Subnets using SQL + +A subnet is a range within a virtual network where Azure resources like VMs and PaaS services can be deployed and accessed from the internet, other networks, and the internet. Subnets help to segment the virtual network into one or more sub-networks, providing a range of IP addresses, network security policies, and route tables. Each subnet in Azure is associated with a route table, which defines the rules for packet routing. + +## Table Usage Guide + +The 'azure_subnet' table provides insights into subnets within Azure Virtual Networks. As a DevOps engineer, explore subnet-specific details through this table, including IP configurations, network security group details, and associated metadata. Utilize it to uncover information about subnets, such as those with private endpoints, the associated route table, and the service endpoint policies. The schema presents a range of attributes of the subnet for your analysis, like the subnet ID, address prefix, associated network security group, and associated route table. ## Examples ### Virtual network and IP address range of each subnet +Analyze the settings to understand the relationship between your virtual network and IP address range for each subnet. This can help you effectively manage your network resources and ensure optimal performance and security. ```sql select @@ -18,6 +28,7 @@ from ``` ### Route table associated with each subnet +Explore which route tables are associated with each subnet in your Azure environment. This can help you understand and manage the routing of network traffic within your virtual network. ```sql select @@ -32,6 +43,7 @@ from ``` ### Network security group associated with each subnet +Explore which network security groups are linked to each Azure subnet. This is beneficial for understanding your network's security layout and identifying any potential vulnerabilities or misconfigurations. ```sql select @@ -43,6 +55,7 @@ from ``` ### Service endpoints info of each subnet +Explore which locations are associated with each subnet service in Azure. This can help in understanding the geographical distribution of your services and planning for potential regional expansion or redundancy. ```sql select @@ -52,4 +65,4 @@ select from azure_subnet cross join jsonb_array_elements(service_endpoints) as endpoint; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_subscription.md b/docs/tables/azure_subscription.md index ce75135d..fb3fddb3 100644 --- a/docs/tables/azure_subscription.md +++ b/docs/tables/azure_subscription.md @@ -1,10 +1,20 @@ -# Table: azure_subscription +--- +title: "Steampipe Table: azure_subscription - Query Azure Subscriptions using SQL" +description: "Allows users to query Azure Subscriptions." +--- -An Azure subscription is a logical container used to provision resources in Azure. +# Table: azure_subscription - Query Azure Subscriptions using SQL + +Azure Subscriptions represent a logical container for resources that are deployed within an Azure account. They provide a way to manage costs and resources where users can apply different policies and manage access control. Each Azure subscription can have a separate billing and payment setup, so you can have different subscriptions for different departments or projects. + +## Table Usage Guide + +The 'azure_subscription' table provides insights into subscriptions within Azure. As a DevOps engineer, explore subscription-specific details through this table, including subscription ID, name, and state, among others. Utilize it to uncover information about subscriptions, such as their current state, the tenant they belong to, and whether they are spending over their budget. The schema presents a range of attributes of the Azure subscription for your analysis, like the subscription ID, tenant ID, state, and location placement ID. ## Examples ### Basic info +Explore which Azure subscriptions are active and the policies associated with them. This can be helpful in managing resources and understanding the scope of your Azure environment. ```sql select @@ -17,4 +27,4 @@ select subscription_policies from azure_subscription; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_synapse_workspace.md b/docs/tables/azure_synapse_workspace.md index 16909748..9d10ff46 100644 --- a/docs/tables/azure_synapse_workspace.md +++ b/docs/tables/azure_synapse_workspace.md @@ -1,10 +1,20 @@ -# Table: azure_synapse_workspace +--- +title: "Steampipe Table: azure_synapse_workspace - Query Azure Synapse Analytics Workspaces using SQL" +description: "Allows users to query Azure Synapse Analytics Workspaces." +--- -Azure Synapse is an enterprise analytics service that accelerates time to insight across data warehouses and big data systems. Azure Synapse brings together the best of SQL technologies used in enterprise data warehousing, Spark technologies used for big data, Pipelines for data integration and ETL/ELT, and deep integration with other Azure services such as Power BI, CosmosDB, and AzureML. +# Table: azure_synapse_workspace - Query Azure Synapse Analytics Workspaces using SQL + +Azure Synapse Analytics is an integrated analytics service that accelerates time to insight across data warehouses and big data systems. It blends big data and data warehousing into an on-demand resource that brings together enterprise data warehousing and Big Data analytics. It gives you the freedom to query data on your terms, using either serverless or provisioned resources, at scale. + +## Table Usage Guide + +The 'azure_synapse_workspace' table provides insights into workspaces within Azure Synapse Analytics. As a data engineer or data scientist, explore workspace-specific details through this table, including managed private endpoints, managed private endpoint connections, and firewall settings. Utilize it to uncover information about workspaces, such as those with specific managed private endpoint settings, the firewall settings between workspaces, and the verification of managed private endpoint connections. The schema presents a range of attributes of the workspace for your analysis, like the workspace name, ID, type, and associated tags. ## Examples ### Basic info +Analyze the settings to understand the status and type of your Azure Synapse workspaces. This can be useful to manage and monitor your workspaces efficiently. ```sql select @@ -17,6 +27,7 @@ from ``` ### List synapse workspaces with public network access enabled +Discover the segments that have public network access enabled within Azure Synapse workspaces. This allows for a quick assessment of potential security risks and helps in maintaining secure configurations. ```sql select @@ -32,6 +43,7 @@ where ``` ### List synapse workspaces with user assigned identities +Determine the areas in which user-assigned identities are utilized within Azure Synapse workspaces. This is useful for managing access control and ensuring appropriate permissions are in place. ```sql select @@ -51,6 +63,7 @@ where ``` ### List private endpoint connection details for synapse workspaces +Explore the private endpoint connections of Synapse workspaces to understand the current state and any actions required. This is useful in managing and maintaining secure network connections in your data analytics environment. ```sql select @@ -68,6 +81,7 @@ from ``` ### List encryption details for synapse workspaces +Explore the encryption details for Synapse workspaces to gain insights into the security measures in place, including the status of the customer-managed key (CMK) and whether double encryption is