Only this pageAll pages
Powered by GitBook
1 of 59

Metadata for Integration Config

INTEGRATION METADATA

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

AWS EC2 SSH

EC2 SSH allows secure remote access to Amazon EC2 instances for configuration, management, and troubleshooting.

Example Usage


aws-ec2-ssh-integration.tf
resource "apono_integration" "aws-ec2-ssh-integration" {
  name                     = "AWS EC2 SSH"
  type                     = "aws-ec2-ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-ec2-ssh-server"]
  metadata = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    ip_type_preference = "<IP Type Preference>"
    cross_account_role_arn = "<Cross Account Role ARN>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
aws-ec2-ssh-integration.tf
resource "apono_resource_integration" "aws-ec2-ssh-integration" {
  name                     = "AWS EC2 SSH"
  type                     = "aws-ec2-ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-ec2-ssh-server"]
  integration_config = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    ip_type_preference = "<IP Type Preference>"
    cross_account_role_arn = "<Cross Account Role ARN>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
aws-ec2-ssh-integration.json
{
    "aws-ec2-ssh-integration": {
        "name": "AWS EC2 SSH",
        "type": "aws-ec2-ssh",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-ec2-ssh-server"
        ],
        "integration_config": {
            "region": "<Region>",
            "user": "<User>",
            "groups": "<User Groups>",
            "shell": "<User&#39;s Login Shell>",
            "user_key_name": "<User Key Name>",
            "ip_type_preference": "<IP Type Preference>",
            "cross_account_role_arn": "<Cross Account Role ARN>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}

Schema


  • type aws-ec2-ssh

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-ec2-ssh-server

Integration Config


  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • user (Required | String) User

  • groups (Optional | String) User Groups

  • shell (Optional | String) User's Login Shell

  • user_key_name (Optional | String) User Key Name

  • ip_type_preference (Optional | String) IP Type Preference

    • Default value: public

    • Possible values: public, private

  • cross_account_role_arn (Optional | String) Cross Account Role ARN

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

AWS Lambda Custom Integration

AWS Lambda Custom Integration allows use AWS Lambda as a custom implementation for resource integration

Example Usage


aws-lambda-custom-integration-integration.tf
resource "apono_integration" "aws-lambda-custom-integration-integration" {
  name                     = "AWS Lambda Custom Integration"
  type                     = "aws-lambda-custom-integration"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-lambda-custom-integration"]
  metadata = {
    access_details = "<Access Details>"
    custom_parameters = "<Custom Parameters>"
    region = "<Region>"
    function_name = "<Function Name>"
  }
}
aws-lambda-custom-integration-integration.tf
resource "apono_resource_integration" "aws-lambda-custom-integration-integration" {
  name                     = "AWS Lambda Custom Integration"
  type                     = "aws-lambda-custom-integration"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-lambda-custom-integration"]
  integration_config = {
    access_details = "<Access Details>"
    custom_parameters = "<Custom Parameters>"
    region = "<Region>"
    function_name = "<Function Name>"
  }
}
aws-lambda-custom-integration-integration.json
{
    "aws-lambda-custom-integration-integration": {
        "name": "AWS Lambda Custom Integration",
        "type": "aws-lambda-custom-integration",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-lambda-custom-integration"
        ],
        "integration_config": {
            "access_details": "<Access Details>",
            "custom_parameters": "<Custom Parameters>",
            "region": "<Region>",
            "function_name": "<Function Name>",
        }
    }
}

Schema


  • type aws-lambda-custom-integration

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-lambda-custom-integration

Integration Config


  • access_details (Required | String) Access Details

  • custom_parameters (Required | String) Custom Parameters

  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • function_name (Required | String) Function Name

Entra ID (Azure AD) Groups

Azure Active Directory (Azure AD) is Microsoft&#39;s cloud-based identity and access management service, providing group and role management to securely control and streamline user access to enterpris

Example Usage


azure-ad-integration.tf
resource "apono_integration" "azure-ad-integration" {
  name                     = "Entra ID (Azure AD) Groups"
  type                     = "azure-ad"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-ad-group"]
  metadata = {
    cloud_type = "<Cloud Type>"
  }
}
azure-ad-integration.tf
resource "apono_resource_integration" "azure-ad-integration" {
  name                     = "Entra ID (Azure AD) Groups"
  type                     = "azure-ad"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-ad-group"]
  integration_config = {
    cloud_type = "<Cloud Type>"
  }
}
azure-ad-integration.json
{
    "azure-ad-integration": {
        "name": "Entra ID (Azure AD) Groups",
        "type": "azure-ad",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-ad-group"
        ],
        "integration_config": {
            "cloud_type": "<Cloud Type>",
        }
    }
}

