Resource: Violation
Details of resource Violation
JSON representation |
---|
{ "name": string, "description": string, "beginTime": string, "updateTime": string, "resolveTime": string, "category": string, "state": enum ( |
Fields | |
---|---|
name |
Identifier. Format: organizations/{organization}/locations/{location}/customers/{customer}/workloads/{workload}/violations/{violation} |
description |
Output only. Description for the Violation. e.g. OrgPolicy gcp.resourceLocations has non compliant value. |
beginTime |
Output only. Time of the event which triggered the Violation. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
updateTime |
Output only. The last time when the Violation record was updated. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
resolveTime |
Output only. Time of the event which fixed the Violation. If the violation is ACTIVE this will be empty. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
category |
Output only. Category under which this violation is mapped. e.g. Location, Service Usage, Access, Encryption, etc. |
state |
Output only. State of the violation |
nonCompliantOrgPolicy |
Output only. Immutable. Name of the OrgPolicy which was modified with non-compliant change and resulted this violation. Format: projects/{project_number}/policies/{constraint_name} folders/{folderId}/policies/{constraint_name} organizations/{organizationId}/policies/{constraint_name} |
folderId |
The folderId of the violation |
remediation |
Output only. Compliance violation remediation |
State
Violation State Values
Enums | |
---|---|
STATE_UNSPECIFIED |
Unspecified state. |
RESOLVED |
Violation is resolved. |
UNRESOLVED |
Violation is Unresolved |
EXCEPTION |
Violation is Exception |
Remediation
Represents remediation guidance to resolve compliance violation for AssuredWorkload
JSON representation |
---|
{ "instructions": { object ( |
Fields | |
---|---|
instructions |
Required. Remediation instructions to resolve violations |
compliantValues[] |
Values that can resolve the violation For example: for list org policy violations, this will either be the list of allowed or denied values |
remediationType |
Output only. Remediation type based on the type of org policy values violated |
Instructions
Instructions to remediate violation
JSON representation |
---|
{ "gcloudInstructions": { object ( |
Fields | |
---|---|
gcloudInstructions |
Remediation instructions to resolve violation via gcloud cli |
consoleInstructions |
Remediation instructions to resolve violation via cloud console |
Gcloud
Remediation instructions to resolve violation via gcloud cli
JSON representation |
---|
{ "gcloudCommands": [ string ], "steps": [ string ], "additionalLinks": [ string ] } |
Fields | |
---|---|
gcloudCommands[] |
Gcloud command to resolve violation |
steps[] |
Steps to resolve violation via gcloud cli |
additionalLinks[] |
Additional urls for more information about steps |
Console
Remediation instructions to resolve violation via cloud console
JSON representation |
---|
{ "consoleUris": [ string ], "steps": [ string ], "additionalLinks": [ string ] } |
Fields | |
---|---|
consoleUris[] |
Link to console page where violations can be resolved |
steps[] |
Steps to resolve violation via cloud console |
additionalLinks[] |
Additional urls for more information about steps |
RemediationType
Classifying remediation into various types based on the kind of violation. For example, violations caused due to changes in boolean org policy requires different remediation instructions compared to violation caused due to changes in allowed values of list org policy.
Enums | |
---|---|
REMEDIATION_TYPE_UNSPECIFIED |
Unspecified remediation type |
REMEDIATION_BOOLEAN_ORG_POLICY_VIOLATION |
Remediation type for boolean org policy |
REMEDIATION_LIST_ALLOWED_VALUES_ORG_POLICY_VIOLATION |
Remediation type for list org policy which have allowed values in the monitoring rule |
REMEDIATION_LIST_DENIED_VALUES_ORG_POLICY_VIOLATION |
Remediation type for list org policy which have denied values in the monitoring rule |
REMEDIATION_RESTRICT_CMEK_CRYPTO_KEY_PROJECTS_ORG_POLICY_VIOLATION |
Remediation type for gcp.restrictCmekCryptoKeyProjects |
REMEDIATION_RESOURCE_VIOLATION |
Remediation type for resource violation. |
Methods |
|
---|---|
|
Gets details of a single Violation. |
|
Lists Violations for a workload Callers may also choose to read across multiple Customers or for a single customer as per AIP-159 by using '-' (the hyphen or dash character) as a wildcard character instead of {customer} & {workload}. |