enabled. This can help assess the security posture and compliance of your data workspaces. ```sql select @@ -79,4 +93,4 @@ select encryption -> 'DoubleEncryptionEnabled' as double_encryption_enabled from azure_synapse_workspace; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_tenant.md b/docs/tables/azure_tenant.md index 12a7f8b4..c8c209b0 100644 --- a/docs/tables/azure_tenant.md +++ b/docs/tables/azure_tenant.md @@ -1,10 +1,20 @@ -# Table: azure_tenant +--- +title: "Steampipe Table: azure_tenant - Query Azure Tenants using SQL" +description: "Allows users to query Azure Tenants for comprehensive data on the tenant's details, including tenant ID, domains, and display name." +--- -A dedicated and trusted instance of Azure AD that's automatically created when your organization signs up for a Microsoft cloud service subscription, such as Microsoft Azure, Microsoft Intune, or Microsoft 365. An Azure tenant represents a single organization. +# Table: azure_tenant - Query Azure Tenants using SQL + +Azure Tenant refers to an organization's dedicated and isolated instance of Microsoft Azure that is automatically created when an organization signs up for a Microsoft cloud service subscription. Azure Tenants serve as dedicated, isolated containers for all of an organization's Azure resources, and provide a secure environment where an organization can store and manage its resources. + +## Table Usage Guide + +The 'azure_tenant' table provides insights into Azure Tenants within Microsoft Azure. As a DevOps engineer, explore tenant-specific details through this table, including tenant ID, domains, and display name. Utilize it to uncover information about tenants, such as those with specific domains, the tenant's display name, and the verification of tenant IDs. The schema presents a range of attributes of the Azure Tenant for your analysis, like the tenant ID, domains, and display name. ## Examples ### Basic info +Explore the basic details of your Azure tenants, including their names, IDs, categories, locations, and associated domains. This can be useful for gaining a high-level overview of your Azure environment, and for identifying areas for potential optimization or consolidation. ```sql select @@ -18,4 +28,4 @@ select domains from azure_tenant; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_virtual_network.md b/docs/tables/azure_virtual_network.md index 5048a65a..0e4632bf 100644 --- a/docs/tables/azure_virtual_network.md +++ b/docs/tables/azure_virtual_network.md @@ -1,10 +1,20 @@ -# Table: azure_virtual_network +--- +title: "Steampipe Table: azure_virtual_network - Query Azure Virtual Networks using SQL" +description: "Allows users to query Azure Virtual Networks." +--- -A virtual network is a network where all devices, servers, virtual machines, and data centers that are connected are done so through software and wireless technology. +# Table: azure_virtual_network - Query Azure Virtual Networks using SQL + +Azure Virtual Networks (VNet) is a fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the internet, and on-premises networks. VNet is similar to a traditional network that you'd operate in your own data center, but brings with it additional benefits of Azure's infrastructure, such as scale, availability, and isolation. + +## Table Usage Guide + +The 'azure_virtual_network' table provides insights into Virtual Networks within Azure. As a DevOps engineer, explore network-specific details through this table, including address spaces, DNS servers, and associated subnets. Utilize it to uncover information about networks, such as those with certain security rules, the associated subnets, and the verification of DNS servers. The schema presents a range of attributes of the Virtual Network for your analysis, like the network ID, creation date, associated subnets, and associated tags. ## Examples ### List of virtual networks where DDoS(Distributed Denial of Service attacks) Protection is not enabled +Explore the virtual networks that lack protection against Distributed Denial of Service (DDoS) attacks. This allows for the identification of potential network vulnerabilities and aids in strengthening security measures. ```sql select @@ -19,6 +29,7 @@ where ``` ### CIDR list for each virtual network +Explore which address blocks are associated with each virtual network in Azure. This can help you understand the network structure and manage IP address allocation efficiently. ```sql select @@ -29,6 +40,7 @@ from ``` ### List VPCs with public CIDR blocks +Determine the areas in which Azure Virtual Networks are configured with public CIDR blocks, allowing you to assess potential exposure to the internet and take necessary security measures. ```sql select @@ -47,6 +59,7 @@ where ### Subnet details associated with the virtual network +Explore the configuration of your virtual network to understand the details of associated subnets. This can help in managing network policies, service endpoints, and routing tables efficiently. ```sql select @@ -60,4 +73,4 @@ select from azure_virtual_network cross join jsonb_array_elements(subnets) as subnet; -``` +``` \ No newline at end of file diff --git a/docs/tables/azure_virtual_network_gateway.md b/docs/tables/azure_virtual_network_gateway.md index 19f3ced8..f52b5f71 100644 --- a/docs/tables/azure_virtual_network_gateway.md +++ b/docs/tables/azure_virtual_network_gateway.md @@ -1,10 +1,20 @@ -# Table: azure_virtual_network_gateway +--- +title: "Steampipe Table: azure_virtual_network_gateway - Query Azure Virtual Network Gateways using SQL" +description: "Allows users to query Azure Virtual Network Gateways" +--- -A virtual network gateway is used to establish secure, cross-premises connectivity. +# Table: azure_virtual_network_gateway - Query Azure Virtual Network Gateways using SQL + +Azure Virtual Network Gateway is a component that provides a point-to-point network connection from an Azure virtual network to an on-premises location over the public internet. It can also be used to send encrypted traffic between an Azure virtual network and an on-premises location over a VPN tunnel, or to route traffic between virtual networks. + +## Table Usage Guide + +The 'azure_virtual_network_gateway' table provides insights into Virtual Network Gateways within Azure. As a DevOps engineer, explore gateway-specific details through this table, including gateway type, VPN type, and associated metadata. Utilize it to uncover information about gateways, such as their active-active status, the private IP allocated to the gateway, and the verification of gateway SKU. The schema presents a range of attributes of the Virtual Network Gateway for your analysis, like the gateway name, resource group, subscription ID, and associated tags. ## Examples ### Basic info +Explore the configuration of your Azure Virtual Network Gateway to gain insights into settings such as BGP status and regional distribution. This can be useful in assessing network performance and identifying areas for optimization. ```sql select @@ -18,6 +28,7 @@ from ``` ### List network gateways with no connections +Determine the areas in which network gateways are not connected in your Azure virtual network. This can help identify potential network vulnerabilities or inefficiencies. ```sql select @@ -30,4 +41,4 @@ from azure_virtual_network_gateway where gateway_connections is null; -``` +``` \ No newline at end of file diff --git a/go.mod b/go.mod index 17fde63a..ed066abc 100644 --- a/go.mod +++ b/go.mod @@ -4,6 +4,7 @@ go 1.21 require ( github.com/Azure/azure-sdk-for-go