Schema


  • type azure-ad

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-ad-group

  • azure-ad-role

Integration Config


  • cloud_type (Optional | String) Cloud Type

    • Default value: azure

    • Possible values: azure, azure-gov

Amazon RDS

Amazon Relational Database Service (Amazon RDS) is a collection of managed services that makes it simple to set up, operate, and scale databases in the cloud.

Example Usage


aws-rds-integration.tf
resource "apono_integration" "aws-rds-integration" {
  name                     = "Amazon RDS"
  type                     = "aws-rds"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-instance"]
  metadata = {
    cross_account_role_arn = "<Cross Account Role ARN>"
    region = "<Region>"
  }
}
aws-rds-integration.tf
resource "apono_resource_integration" "aws-rds-integration" {
  name                     = "Amazon RDS"
  type                     = "aws-rds"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-instance"]
  integration_config = {
    cross_account_role_arn = "<Cross Account Role ARN>"
    region = "<Region>"
  }
}
aws-rds-integration.json
{
    "aws-rds-integration": {
        "name": "Amazon RDS",
        "type": "aws-rds",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-rds-instance"
        ],
        "integration_config": {
            "cross_account_role_arn": "<Cross Account Role ARN>",
            "region": "<Region>",
        }
    }
}

Schema


  • type aws-rds

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-rds-instance

Integration Config


  • cross_account_role_arn (Optional | String) Cross Account Role ARN

  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

Amazon Account

Integrate a specific account and its resources

Example Usage


Schema


  • type aws-account

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-account-s3-bucket

  • aws-account-s3-folder

  • aws-account-iam-group

  • aws-account-iam-policy

  • aws-account-iam-role

  • aws-account-systems-manager-parameter-store

  • aws-account-systems-manager-parameter-store-param

  • aws-account-ec2-loadbalancer

  • aws-account-ec2-instance

  • aws-account-ec2-service

  • aws-account-ecr

  • aws-account-ecr-repository

  • aws-account-ecs-cluster

  • aws-account-sagemaker-notebook

  • aws-account-lambda-function

  • aws-account-secrets-manager-secret

  • aws-account-sqs-queue

  • aws-account-sns-topic

  • aws-account-dynamodb-table

  • aws-account-cloudformation-stack

  • aws-account-cloudformation-stackset

  • aws-account-kms-key

  • aws-account-emr-cluster

  • aws-account-acm-certificate

  • aws-account-ses

  • aws-account-route53

  • aws-account-route53-hostedzone

  • aws-account-cognito

  • aws-account-elasticache

Integration Config


  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • profile (Required | String) AWS Profile Name (Optional)

    • Default value: apono

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • enable_audit (Optional | String) Enable Audit

    • Default value: false

    • Possible values: true, false

ArgoCD

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes that automatically syncs applications from a Git repository to a cluster.