v58.0.0+incompatible + github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1 github.com/Azure/azure-sdk-for-go/sdk/data/aztables v1.0.1 github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/recoveryservices/armrecoveryservicesbackup/v3 v3.0.0 github.com/Azure/azure-storage-blob-go v0.12.0 @@ -13,18 +14,17 @@ require ( github.com/Azure/go-autorest/autorest/date v0.3.0 github.com/tombuildsstuff/giovanni v0.15.1 github.com/turbot/go-kit v0.8.0-rc.0 - github.com/turbot/steampipe-plugin-sdk/v5 v5.6.2 + github.com/turbot/steampipe-plugin-sdk/v5 v5.7.0 ) require ( - cloud.google.com/go v0.110.4 // indirect - cloud.google.com/go/compute v1.21.0 // indirect + cloud.google.com/go v0.110.7 // indirect + cloud.google.com/go/compute v1.23.0 // indirect cloud.google.com/go/compute/metadata v0.2.3 // indirect cloud.google.com/go/iam v1.1.1 // indirect cloud.google.com/go/storage v1.30.1 // indirect github.com/Azure/azure-pipeline-go v0.2.3 // indirect github.com/Azure/azure-sdk-for-go/sdk/azcore v1.7.1 // indirect - github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.3.1 // indirect github.com/Azure/azure-sdk-for-go/sdk/internal v1.3.0 // indirect github.com/Azure/go-autorest v14.2.0+incompatible // indirect github.com/Azure/go-autorest/autorest/adal v0.9.10 // indirect @@ -33,7 +33,6 @@ require ( github.com/Azure/go-autorest/logger v0.2.0 // indirect github.com/Azure/go-autorest/tracing v0.6.0 // indirect github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1 // indirect - github.com/XiaoMi/pegasus-go-client v0.0.0-20210427083443-f3b6b08bc4c2 // indirect github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d // indirect github.com/agext/levenshtein v1.2.2 // indirect github.com/allegro/bigcache/v3 v3.1.0 // indirect @@ -41,33 +40,33 @@ require ( github.com/aws/aws-sdk-go v1.44.122 // indirect github.com/beorn7/perks v1.0.1 // indirect github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d // indirect - github.com/bradfitz/gomemcache v0.0.0-20221031212613-62deef7fc822 // indirect github.com/btubbs/datetime v0.1.1 // indirect github.com/cenkalti/backoff/v4 v4.2.1 // indirect github.com/cespare/xxhash/v2 v2.2.0 // indirect github.com/danwakefield/fnmatch v0.0.0-20160403171240-cbb64ac3d964 // indirect github.com/davecgh/go-spew v1.1.1 // indirect github.com/dgraph-io/ristretto v0.1.1 // indirect - github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f // indirect github.com/dimchansky/utfbom v1.1.1 // indirect github.com/dustin/go-humanize v1.0.0 // indirect - github.com/eko/gocache/v3 v3.1.2 // indirect + github.com/eko/gocache/lib/v4 v4.1.5 // indirect + github.com/eko/gocache/store/bigcache/v4 v4.2.1 // indirect + github.com/eko/gocache/store/ristretto/v4 v4.2.1 // indirect github.com/fatih/color v1.15.0 // indirect github.com/form3tech-oss/jwt-go v3.2.2+incompatible // indirect github.com/fsnotify/fsnotify v1.6.0 // indirect github.com/gertd/go-pluralize v0.2.1 // indirect github.com/ghodss/yaml v1.0.0 // indirect - github.com/go-logr/logr v1.2.4 // indirect + github.com/go-logr/logr v1.3.0 // indirect github.com/go-logr/stdr v1.2.2 // indirect - github.com/go-redis/redis/v8 v8.11.5 // indirect github.com/gofrs/uuid v4.0.0+incompatible // indirect github.com/golang-jwt/jwt/v5 v5.0.0 // indirect - github.com/golang/glog v1.1.0 // indirect + github.com/golang/glog v1.1.2 // indirect github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect + github.com/golang/mock v1.6.0 // indirect github.com/golang/protobuf v1.5.3 // indirect - github.com/google/go-cmp v0.5.9 // indirect + github.com/google/go-cmp v0.6.0 // indirect github.com/google/s2a-go v0.1.4 // indirect - github.com/google/uuid v1.3.0 // indirect + github.com/google/uuid v1.3.1 // indirect github.com/googleapis/enterprise-certificate-proxy v0.2.3 // indirect github.com/googleapis/gax-go/v2 v2.11.0 // indirect github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 // indirect @@ -77,7 +76,7 @@ require ( github.com/hashicorp/go-plugin v1.5.2 // indirect github.com/hashicorp/go-safetemp v1.0.0 // indirect github.com/hashicorp/go-version v1.6.0 // indirect - github.com/hashicorp/hcl/v2 v2.18.0 // indirect + github.com/hashicorp/hcl/v2 v2.19.1 // indirect github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d // indirect github.com/iancoleman/strcase v0.3.0 // indirect github.com/jmespath/go-jmespath v0.4.0 // indirect @@ -94,7 +93,6 @@ require ( github.com/mitchellh/mapstructure v1.5.0 // indirect github.com/oklog/run v1.0.0 // indirect github.com/olekukonko/tablewriter v0.0.5 // indirect - github.com/pegasus-kv/thrift v0.13.0 // indirect github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 // indirect github.com/pkg/errors v0.9.1 // indirect github.com/pmezard/go-difflib v1.0.0 // indirect @@ -104,44 +102,38 @@ require ( github.com/prometheus/procfs v0.8.0 // indirect github.com/rivo/uniseg v0.2.0 // indirect github.com/sethvargo/go-retry v0.2.4 // indirect - github.com/sirupsen/logrus v1.9.0 // indirect - github.com/spf13/cast v1.5.0 // indirect github.com/stevenle/topsort v0.2.0 // indirect github.com/stretchr/testify v1.8.4 // indirect github.com/tkrajina/go-reflector v0.5.6 // indirect github.com/ulikunitz/xz v0.5.10 // indirect github.com/zclconf/go-cty v1.14.0 // indirect go.opencensus.io v0.24.0 // indirect - go.opentelemetry.io/otel v1.17.0 // indirect - go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.17.0 // indirect + go.opentelemetry.io/otel v1.21.0 // indirect go.opentelemetry.io/otel/exporters/otlp/otlpmetric v0.40.0 // indirect go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v0.40.0 // indirect - go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.16.0 // indirect - go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.16.0 // indirect - go.opentelemetry.io/otel/metric v1.17.0 // indirect - go.opentelemetry.io/otel/sdk v1.17.0 // indirect + go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.21.0 // indirect + go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.21.0 // indirect + go.opentelemetry.io/otel/metric v1.21.0 // indirect + go.opentelemetry.io/otel/sdk v1.21.0 // indirect go.opentelemetry.io/otel/sdk/metric v0.40.0 // indirect - go.opentelemetry.io/otel/trace v1.17.0 // indirect + go.opentelemetry.io/otel/trace v1.21.0 // indirect go.opentelemetry.io/proto/otlp v1.0.0 // indirect - golang.org/x/crypto v0.12.0 // indirect + golang.org/x/crypto v0.14.0 // indirect golang.org/x/exp v0.0.0-20230522175609-2e198f4a06a1 // indirect - golang.org/x/net v0.14.0 // indirect - golang.org/x/oauth2 v0.10.0 // indirect - golang.org/x/sync v0.3.0 // indirect - golang.org/x/sys v0.11.0 // indirect - golang.org/x/text v0.12.0 // indirect + golang.org/x/net v0.17.0 // indirect + golang.org/x/oauth2 v0.11.0 // indirect + golang.org/x/sync v0.5.0 // indirect + golang.org/x/sys v0.14.0 // indirect + golang.org/x/text v0.13.0 // indirect golang.org/x/time v0.3.0 // indirect golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect google.golang.org/api v0.126.0 // indirect google.golang.org/appengine v1.6.7 // indirect - google.golang.org/genproto v0.0.0-20230711160842-782d3b101e98 // indirect - google.golang.org/genproto/googleapis/api v0.0.0-20230711160842-782d3b101e98 // indirect - google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98 // indirect - google.golang.org/grpc v1.58.2 // indirect + google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d // indirect + google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d // indirect + google.golang.org/genproto/googleapis/rpc v0.0.0-20230822172742-b8732ec3820d // indirect + google.golang.org/grpc v1.59.0 // indirect google.golang.org/protobuf v1.31.0 // indirect - gopkg.in/natefinch/lumberjack.v2 v2.0.0 // indirect - gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect - k8s.io/apimachinery v0.25.3 // indirect ) diff --git a/go.sum b/go.sum index 68b45d0b..c5199075 100644 --- a/go.sum +++ b/go.sum @@ -30,8 +30,8 @@ cloud.google.com/go v0.100.2/go.mod h1:4Xra9TjzAeYHrl5+oeLlzbM2k3mjVhZh4UqTZ//w9 cloud.google.com/go v0.102.0/go.mod h1:oWcCzKlqJ5zgHQt9YsaeTY9KzIvjyy0ArmiBUgpQ+nc= cloud.google.com/go v0.102.1/go.mod h1:XZ77E9qnTEnrgEOvr4xzfdX5TRo7fB4T2F4O6+34hIU= cloud.google.com/go v0.104.0/go.mod h1:OO6xxXdJyvuJPcEPBLN9BJPD+jep5G1+2U5B5gkRYtA= -cloud.google.com/go v0.110.4 h1:1JYyxKMN9hd5dR2MYTPWkGUgcoxVVhg0LKNKEo0qvmk= -cloud.google.com/go v0.110.4/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI= +cloud.google.com/go v0.110.7 h1:rJyC7nWRg2jWGZ4wSJ5nY65GTdYJkg0cd/uXb+ACI6o= +cloud.google.com/go v0.110.7/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI= cloud.google.com/go/aiplatform v1.22.0/go.mod h1:ig5Nct50bZlzV6NvKaTwmplLLddFx0YReh9WfTO5jKw= cloud.google.com/go/aiplatform v1.24.0/go.mod h1:67UUvRBKG6GTayHKV8DBv2RtR1t93YRu5B1P3x99mYY= cloud.google.com/go/analytics v0.11.0/go.mod h1:DjEWCu41bVbYcKyvlws9Er60YE4a//bK6mnhWvQeFNI= @@ -68,8 +68,8 @@ cloud.google.com/go/compute v1.6.0/go.mod h1:T29tfhtVbq1wvAPo0E3+7vhgmkOYeXjhFvz cloud.google.com/go/compute v1.6.1/go.mod h1:g85FgpzFvNULZ+S8AYq87axRKuf2Kh7deLqV/jJ3thU= cloud.google.com/go/compute v1.7.0/go.mod h1:435lt8av5oL9P3fv1OEzSbSUe+ybHXGMPQHHZWZxy9U= cloud.google.com/go/compute v1.10.0/go.mod h1:ER5CLbMxl90o2jtNbGSbtfOpQKR0t15FOtRsugnLrlU= -cloud.google.com/go/compute v1.21.0 h1:JNBsyXVoOoNJtTQcnEY5uYpZIbeCTYIeDe0Xh1bySMk= -cloud.google.com/go/compute v1.21.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM= +cloud.google.com/go/compute v1.23.0 h1:tP41Zoavr8ptEqaW6j+LQOnyBBhO7OkOMAGrgLopTwY= +cloud.google.com/go/compute v1.23.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM= cloud.google.com/go/compute/metadata v0.2.3 h1:mg4jlk7mCAj6xXp9UJ4fjI9VUI5rubuGBW5aJ7UnBMY= cloud.google.com/go/compute/metadata v0.2.3/go.mod h1:VAV5nSsACxMJvgaAuX6Pk2AawlZn8kiOGuCv6gTkwuA= cloud.google.com/go/containeranalysis v0.5.1/go.mod h1:1D92jd8gRR/c0fGMlymRgxWD3Qw9C1ff6/T7mLgVL8I= @@ -234,15 +234,9 @@ github.com/Azure/go-autorest/tracing v0.6.0 h1:TYi4+3m5t6K48TGI9AUdb+IzbnSxvnvUM github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU= github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1 h1:WpB/QDNLpMw72xHJc34BNNykqSOeEJDAWkhf0u12/Jk= github.com/AzureAD/microsoft-authentication-library-for-go v1.1.1/go.mod h1:wP83P5OoQ5p6ip3ScPr0BAq0BvuPAvacpEuSzyouqAI= -github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ= github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= -github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ= github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= -github.com/PuerkitoBio/purell v1.0.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= -github.com/PuerkitoBio/urlesc v0.0.0-20160726150825-5bd2802263f2/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE= -github.com/XiaoMi/pegasus-go-client v0.0.0-20210427083443-f3b6b08bc4c2 h1:pami0oPhVosjOu/qRHepRmdjD6hGILF7DBr+qQZeP10= -github.com/XiaoMi/pegasus-go-client v0.0.0-20210427083443-f3b6b08bc4c2/go.mod h1:jNIx5ykW1MroBuaTja9+VpglmaJOUzezumfhLlER3oY= github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d h1:licZJFw2RwpHMqeKTCYkitsPqHNxTmd4SNR5r94FGM8= github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d/go.mod h1:asat636LX7Bqt5lYEZ27JNDcqxfjdBQuJ/MM4CN/Lzo= github.com/agext/levenshtein v1.2.2 h1:0S/Yg6LYmFJ5stwQeRp6EeOcCbj7xiqQSdNelsXvaqE= @@ -267,13 +261,10 @@ github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM= github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw= github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d h1:xDfNPAt8lFiC1UJrqV3uuy861HCTo708pDMbjHHdCas= github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d/go.mod h1:6QX/PXZ00z/TKoufEY6K/a0k6AhaJrQKdFe6OfVXsa4= -github.com/bradfitz/gomemcache v0.0.0-20221031212613-62deef7fc822 h1:hjXJeBcAMS1WGENGqDpzvmgS43oECTx8UXq31UBu0Jw= -github.com/bradfitz/gomemcache v0.0.0-20221031212613-62deef7fc822/go.mod h1:H0wQNHz2YrLsuXOZozoeDmnHXkNCRmMW0gwFWDfEZDA= github.com/btubbs/datetime v0.1.1 h1:KuV+F9tyq/hEnezmKZNGk8dzqMVsId6EpFVrQCfA3To= github.com/btubbs/datetime v0.1.1/go.mod h1:n2BZ/2ltnRzNiz27aE3wUb2onNttQdC+WFxAoks5jJM= github.com/bufbuild/protocompile v0.4.0 h1:LbFKd2XowZvQ/kajzguUp2DC9UEIQhIq77fZZlaQsNA= github.com/bufbuild/protocompile v0.4.0/go.mod h1:3v93+mbWn/v3xzN+31nwkJfrEpAUwp+BagBSZWx+TP8= -github.com/cenkalti/backoff/v4 v4.1.0/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw= github.com/cenkalti/backoff/v4 v4.2.1 h1:y4OZtCnogmCPw98Zjyt5a6+QwPLGkiQsYW5oUqylYbM= github.com/cenkalti/backoff/v4 v4.2.1/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE= github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= @@ -296,11 +287,8 @@ github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWH github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20211001041855-01bcc9b48dfe/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= -github.com/coocood/freecache v1.2.3 h1:lcBwpZrwBZRZyLk/8EMyQVXRiFl663cCuMOrjCALeto= -github.com/coocood/freecache v1.2.3/go.mod h1:RBUWa/Cy+OHdfTGFEhEuE1pMCMX51Ncizj7rthiQ3vk= github.com/danwakefield/fnmatch v0.0.0-20160403171240-cbb64ac3d964 h1:y5HC9v93H5EPKqaS1UYVg1uYah5Xf51mBfIoWehClUQ= github.com/danwakefield/fnmatch v0.0.0-20160403171240-cbb64ac3d964/go.mod h1:Xd9hchkHSWYkEqJwUGisez3G1QY8Ryz0sdWrLPMGjLk= -github.com/davecgh/go-spew v0.0.0-20151105211317-5215b55f46b2/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= @@ -309,20 +297,19 @@ github.com/dgraph-io/ristretto v0.1.1/go.mod h1:S1GPSBCYCIhmVNfcth17y2zZtQT6wzkz github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= github.com/dgryski/go-farm v0.0.0-20190423205320-6a90982ecee2 h1:tdlZCpZ/P9DhczCTSixgIKmwPv6+wP5DGjqLYw5SUiA= github.com/dgryski/go-farm v0.0.0-20190423205320-6a90982ecee2/go.mod h1:SqUrOPUnsFjfmXRMNPybcSiG0BgUW2AuFH8PAnS2iTw= -github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f h1:lO4WD4F/rVNCu3HqELle0jiPLLBs70cWOduZpkS1E78= -github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f/go.mod h1:cuUVRXasLTGF7a8hSLbxyZXjz+1KgoB3wDUb6vlszIc= github.com/dimchansky/utfbom v1.1.0/go.mod h1:rO41eb7gLfo8SF1jd9F8HplJm1Fewwi4mQvIirEdv+8= github.com/dimchansky/utfbom v1.1.1 h1:vV6w1AhK4VMnhBno/TPVCoK9U/LP0PkLCS9tbxHdi/U= github.com/dimchansky/utfbom v1.1.1/go.mod h1:SxdoEBH5qIqFocHMyGOXVAybYJdr71b1Q/j0mACtrfE= -github.com/dnaeon/go-vcr v1.1.0 h1:ReYa/UBrRyQdant9B4fNHGoCNKw6qh6P0fsdGmZpR7c= -github.com/dnaeon/go-vcr v1.1.0/go.mod h1:M7tiix8f0r6mKKJ3Yq/kqU1OYf3MnfmBWVbPx/yU9ko= -github.com/docker/spdystream v0.0.0-20160310174837-449fdfce4d96/go.mod h1:Qh8CwZgvJUkLughtfhJv5dyTYa91l1fOUCrgjqmcifM= +github.com/dnaeon/go-vcr v1.2.0 h1:zHCHvJYTMh1N7xnV7zf1m1GPBF9Ad0Jk/whtQ1663qI= +github.com/dnaeon/go-vcr v1.2.0/go.mod h1:R4UdLID7HZT3taECzJs4YgbbH6PIGXB6W/sc5OLb6RQ= github.com/dustin/go-humanize v1.0.0 h1:VSnTsYCnlFHaM2/igO1h6X3HA71jcobQuxemgkq4zYo= github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= -github.com/eko/gocache/v3 v3.1.2 h1:tBAn5kBScEmRXWHJl0iJgJU7TsMeOjySwHDZ/92riqg= -github.com/eko/gocache/v3 v3.1.2/go.mod h1:92prWCVTLxRkRlZuxDkLkwwUfitZ60zKNi6kn3qiDNU= -github.com/elazarl/goproxy v0.0.0-20170405201442-c4fc26588b6e/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc= -github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= +github.com/eko/gocache/lib/v4 v4.1.5 h1:CeMQmdIzwBKKLRjk3FCDXzNFsQTyqJ01JLI7Ib0C9r8= +github.com/eko/gocache/lib/v4 v4.1.5/go.mod h1:XaNfCwW8KYW1bRZ/KoHA1TugnnkMz0/gT51NDIu7LSY= +github.com/eko/gocache/store/bigcache/v4 v4.2.1 h1:xf9R5HZqmrfT4+NzlJPQJQUWftfWW06FHbjz4IEjE08= +github.com/eko/gocache/store/bigcache/v4 v4.2.1/go.mod h1:Q9+hxUE+XUVGSRGP1tqW8sPHcZ50PfyBVh9VKh0OjrA= +github.com/eko/gocache/store/ristretto/v4 v4.2.1 h1:xB5E1LP1gh8yUV1G3KVRSL4T0OTnxp4OixuTljn2848= +github.com/eko/gocache/store/ristretto/v4 v4.2.1/go.mod h1:KyshDyWQqfSVrg2rH06fFQZTj6vG2fxlY7oAW9oxNHY= github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98= @@ -333,23 +320,16 @@ github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.m github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0= github.com/envoyproxy/go-control-plane v0.10.2-0.20220325020618-49ff273808a1/go.mod h1:KJwIaB5Mv44NWtYuAOFCVOjcI94vtpEz2JU/D2v6IjE= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= -github.com/evanphx/json-patch v4.2.