Example Usage


Schema


  • type argocd

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • argocd-global-role

  • argocd-project-role

Integration Config


  • k8s_server_url (Optional | String) Kubernetes Server URL

  • argocd_ui_url (Required | String) ArgoCD UI URL

  • k8s_certificate_authority (Optional | String) Kubernetes Certificate Authority

  • argo_namespace (Required | String) ArgoCD Namespace

    • Default value: argocd

aws-account-integration.json
{
    "aws-account-integration": {
        "name": "Amazon Account",
        "type": "aws-account",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-account-s3-bucket"
        ],
        "integration_config": {
            "region": "<Region>",
            "profile": "<AWS Profile Name (Optional)>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "enable_audit": "<Enable Audit>",
        }
    }
}
aws-account-integration.tf
resource "apono_integration" "aws-account-integration" {
  name                     = "Amazon Account"
  type                     = "aws-account"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-account-s3-bucket"]
  metadata = {
    region = "<Region>"
    profile = "<AWS Profile Name (Optional)>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
  }
}
aws-account-integration.tf
resource "apono_resource_integration" "aws-account-integration" {
  name                     = "Amazon Account"
  type                     = "aws-account"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-account-s3-bucket"]
  integration_config = {
    region = "<Region>"
    profile = "<AWS Profile Name (Optional)>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
  }
}
argocd-integration.json
{
    "argocd-integration": {
        "name": "ArgoCD",
        "type": "argocd",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "argocd-global-role"
        ],
        "integration_config": {
            "k8s_server_url": "<Kubernetes Server URL>",
            "argocd_ui_url": "<ArgoCD UI URL>",
            "k8s_certificate_authority": "<Kubernetes Certificate Authority>",
            "argo_namespace": "<ArgoCD Namespace>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
argocd-integration.tf
resource "apono_integration" "argocd-integration" {
  name                     = "ArgoCD"
  type                     = "argocd"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["argocd-global-role"]
  metadata = {
    k8s_server_url = "<Kubernetes Server URL>"
    argocd_ui_url = "<ArgoCD UI URL>"
    k8s_certificate_authority = "<Kubernetes Certificate Authority>"
    argo_namespace = "<ArgoCD Namespace>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
argocd-integration.tf
resource "apono_resource_integration" "argocd-integration" {
  name                     = "ArgoCD"
  type                     = "argocd"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["argocd-global-role"]
  integration_config = {
    k8s_server_url = "<Kubernetes Server URL>"
    argocd_ui_url = "<ArgoCD UI URL>"
    k8s_certificate_authority = "<Kubernetes Certificate Authority>"
    argo_namespace = "<ArgoCD Namespace>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}

Azure Kubernetes Service (AKS)

Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

Example Usage


azure-aks-integration.tf
resource "apono_integration" "azure-aks-integration" {
  name                     = "Azure Kubernetes Service (AKS)"
  type                     = "azure-aks"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-aks-cluster"]
  metadata = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    resource_group = "<Resource Group>"
    cluster_name = "<Cluster Name>"
    subscription_id = "<Subscription ID>"
  }
}
azure-aks-integration.tf
resource "apono_resource_integration" "azure-aks-integration" {
  name                     = "Azure Kubernetes Service (AKS)"
  type                     = "azure-aks"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-aks-cluster"]
  integration_config = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    resource_group = "<Resource Group>"
    cluster_name = "<Cluster Name>"
    subscription_id = "<Subscription ID>"
  }
  secret_store_config = {
    azure = {
      vault_url = "vault_url_template_value"
      name      = "name_template_value"
    }
}
azure-aks-integration.json
{
    "azure-aks-integration": {
        "name": "Azure Kubernetes Service (AKS)",
        "type": "azure-aks",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-aks-cluster"
        ],
        "integration_config": {
            "server_url": "<Server URL>",
            "certificate_authority": "<Certificate Authority>",
            "resource_group": "<Resource Group>",
            "cluster_name": "<Cluster Name>",
            "subscription_id": "<Subscription ID>",
        },
	"azure": {
    	    "vault_url": "vault_url_template_value",
    	    "name": "name_template_value"
  	    }
    }
}

Schema


  • type azure-aks

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-aks-cluster

  • azure-aks-namespace

  • azure-aks-secret

  • azure-aks-configmap

  • azure-aks-deployment

  • azure-aks-statefulset

  • azure-aks-ingress

  • azure-aks-cronjob

  • azure-aks-job

  • azure-aks-daemonset

Integration Config


  • server_url (Optional | String) Server URL

  • certificate_authority (Optional | String) Certificate Authority

  • resource_group (Optional | String) Resource Group

  • cluster_name (Optional | String) Cluster Name

  • subscription_id (Optional | String) Subscription ID

Azure MySQL

Azure Database for MySQL is a relational database service powered by the MySQL community edition. It&#39;s a fully managed database as a service offering that can handle mission-critical workloads wit

Example Usage


azure-mysql-integration.tf
resource "apono_integration" "azure-mysql-integration" {
  name                     = "Azure MySQL"
  type                     = "azure-mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-mysql-instance"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
azure-mysql-integration.tf
resource "apono_resource_integration" "azure-mysql-integration" {
  name                     = "Azure MySQL"
  type                     = "azure-mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-mysql-instance"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
azure-mysql-integration.json
{
    "azure-mysql-integration": {
        "name": "Azure MySQL",
        "type": "azure-mysql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-mysql-instance"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type azure-mysql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-mysql-instance

  • azure-mysql-database

  • azure-mysql-table

  • azure-mysql-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 3306

Azure Subscription

Azure Subscription

Example Usage


azure-subscription-integration.tf
resource "apono_integration" "azure-subscription-integration" {
  name                     = "Azure Subscription"
  type                     = "azure-subscription"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-subscription"]
  metadata = {
    subscription_id = "<Azure Subscription Id>"
    directory = "<Azure Primary Domain>"
    disable_locks = "<Disable Locks>"
    cloud_type = "<Cloud Type>"
  }
}
azure-subscription-integration.tf
resource "apono_resource_integration" "azure-subscription-integration" {
  name                     = "Azure Subscription"
  type                     = "azure-subscription"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-subscription"]
  integration_config = {
    subscription_id = "<Azure Subscription Id>"
    directory = "<Azure Primary Domain>"
    disable_locks = "<Disable Locks>"
    cloud_type = "<Cloud Type>"
  }
}
azure-subscription-integration.json
{
    "azure-subscription-integration": {
        "name": "Azure Subscription",
        "type": "azure-subscription",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-subscription"
        ],
        "integration_config": {
            "subscription_id": "<Azure Subscription Id>",
            "directory": "<Azure Primary Domain>",
            "disable_locks": "<Disable Locks>",
            "cloud_type": "<Cloud Type>",
        }
    }
}

Schema


  • type azure-subscription

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-subscription

  • azure-subscription-resource-group

  • azure-subscription-resource-group-storage-account

  • azure-subscription-web-site

  • azure-subscription-container-instance

  • azure-subscription-vm

  • azure-subscription-galleries

  • azure-subscription-vm-scale-set

  • azure-subscription-container-registry

  • azure-subscription-static-web-app

  • azure-subscription-service-bus-namespace

  • azure-subscription-event-grid-domain

  • azure-subscription-event-grid-topic

  • azure-subscription-event-grid-namespace

  • azure-subscription-event-hub-namespace

  • azure-subscription-machine-learning-workspace

  • azure-subscription-machine-learning-registry

  • azure-subscription-virtual-desktop-host-pool

  • azure-subscription-virtual-desktop-workspace

  • azure-subscription-data-factory

  • azure-subscription-automation-account

  • azure-subscription-synapse-workspace

  • azure-subscription-function

  • azure-subscription-logic-app

  • azure-subscription-cosmos-db-account

  • azure-subscription-sql-server

  • azure-subscription-managed-instance

  • azure-subscription-key-vault

Integration Config


  • subscription_id (Optional | String) Azure Subscription Id

  • directory (Optional | String) Azure Primary Domain

  • disable_locks (Optional | String) Disable Locks

    • Default value: false

    • Possible values: true, false

  • cloud_type (Optional | String) Cloud Type

    • Default value: azure

    • Possible values: azure, azure-gov

Elastic Kubernetes Service (EKS)

Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

Example Usage


Schema


  • type aws-eks

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-eks-cluster

  • aws-eks-namespace

  • aws-eks-secret

  • aws-eks-configmap

  • aws-eks-deployment

  • aws-eks-statefulset

  • aws-eks-ingress

  • aws-eks-cronjob

  • aws-eks-job

  • aws-eks-daemonset

Integration Config


  • server_url (Optional | String) Server URL

  • certificate_authority (Optional | String) Certificate Authority

  • cluster_name (Required | String) EKS Cluster Name

  • aws_role_name (Optional | String) AWS Role Name

  • region (Optional | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • eks_identity_mapping_type (Optional | String) Identity Mapping Type

    • Possible values: access-entries, config-map

AWS RDS MySQL

An open-source relational database management system.

Example Usage


Schema


  • type aws-rds-mysql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-rds-mysql-instance

  • aws-rds-mysql-database

  • aws-rds-mysql-table

  • aws-rds-mysql-role

Integration Config


  • auth_type (Required | String) Auth Type

    • Possible values: aws-iam-auth, user-password

  • aws_region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_instance_id (Required | String) Instance ID