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4= github.com/fatih/color v1.13.0/go.mod h1:kLAiJbzzSOZDVNGyDpeOxJ47H46qBXwg5ILebYFFOfk= github.com/fatih/color v1.15.0 h1:kOqh6YHBtK8aywxGerMG2Eq3H6Qgoqeo13Bk2Mv/nBs= github.com/fatih/color v1.15.0/go.mod h1:0h5ZqXfHYED7Bhv2ZJamyIOUej9KtShiJESRwBDUSsw= github.com/form3tech-oss/jwt-go v3.2.2+incompatible h1:TcekIExNqud5crz4xD2pavyTgWiPvpYe4Xau31I0PRk= github.com/form3tech-oss/jwt-go v3.2.2+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k= -github.com/fortytw2/leaktest v1.3.0 h1:u8491cBMTQ8ft8aeV+adlcytMZylmA5nnwwkRZjI8vw= -github.com/fortytw2/leaktest v1.3.0/go.mod h1:jDsjWgpAGjm2CA7WthBh/CdZYEPF31XHquHwclZch5g= -github.com/frankban/quicktest v1.14.3 h1:FJKSZTDHjyhriyC81FLQ0LY93eSai0ZyR/ZIkd3ZUKE= -github.com/frankban/quicktest v1.14.3/go.mod h1:mgiwOwqx65TmIk1wJ6Q7wvnVMocbUorkibMOrVTHZps= -github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo= github.com/fsnotify/fsnotify v1.6.0 h1:n+5WquG0fcWoWp6xPWfHdbskMCQaFnG6PfBrh1Ky4HY= github.com/fsnotify/fsnotify v1.6.0/go.mod h1:sl3t1tCWJFWoRz9R8WJCbQihKKwmorjAbSClcnxKAGw= github.com/gertd/go-pluralize v0.2.1 h1:M3uASbVjMnTsPb0PNqg+E/24Vwigyo/tvyMTtAlLgiA= github.com/gertd/go-pluralize v0.2.1/go.mod h1:rbYaKDbsXxmRfr8uygAEKhOWsjyrrqrkHVpZvoOp8zk= -github.com/ghodss/yaml v0.0.0-20150909031657-73d445a93680/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= github.com/ghodss/yaml v1.0.0 h1:wQHKEahhL6wmXdzwWG11gIVCkOv05bNOh+Rxn0yngAk= github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= @@ -363,32 +343,22 @@ github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9 github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A= github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs= -github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas= github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A= -github.com/go-logr/logr v1.2.4 h1:g01GSCwiDw2xSZfjJ2/T9M+S6pFdcNtFYsp+Y43HYDQ= -github.com/go-logr/logr v1.2.4/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A= +github.com/go-logr/logr v1.3.0 h1:2y3SDp0ZXuc6/cjLSZ+Q3ir+QB9T/iG5yYRXqsagWSY= +github.com/go-logr/logr v1.3.0/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY= github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag= github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE= -github.com/go-openapi/jsonpointer v0.0.0-20160704185906-46af16f9f7b1/go.mod h1:+35s3my2LFTysnkMfxsJBAMHj/DoqoB9knIWoYG/Vk0= -github.com/go-openapi/jsonreference v0.0.0-20160704190145-13c6e3589ad9/go.mod h1:W3Z9FmVs9qj+KR4zFKmDPGiLdk1D9Rlm7cyMvf57TTg= -github.com/go-openapi/spec v0.0.0-20160808142527-6aced65f8501/go.mod h1:J8+jY1nAiCcj+friV/PDoE1/3eeccG9LYBs0tYvLOWc= -github.com/go-openapi/swag v0.0.0-20160704191624-1d0bd113de87/go.mod h1:DXUve3Dpr1UfpPtxFw+EFuQ41HhCWZfha5jSVRG7C7I= -github.com/go-redis/redis/v8 v8.11.5 h1:AcZZR7igkdvfVmQTPnu9WE37LRrO/YrBH5zWyjDC0oI= -github.com/go-redis/redis/v8 v8.11.5/go.mod h1:gREzHqY1hg6oD9ngVRbLStwAWKhA0FEgq8Jd4h5lpwo= github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY= github.com/go-test/deep v1.0.3 h1:ZrJSEWsXzPOxaZnFteGEfooLba+ju3FYIbOrS+rQd68= github.com/go-test/deep v1.0.3/go.mod h1:wGDj63lr65AM2AQyKZd/NYHGb0R+1RLqB8NKt3aSFNA= github.com/gofrs/uuid v4.0.0+incompatible h1:1SD/1F5pU8p29ybwgQSwpQk+mwdRrXCYuPhW6m+TnJw= github.com/gofrs/uuid v4.0.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM= github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= -github.com/gogo/protobuf v1.2.2-0.20190723190241-65acae22fc9d/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= -github.com/golang-jwt/jwt v3.2.1+incompatible h1:73Z+4BJcrTC+KczS6WvTPvRGOp1WmfEP4Q1lOd9Z/+c= github.com/golang-jwt/jwt/v5 v5.0.0 h1:1n1XNM9hk7O9mnQoNBGolZvzebBQ7p93ULHRc28XJUE= github.com/golang-jwt/jwt/v5 v5.0.0/go.mod h1:pqrtFR0X4osieyHYxtmOUWsAWrfe1Q5UVIyoH402zdk= github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= -github.com/golang/glog v1.1.0 h1:/d3pCKDPWNnvIWe0vVUpNP32qc8U3PDVxySP/y360qE= -github.com/golang/glog v1.1.0/go.mod h1:pfYeQZ3JWZoXTV5sFc986z3HTpwQs9At6P4ImfuP3NQ= -github.com/golang/groupcache v0.0.0-20160516000752-02826c3e7903/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/glog v1.1.2 h1:DVjP2PbBOzHyzA+dn3WhHIq4NdVu3Q+pvivFICf/7fo= +github.com/golang/glog v1.1.2/go.mod h1:zR+okUeTbrL6EL3xHUDxZuEtGv04p5shwip1+mL/rLQ= github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= @@ -404,7 +374,6 @@ github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71 github.com/golang/mock v1.5.0/go.mod h1:CWnOUgYIOo4TcNZ0wHX3YZCqsaM1I1Jvs6v3mP3KVu8= github.com/golang/mock v1.6.0 h1:ErTB+efbowRARo13NNdxyJji2egdxLGQhRaY+DUumQc= github.com/golang/mock v1.6.0/go.mod h1:p6yTPP+5HYm5mzsMV8JkE6ZKdX+/wYM6Hr+LicevLPs= -github.com/golang/protobuf v0.0.0-20161109072736-4bd1920723d7/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= @@ -441,9 +410,9 @@ github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/ github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE= github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= -github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38= github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= -github.com/google/gofuzz v0.0.0-20161122191042-44d81051d367/go.mod h1:HP5RmnzzSNb993RKQDq4+1A4ia9nllfqcQFTQJedwGI= +github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI= +github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg= github.com/google/martian v2.1.0+incompatible h1:/CP5g8u/VJHijgedC/Legn3BAbAaWPgecwXBIDzw5no= github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs= @@ -471,8 +440,9 @@ github.com/google/s2a-go v0.1.4 h1:1kZ/sQM3srePvKs3tXAvQzo66XfcReoqFpIpIccE7Oc= github.com/google/s2a-go v0.1.4/go.mod h1:Ej+mSEMGRnqRzjc7VtF+jdBwYG5fuJfiZ8ELkjEwM0A= github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/google/uuid v1.3.0 h1:t6JiXgmwXMjEs8VusXIJk2BXHsn+wx8BZdTaoZ5fu7I= github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= +github.com/google/uuid v1.3.1 h1:KjJaJ9iWZ3jOFZIf1Lqf4laDRCasjl0BCmnEGxkdLb4= +github.com/google/uuid v1.3.