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Azure Management Group

Azure Management Group

Example Usage


Schema


  • type azure-management-group

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-management-group

  • azure-management-group-subscription

  • azure-management-group-resource-group

  • azure-management-group-resource-group-storage-account

  • azure-management-group-web-site

  • azure-management-group-container-instance

  • azure-management-group-vm

  • azure-management-group-galleries

  • azure-management-group-vm-scale-set

  • azure-management-group-container-registry

  • azure-management-group-static-web-app

  • azure-management-group-service-bus-namespace

  • azure-management-group-event-grid-domain

  • azure-management-group-event-grid-topic

  • azure-management-group-event-grid-namespace

  • azure-management-group-event-hub-namespace

  • azure-management-group-machine-learning-workspace

  • azure-management-group-machine-learning-registry

  • azure-management-group-virtual-desktop-host-pool

  • azure-management-group-virtual-desktop-workspace

  • azure-management-group-data-factory

  • azure-management-group-automation-account

  • azure-management-group-synapse-workspace

  • azure-management-group-function

  • azure-management-group-logic-app

  • azure-management-group-cosmos-db-account

  • azure-management-group-sql-server

  • azure-management-group-managed-instance

  • azure-management-group-key-vault

Integration Config


  • management_group_id (Required | String) Azure Management Group Id

  • directory (Optional | String) Azure Primary Domain

  • disable_locks (Optional | String) Disable Locks

    • Default value: false

    • Possible values: true, false

  • cloud_type (Optional | String) Cloud Type

    • Default value: azure

    • Possible values: azure, azure-gov

Azure PostgreSQL

Azure Database for PostgreSQL is a relational database service based on the open-source Postgres database engine. It&#39;s a fully managed database-as-a-service that can handle mission-critical worklo

Example Usage


Schema


  • type azure-postgresql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-postgresql-instance

  • azure-postgresql-database

  • azure-postgresql-table

  • azure-postgresql-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 5432

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Required | String) SSL Mode

    • Default value: disable

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

aws-eks-integration.json
{
    "aws-eks-integration": {
        "name": "Elastic Kubernetes Service (EKS)",
        "type": "aws-eks",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-eks-cluster"
        ],
        "integration_config": {
            "server_url": "<Server URL>",
            "certificate_authority": "<Certificate Authority>",
            "cluster_name": "<EKS Cluster Name>",
            "aws_role_name": "<AWS Role Name>",
            "region": "<Region>",
            "eks_identity_mapping_type": "<Identity Mapping Type>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
aws-eks-integration.tf
resource "apono_integration" "aws-eks-integration" {
  name                     = "Elastic Kubernetes Service (EKS)"
  type                     = "aws-eks"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-eks-cluster"]
  metadata = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    cluster_name = "<EKS Cluster Name>"
    aws_role_name = "<AWS Role Name>"
    region = "<Region>"
    eks_identity_mapping_type = "<Identity Mapping Type>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
aws-eks-integration.tf
resource "apono_resource_integration" "aws-eks-integration" {
  name                     = "Elastic Kubernetes Service (EKS)"
  type                     = "aws-eks"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-eks-cluster"]
  integration_config = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    cluster_name = "<EKS Cluster Name>"
    aws_role_name = "<AWS Role Name>"
    region = "<Region>"
    eks_identity_mapping_type = "<Identity Mapping Type>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
aws-rds-mysql-integration.json
{
    "aws-rds-mysql-integration": {
        "name": "AWS RDS MySQL",
        "type": "aws-rds-mysql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-rds-mysql-instance"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "aws_region": "<Region>",
            "aws_instance_id": "<Instance ID>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
aws-rds-mysql-integration.tf
resource "apono_integration" "aws-rds-mysql-integration" {
  name                     = "AWS RDS MySQL"
  type                     = "aws-rds-mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-mysql-instance"]
  metadata = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
aws-rds-mysql-integration.tf
resource "apono_resource_integration" "aws-rds-mysql-integration" {
  name                     = "AWS RDS MySQL"
  type                     = "aws-rds-mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-mysql-instance"]
  integration_config = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
azure-management-group-integration.json
{
    "azure-management-group-integration": {
        "name": "Azure Management Group",
        "type": "azure-management-group",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-management-group"
        ],
        "integration_config": {
            "management_group_id": "<Azure Management Group Id>",
            "directory": "<Azure Primary Domain>",
            "disable_locks": "<Disable Locks>",
            "cloud_type": "<Cloud Type>",
        }
    }
}
azure-management-group-integration.tf
resource "apono_integration" "azure-management-group-integration" {
  name                     = "Azure Management Group"
  type                     = "azure-management-group"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-management-group"]
  metadata = {
    management_group_id = "<Azure Management Group Id>"
    directory = "<Azure Primary Domain>"
    disable_locks = "<Disable Locks>"
    cloud_type = "<Cloud Type>"
  }
}
azure-management-group-integration.tf
resource "apono_resource_integration" "azure-management-group-integration" {
  name                     = "Azure Management Group"
  type                     = "azure-management-group"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-management-group"]
  integration_config = {
    management_group_id = "<Azure Management Group Id>"
    directory = "<Azure Primary Domain>"
    disable_locks = "<Disable Locks>"
    cloud_type = "<Cloud Type>"
  }
}
azure-postgresql-integration.json
{
    "azure-postgresql-integration": {
        "name": "Azure PostgreSQL",
        "type": "azure-postgresql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-postgresql-instance"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "dbname": "<Database Name>",
            "sslmode": "<SSL Mode>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
azure-postgresql-integration.tf
resource "apono_integration" "azure-postgresql-integration" {
  name                     = "Azure PostgreSQL"
  type                     = "azure-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-postgresql-instance"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
azure-postgresql-integration.tf
resource "apono_resource_integration" "azure-postgresql-integration" {
  name                     = "Azure PostgreSQL"
  type                     = "azure-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-postgresql-instance"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}