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/googleapis/enterprise-certificate-proxy v0.0.0-20220520183353-fd19c99a87aa/go.mod h1:17drOmN3MwGY7t0e+Ei9b45FFGA3fBs3x36SsCg1hq8= github.com/googleapis/enterprise-certificate-proxy v0.1.0/go.mod h1:17drOmN3MwGY7t0e+Ei9b45FFGA3fBs3x36SsCg1hq8= github.com/googleapis/enterprise-certificate-proxy v0.2.0/go.mod h1:8C0jb7/mgJe/9KK8Lm7X9ctZC2t60YyIpYEI16jx0Qg= @@ -489,10 +459,7 @@ github.com/googleapis/gax-go/v2 v2.5.1/go.mod h1:h6B0KMMFNtI2ddbGJn3T3ZbwkeT6yqE github.com/googleapis/gax-go/v2 v2.6.0/go.mod h1:1mjbznJAPHFpesgE5ucqfYEscaz5kMdcIDwU/6+DDoY= github.com/googleapis/gax-go/v2 v2.11.0 h1:9V9PWXEsWnPpQhu/PeQIkS4eGzMlTLGgt80cUUI8Ki4= github.com/googleapis/gax-go/v2 v2.11.0/go.mod h1:DxmR61SGKkGLa2xigwuZIQpkCI2S5iydzRfb3peWZJI= -github.com/googleapis/gnostic v0.0.0-20170729233727-0c5108395e2d/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= github.com/googleapis/go-type-adapters v1.0.0/go.mod h1:zHW75FOG2aur7gAO2B+MLby+cLsWGBF62rFAi7WjWO4= -github.com/gopherjs/gopherjs v1.17.2 h1:fQnZVsXk8uxXIStYb0N4bGk7jeyTalG/wsZjQ25dO0g= -github.com/gopherjs/gopherjs v1.17.2/go.mod h1:pRRIvn/QzFLrKfvEz3qUuEhtE/zLCWfreZ6J5gM2i+k= github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw= github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 h1:YBftPWNWd4WwGqtY2yeZL2ef8rHAxPBD8KFhJpmcqms= github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0/go.mod h1:YN5jB8ie0yfIUg6VvR9Kz84aCaG7AsGZnLjhHbUqwPg= @@ -516,11 +483,10 @@ github.com/hashicorp/go-version v1.6.0 h1:feTTfFNnjP967rlCxM/I9g701jU+RN74YKx2mO github.com/hashicorp/go-version v1.6.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA= github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= -github.com/hashicorp/hcl/v2 v2.18.0 h1:wYnG7Lt31t2zYkcquwgKo6MWXzRUDIeIVU5naZwHLl8= -github.com/hashicorp/hcl/v2 v2.18.0/go.mod h1:ThLC89FV4p9MPW804KVbe/cEXoQ8NZEh+JtMeeGErHE= +github.com/hashicorp/hcl/v2 v2.19.1 h1://i05Jqznmb2EXqa39Nsvyan2o5XyMowW5fnCKW5RPI= +github.com/hashicorp/hcl/v2 v2.19.1/go.mod h1:ThLC89FV4p9MPW804KVbe/cEXoQ8NZEh+JtMeeGErHE= github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d h1:kJCB4vdITiW1eC1vq2e6IsrXKrZit1bv/TDYFGMp4BQ= github.com/hashicorp/yamux v0.0.0-20181012175058-2f1d1f20f75d/go.mod h1:+NfK9FKeTrX5uv1uIXGdwYDTeHna2qgaIlx54MXqjAM= -github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= github.com/iancoleman/strcase v0.3.0 h1:nTXanmYxhfFAMjZL34Ov6gkzEsSJZ5DbhxWjvSASxEI= github.com/iancoleman/strcase v0.3.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho= github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= @@ -532,19 +498,14 @@ github.com/jmespath/go-jmespath v0.4.0/go.mod h1:T8mJZnbsbmF+m6zOOFylbeCJqk5+pHW github.com/jmespath/go-jmespath/internal/testify v1.5.1 h1:shLQSRRSCCPj3f2gpwzGwWFoC7ycTf1rcQZHOlsJ6N8= github.com/jmespath/go-jmespath/internal/testify v1.5.1/go.mod h1:L3OGu8Wl2/fWfCI6z80xFu9LTZmf1ZRjMHUOPmWr69U= github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4= -github.com/json-iterator/go v0.0.0-20180612202835-f2b4162afba3/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= -github.com/json-iterator/go v1.1.8/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo= github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU= github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk= -github.com/jtolds/gls v4.20.0+incompatible h1:xdiiI2gbIgH/gLH7ADydsJ1uDOEzR8yvV7C0MuV77Wo= -github.com/jtolds/gls v4.20.0+incompatible/go.mod h1:QJZ7F/aHp+rZTRtaJ1ow/lLfFfVYBRgL+9YlvaHOwJU= github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w= github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM= -github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00= github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/klauspost/compress v1.15.11 h1:Lcadnb3RKGin4FYM/orgq0qde+nc15E5Cbqg4B9Sx9c= github.com/klauspost/compress v1.15.11/go.mod h1:QPwzmACJjUTFsnSHH934V6woptycfrDDJnH7hvFVbGM= @@ -560,7 +521,6 @@ github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE= github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc= github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw= -github.com/mailru/easyjson v0.0.0-20160728113105-d5b7844b561a/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU= github.com/mattn/go-colorable v0.1.9/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= github.com/mattn/go-colorable v0.1.12/go.mod h1:u5H1YNBxpqRaxsYJYSkiCWKzEfiAb1Gb520KVy5xxl4= @@ -591,41 +551,22 @@ github.com/mitchellh/mapstructure v1.5.0 h1:jeMsZIYE/09sWLaz43PL7Gy6RuMjD2eJVyua github.com/mitchellh/mapstructure v1.5.0/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo= github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= -github.com/modern-go/reflect2 v0.0.0-20180320133207-05fbef0ca5da/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk= -github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= -github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw= github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno= -github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE= -github.com/nxadm/tail v1.4.8/go.mod h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU= github.com/oklog/run v1.0.0 h1:Ru7dDtJNOyC66gQ5dQmaCa0qIsAUFY3sFpK1Xk8igrw= github.com/oklog/run v1.0.0/go.mod h1:dlhp/R75TPv97u0XWUtDeV/lRKWPKSdTuV0TZvrmrQA= github.com/olekukonko/tablewriter v0.0.5 h1:P2Ga83D34wi1o9J6Wh1mRuqd4mF/x/lgBS7N7AbDhec= github.com/olekukonko/tablewriter v0.0.5/go.mod h1:hPp6KlRPjbx+hW8ykQs1w3UBbZlj6HuIJcUGPhkA7kY= -github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.10.1/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE= -github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU= -github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA= -github.com/onsi/gomega v1.7.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY= -github.com/onsi/gomega v1.20.1 h1:PA/3qinGoukvymdIDV8pii6tiZgC8kbmJO6Z5+b002Q= -github.com/onsi/gomega v1.20.1/go.mod h1:DtrZpjmvpn2mPm4YWQa0/ALMDj9v4YxLgojwPeREyVo= -github.com/patrickmn/go-cache v2.1.0+incompatible h1:HRMgzkcYKYpi3C8ajMPV8OFXaaRUnok+kx1WdO15EQc= -github.com/patrickmn/go-cache v2.1.0+incompatible/go.mod h1:3Qf8kWWT7OJRJbdiICTKqZju1ZixQ/KpMGzzAfe6+WQ= -github.com/pegasus-kv/thrift v0.13.0 h1:4ESwaNoHImfbHa9RUGJiJZ4hrxorihZHk5aarYwY8d4= -github.com/pegasus-kv/thrift v0.13.0/go.mod h1:Gl9NT/WHG6ABm6NsrbfE8LiJN0sAyneCrvB4qN4NPqQ= github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 h1:KoWmjvw+nsYOo29YJK9vDA65RGE3NrOnUtO7a+RF9HU= github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8/go.mod h1:HKlIX3XHQyzLZPlr7++PzdhaXEj94dEiJgZDTsxEqUI= github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= -github.com/pmezard/go-difflib v0.0.0-20151028094244-d8ed2627bdf0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw= @@ -667,24 +608,13 @@ github.com/sethvargo/go-retry v0.2.4/go.mod h1:1afjQuvh7s4gflMObvjLPaWgluLLyhA1w github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo= github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE= github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88= -github.com/sirupsen/logrus v1.9.0 h1:trlNQbNUG3OdDrDil03MCb1H2o9nJ1x4/5LYw7byDE0= -github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ= -github.com/smartystreets/assertions v1.13.0 h1:Dx1kYM01xsSqKPno3aqLnrwac2LetPvN23diwyr69Qs= -github.com/smartystreets/assertions v1.13.0/go.mod h1:wDmR7qL282YbGsPy6H/yAsesrxfxaaSlJazyFLYVFx8= -github.com/smartystreets/goconvey v1.7.2 h1:9RBaZCeXEQ3UselpuwUQHltGVXvdwm6cv1hgR6gDIPg= -github.com/smartystreets/goconvey v1.7.2/go.mod h1:Vw0tHAZW6lzCRk3xgdin6fKYcG+G3Pg9vgXWeJpQFMM= github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA= -github.com/spf13/cast v1.5.0 h1:rj3WzYc11XZaIZMPKmwP96zkFEnnAmV8s6XbB2aY32w= -github.com/spf13/cast v1.5.0/go.mod h1:SpXXQ5YoyJw6s3/6cMTQuxvgRl3PCJiyaX9p6b155UU= -github.com/spf13/pflag v0.0.0-20170130214245-9ff6c6923cff/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4= -github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= github.com/stevenle/topsort v0.2.0 h1:LLWgtp34HPX6/RBDRS0kElVxGOTzGBLI1lSAa5Lb46k= github.com/stevenle/topsort v0.2.0/go.mod h1:ck2WG2/ZrOr6dLApQ/5Xrqy5wv3T0qhKYWE7r9tkibc= github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw= github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo= -github.com/stretchr/testify v0.0.0-20151208002404-e3a8ff8ce365/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI= github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4= @@ -703,8 +633,8 @@ github.com/tombuildsstuff/giovanni v0.15.1 h1:CVRaLOJ7C/eercCrKIsarfJ4SZoGMdBL9Q github.com/tombuildsstuff/giovanni v0.15.1/go.mod h1:0TZugJPEtqzPlMpuJHYfXY6Dq2uLPrXf98D2XQSxNbA= github.com/turbot/go-kit v0.8.0-rc.0 h1:Vj1w5TmZWwdSwBTcOq6FKVlQQ+XwCd27BZVPZ9m1hT0= github.com/turbot/go-kit v0.8.0-rc.0/go.mod h1:JkVKhR5XHK86aXY4WzB9Lr0jdnrsafjVh4yJA8ZS3Ck= -github.com/turbot/steampipe-plugin-sdk/v5 v5.6.2 h1:B2gkMJK1m5GYQfmxjO9VREAwdUsGxf48vOzKouoyFIM= -github.com/turbot/steampipe-plugin-sdk/v5 v5.6.2/go.mod h1:u2ubq9W5/5y6wG481LyulS7vuMOTRPmXAUfGLoVmwnA= +github.com/turbot/steampipe-plugin-sdk/v5 v5.7.0 h1:37Iai2lrdvphgEb4D6KjmIiCgVrx8pqeSsikJ3IuTDI= +github.com/turbot/steampipe-plugin-sdk/v5 v5.7.0/go.mod h1:26k5H4Xr9Czen0DnyhJI3up5S4T4MS7gt4mCdBj5i9w= github.com/ulikunitz/xz v0.5.10 h1:t92gobL9l3HE202wg3rlk19F6X+JOxl9BBrCCMYEYd8= github.com/ulikunitz/xz v0.5.10/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14= github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= @@ -726,31 +656,29 @@ go.opencensus.io v0.22.5/go.mod h1:5pWMHQbX5EPX2/62yrJeAkowc+lfs/XD7Uxpq3pI6kk= go.opencensus.io v0.23.0/go.mod h1:XItmlyltB5F7CS4xOC1DcqMoFqwtC6OG2xF7mCv7P7E= go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0= go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo= -go.opentelemetry.io/otel v1.17.0 h1:MW+phZ6WZ5/uk2nd93ANk/6yJ+dVrvNWUjGhnnFU5jM= -go.opentelemetry.io/otel v1.17.0/go.mod h1:I2vmBGtFaODIVMBSTPVDlJSzBDNf93k60E6Ft0nyjo0= -go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.17.0 h1:eU0ffpYuEY7eQ75K+nKr9CI5KcY8h+GPk/9DDlEO1NI= -go.opentelemetry.io/otel/exporters/otlp/internal/retry v1.17.0/go.mod h1:9P5RK5JS2sjKepuCkqFwPp3etwV/57E0eigLw18Mn1k= +go.opentelemetry.io/otel v1.21.0 h1:hzLeKBZEL7Okw2mGzZ0cc4k/A7Fta0uoPgaJCr8fsFc= +go.opentelemetry.io/otel v1.21.0/go.mod h1:QZzNPQPm1zLX4gZK4cMi+71eaorMSGT3A4znnUvNNEo= go.opentelemetry.io/otel/exporters/otlp/otlpmetric v0.40.0 h1:MZbjiZeMmn5wFMORhozpouGKDxj9POHTuU5UA8msBQk= go.opentelemetry.io/otel/exporters/otlp/otlpmetric v0.40.0/go.mod h1:C7tOYVCJmrDTCwxNny0MuUtnDIR3032vFHYke0F2ZrU= go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v0.40.0 h1:q3FNPi8FLQVjLlmV+WWHQfH9ZCCtQIS0O/+dn1+4cJ4= go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v0.40.0/go.mod h1:rmx4n0uSIAkKBeQYkygcv9dENAlL2/tv3OSq68h1JAo= -go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.16.0 h1:cbsD4cUcviQGXdw8+bo5x2wazq10SKz8hEbtCRPcU78= -go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.16.0/go.mod h1:JgXSGah17croqhJfhByOLVY719k1emAXC8MVhCIJlRs= -go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.16.0 h1:TVQp/bboR4mhZSav+MdgXB8FaRho1RC8UwVn3T0vjVc= -go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.16.0/go.mod h1:I33vtIe0sR96wfrUcilIzLoA3mLHhRmz9S9Te0S3gDo= -go.opentelemetry.io/otel/metric v1.17.0 h1:iG6LGVz5Gh+IuO0jmgvpTB6YVrCGngi8QGm+pMd8Pdc= -go.opentelemetry.io/otel/metric v1.17.0/go.mod h1:h4skoxdZI17AxwITdmdZjjYJQH5nzijUUjm+wtPph5o= -go.opentelemetry.io/otel/sdk v1.17.0 h1:FLN2X66Ke/k5Sg3V623Q7h7nt3cHXaW1FOvKKrW0IpE= -go.opentelemetry.io/otel/sdk v1.17.0/go.mod h1:U87sE0f5vQB7hwUoW98pW5Rz4ZDuCFBZFNUBlSgmDFQ= +go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.21.0 h1:cl5P5/GIfFh4t6xyruOgJP5QiA1pw4fYYdv6nc6CBWw= +go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.21.0/go.mod h1:zgBdWWAu7oEEMC06MMKc5NLbA/1YDXV1sMpSqEeLQLg= +go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.21.0 h1:tIqheXEFWAZ7O8A7m+J0aPTmpJN3YQ7qetUAdkkkKpk= +go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.21.0/go.mod h1:nUeKExfxAQVbiVFn32YXpXZZHZ61Cc3s3Rn1pDBGAb0= +go.opentelemetry.io/otel/metric v1.21.0 h1:tlYWfeo+Bocx5kLEloTjbcDwBuELRrIFxwdQ36PlJu4= +go.opentelemetry.io/otel/metric v1.21.0/go.mod h1:o1p3CA8nNHW8j5yuQLdc1eeqEaPfzug24uvsyIEJRWM= +go.opentelemetry.io/otel/sdk v1.21.0 h1:FTt8qirL1EysG6sTQRZ5TokkU8d0ugCj8htOgThZXQ8= +go.opentelemetry.io/otel/sdk v1.21.0/go.mod h1:Nna6Yv7PWTdgJHVRD9hIYywQBRx7pbox6nwBnZIxl/E= go.opentelemetry.io/otel/sdk/metric v0.40.0 h1:qOM29YaGcxipWjL5FzpyZDpCYrDREvX0mVlmXdOjCHU= go.opentelemetry.io/otel/sdk/metric v0.40.0/go.mod h1:dWxHtdzdJvg+ciJUKLTKwrMe5P6Dv3FyDbh8UkfgkVs= -go.opentelemetry.io/otel/trace v1.17.0 h1:/SWhSRHmDPOImIAetP1QAeMnZYiQXrTy4fMMYOdSKWQ= -go.opentelemetry.io/otel/trace v1.17.0/go.mod h1:I/4vKTgFclIsXRVucpH25X0mpFSczM7aHeaz0ZBLWjY= +go.opentelemetry.io/otel/trace v1.21.0 h1:WD9i5gzvoUPuXIXH24ZNBudiarZDKuekPqi/E8fpfLc= +go.opentelemetry.io/otel/trace v1.21.0/go.mod h1:LGbsEB0f9LGjN+OZaQQ26sohbOmiMR+BaslueVtS/qQ= go.opentelemetry.io/proto/otlp v0.7.0/go.mod h1:PqfVotwruBrMGOCsRd/89rSnXhoiJIqeYNgFYFoEGnI= go.opentelemetry.io/proto/otlp v1.0.0 h1:T0TX0tmXU8a3CbNXzEKGeU5mIVOdf0oykP+u2lIVU/I= go.opentelemetry.io/proto/otlp v1.0.0/go.mod h1:Sy6pihPLfYHkr3NkUbEhGHFhINUSI/v80hjKIs5JXpM= -go.uber.org/goleak v1.2.1 h1:NBol2c7O1ZokfZ0LEU9K6Whx/KnwvepVetCUhtKja4A= -go.uber.org/goleak v1.2.1/go.mod h1:qlT2yGI9QafXHhZZLxlSuNsMw3FFLxBr+tBRlmO1xH4= +go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto= +go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE= golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= @@ -762,8 +690,8 @@ golang.org/x/crypto v0.0.0-20201016220609-9e8e0b390897/go.mod h1:LzIPMQfyMNhhGPh golang.org/x/crypto v0.0.0-20201221181555-eec23a3978ad/go.mod h1:jdWPYTVW3xRLrWPugEBEK3UY2ZEsg3UU495nc5E+M+I= golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= golang.org/x/crypto v0.0.0-20220314234659-1baeb1ce4c0b/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= -golang.org/x/crypto v0.12.0 h1:tFM/ta59kqch6LlvYnPa0yx5a83cL2nHflFhYKvv9Yk= -golang.org/x/crypto v0.12.0/go.mod h1:NF0Gs7EO5K4qLn+Ylc+fih8BSTeIjAP05siRnAh98yw= +golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= +golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -802,10 +730,8 @@ golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= -golang.org/x/net v0.0.0-20170114055629-f2499483f923/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -818,8 +744,6 @@ golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLL golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= -golang.org/x/net v0.0.0-20191004110552-13f9640d40b9/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= -golang.org/x/net v0.0.0-20191105084925-a882066a44e0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191112182307-2180aed22343/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= @@ -858,8 +782,8 @@ golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug golang.org/x/net v0.0.0-20220909164309-bea034e7d591/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= golang.org/x/net v0.0.0-20221014081412-f15817d10f9b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco= -golang.org/x/net v0.14.0 h1:BONx9s002vGdD9umnlX1Po8vOZmrgH34qlHcD1MfK14= -golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI= +golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= +golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -885,8 +809,8 @@ golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri golang.org/x/oauth2 v0.0.0-20220909003341-f21342109be1/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg= golang.org/x/oauth2 v0.0.0-20221014153046-6fdb5e3db783/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg= golang.org/x/oauth2 v0.1.0/go.mod h1:G9FE4dLTsbXUu90h/Pf85g4w1D+SSAgR+q46nJZ8M4A= -golang.org/x/oauth2 v0.10.0 h1:zHCpF2Khkwy4mMB4bv0U37YtJdTGW8jI0glAApi0Kh8= -golang.org/x/oauth2 v0.10.0/go.mod h1:kTpgurOux7LqtuxjuyZa4Gj2gdezIt/jQtGnNFfypQI= +golang.org/x/oauth2 v0.11.0 h1:vPL4xzxBM4niKCW6g9whtaWVXTJf1U5e4aZxxFx/gbU= +golang.org/x/oauth2 v0.11.0/go.mod h1:LdF7O/8bLR/qWK9DrpXmbHLTouvRHK0SgJl0GmDBchk= golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= @@ -901,12 +825,10 @@ golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJ golang.org/x/sync v0.0.0-20220601150217-0de741cfad7f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20220929204114-8fcdb60fdcc0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.3.0 h1:ftCYgMx6zT/asHUrPw8BLLscYtGznsLAnjq5RH9P66E= -golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= -golang.org/x/sys v0.0.0-20170830134202-bb24a47a89ea/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= +golang.org/x/sync v0.5.0 h1:60k92dhOjHxJkrqnwsfl8KuaHbn/5dl0lUPUklKo3qE= +golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -917,9 +839,7 @@ golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190826190057-c7b8b68b1456/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20191010194322-b09406accb47/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191112214154-59a1497f0cea/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -982,7 +902,6 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc golang.org/x/sys v0.0.0-20220610221304-9f5ed59c137d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220615213510-4f61da869c0c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220624220833-87e55d714810/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= @@ -990,13 +909,12 @@ golang.org/x/sys v0.0.0-20220908164124-27713097b956/go.mod h1:oPkhp1MJrh7nUepCBc golang.org/x/sys v0.0.0-20221010170243-090e33056c14/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.11.0 h1:eG7RXZHdqOJ1i+0lgLgCpSXAp6M3LYlAo6osgSi0xOM= -golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q= +golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= -golang.org/x/text v0.0.0-20160726164857-2910a502d2bf/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -1008,16 +926,14 @@ golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ= golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= -golang.org/x/text v0.12.0 h1:k+n5B8goJNdU7hSvEtMUz3d1Q6D/XW4COJSJR6fN0mc= -golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= +golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k= +golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4= golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20181011042414-1f849cf54d09/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= @@ -1237,12 +1153,12 @@ google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e/go.mod h1:3526vdqw google.golang.org/genproto v0.0.0-20221014173430-6e2ab493f96b/go.mod h1:1vXfmgAz9N9Jx0QA82PqRVauvCz1SGSz739p0f183jM= google.golang.org/genproto v0.0.0-20221014213838-99cd37c6964a/go.mod h1:1vXfmgAz9N9Jx0QA82PqRVauvCz1SGSz739p0f183jM= google.golang.org/genproto v0.0.0-20221025140454-527a21cfbd71/go.mod h1:9qHF0xnpdSfF6knlcsnpzUu5y+rpwgbvsyGAZPBMg4s= -google.golang.org/genproto v0.0.0-20230711160842-782d3b101e98 h1:Z0hjGZePRE0ZBWotvtrwxFNrNE9CUAGtplaDK5NNI/g= -google.golang.org/genproto v0.0.0-20230711160842-782d3b101e98/go.mod h1:S7mY02OqCJTD0E1OiQy1F72PWFB4bZJ87cAtLPYgDR0= -google.golang.org/genproto/googleapis/api v0.0.0-20230711160842-782d3b101e98 h1:FmF5cCW94Ij59cfpoLiwTgodWmm60eEV0CjlsVg2fuw= -google.golang.org/genproto/googleapis/api v0.0.0-20230711160842-782d3b101e98/go.mod h1:rsr7RhLuwsDKL7RmgDDCUc6yaGr1iqceVb5Wv6f6YvQ= -google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98 h1:bVf09lpb+OJbByTj913DRJioFFAjf/ZGxEz7MajTp2U= -google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98/go.mod h1:TUfxEVdsvPg18p6AslUXFoLdpED4oBnGwyqk3dV1XzM= +google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d h1:VBu5YqKPv6XiJ199exd8Br+Aetz+o08F+PLMnwJQHAY= +google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d/go.mod h1:yZTlhN0tQnXo3h00fuXNCxJdLdIdnVFVBaRJ5LWBbw4= +google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d h1:DoPTO70H+bcDXcd39vOqb2viZxgqeBeSGtZ55yZU4/Q= +google.golang.org/genproto/googleapis/api v0.0.0-20230822172742-b8732ec3820d/go.mod h1:KjSP20unUpOx5kyQUFa7k4OJg0qeJ7DEZflGDu2p6Bk= +google.golang.org/genproto/googleapis/rpc v0.0.0-20230822172742-b8732ec3820d h1:uvYuEyMHKNt+lT4K3bN6fGswmK8qSvcreM3BwjDh+y4= +google.golang.org/genproto/googleapis/rpc v0.0.0-20230822172742-b8732ec3820d/go.mod h1:+Bk1OCOj40wS2hwAMA+aCW9ypzm63QTBBHp6lQ3p+9M= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= @@ -1278,8 +1194,8 @@ google.golang.org/grpc v1.48.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACu google.golang.org/grpc v1.49.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= google.golang.org/grpc v1.50.0/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= google.golang.org/grpc v1.50.1/go.mod h1:ZgQEeidpAuNRZ8iRrlBKXZQP1ghovWIVhdJRyCDK+GI= -google.golang.org/grpc v1.58.2 h1:SXUpjxeVF3FKrTYQI4f4KvbGD5u2xccdYdurwowix5I= -google.golang.org/grpc v1.58.2/go.mod h1:tgX3ZQDlNJGU96V6yHh1T/JeoBQ2TXdr43YbYSsCJk0= +google.golang.org/grpc v1.59.0 h1:Z5Iec2pjwb+LEOqzpB2MR12/eKFhDPhuqW91O+4bwUk= +google.golang.org/grpc v1.59.0/go.mod h1:aUPDwccQo6OTjy7Hct4AfBPD1GptF4fyUjIkQ9YtF98= google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw= google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= @@ -1307,14 +1223,6 @@ gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntN gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q= gopkg.in/cheggaaa/pb.v1 v1.0.27/go.mod h1:V/YB90LKu/1FcN3WVnfiiE5oMCibMjukxqG/qStrOgw= gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI= -gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys= -gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw= -gopkg.in/natefinch/lumberjack.v2 v2.0.0 h1:1Lc07Kr7qY4U2YPouBjpCLxpiyxIVoxqXgkXLknAOE8= -gopkg.in/natefinch/lumberjack.v2 v2.0.0/go.mod h1:l0ndWWf7gzL7RNwBG7wST/UCcT4T24xpD6X8LsfU/+k= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 h1:uRGJdciOHaEIrze2W8Q3AKkepLTh2hOroT7a+7czfdQ= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw= -gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637 h1:yiW+nvdHb9LVqSHQBXfZCieqV4fzYhNBql77zY0ykqs= -gopkg.in/tomb.v2 v2.0.0-20161208151619-d5d1b5820637/go.mod h1:BHsqpu/nsuzkT5BpiH1EMZPLyqSMM8JbIavyFACoFNk= gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= @@ -1334,15 +1242,6 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= -k8s.io/apimachinery v0.0.0-20191123233150-4c4803ed55e3/go.mod h1:b9qmWdKlLuU9EBh+06BtLcSf/Mu89rWL33naRxs1uZg= -k8s.io/apimachinery v0.25.3 h1:7o9ium4uyUOM76t6aunP0nZuex7gDf8VGwkR5RcJnQc= -k8s.io/apimachinery v0.25.3/go.mod h1:jaF9C/iPNM1FuLl7Zuy5b9v+n35HGSh6AQ4HYRkCqwo= -k8s.io/gengo v0.0.0-20190128074634-0689ccc1d7d6/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= -k8s.io/klog v0.0.0-20181102134211-b9b56d5dfc92/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk= -k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I= -k8s.io/kube-openapi v0.0.0-20191107075043-30be4d16710a/go.mod h1:1TqjTSzOxsLGIKfj0lK8EeCP7K1iUG65v09OM0/WG5E= rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= -sigs.k8s.io/structured-merge-diff v0.0.0-20190525122527-15d366b2352e/go.mod h1:wWxsB5ozmmv/SG7nM11ayaAW51xMvak/t1r0CSlcokI= -sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o=