Azure VM SSH

VM SSH allows secure remote access to Azure VM instances for configuration, management, and troubleshooting.

Example Usage


azure-vm-ssh-integration.tf
resource "apono_integration" "azure-vm-ssh-integration" {
  name                     = "Azure VM SSH"
  type                     = "azure-vm-ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-vm-ssh-server"]
  metadata = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
azure-vm-ssh-integration.tf
resource "apono_resource_integration" "azure-vm-ssh-integration" {
  name                     = "Azure VM SSH"
  type                     = "azure-vm-ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["azure-vm-ssh-server"]
  integration_config = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
azure-vm-ssh-integration.json
{
    "azure-vm-ssh-integration": {
        "name": "Azure VM SSH",
        "type": "azure-vm-ssh",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "azure-vm-ssh-server"
        ],
        "integration_config": {
            "region": "<Region>",
            "user": "<User>",
            "groups": "<User Groups>",
            "shell": "<User&#39;s Login Shell>",
            "user_key_name": "<User Key Name>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type azure-vm-ssh

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • azure-vm-ssh-server

Integration Config


  • region (Optional | String) Region

    • Possible values: eastus, eastus2, centralus, northcentralus, southcentralus, westus, westus2, westus3, canadacentral, canadaeast, brazilsouth, brazilsoutheast, northeurope, westeurope, uksouth, ukwest, francecentral, germanywestcentral, norwayeast, swedencentral, switzerlandnorth, switzerlandwest, uaenorth, mecentral, mesouth, israelcentral, southafricanorth, eastasia, southeastasia, australiaeast, australiasoutheast, japaneast, japanwest, koreacentral, centralindia, southindia, westindia

  • user (Required | String) User

  • groups (Optional | String) User Groups

  • shell (Optional | String) User's Login Shell

  • user_key_name (Optional | String) User Key Name

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

AWS RDS PostgreSQL

An open-source relational database management system emphasizing extensibility and SQL compliance.

Example Usage


aws-rds-postgresql-integration.tf
resource "apono_integration" "aws-rds-postgresql-integration" {
  name                     = "AWS RDS PostgreSQL"
  type                     = "aws-rds-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-postgresql-instance"]
  metadata = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
aws-rds-postgresql-integration.tf
resource "apono_resource_integration" "aws-rds-postgresql-integration" {
  name                     = "AWS RDS PostgreSQL"
  type                     = "aws-rds-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-postgresql-instance"]
  integration_config = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
aws-rds-postgresql-integration.json
{
    "aws-rds-postgresql-integration": {
        "name": "AWS RDS PostgreSQL",
        "type": "aws-rds-postgresql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-rds-postgresql-instance"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "aws_region": "<Region>",
            "aws_instance_id": "<Instance ID>",
            "dbname": "<Database Name>",
            "sslmode": "<SSL Mode>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "enable_audit": "<Enable Audit>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}

Schema


  • type aws-rds-postgresql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-rds-postgresql-instance

  • aws-rds-postgresql-database

  • aws-rds-postgresql-table

  • aws-rds-postgresql-role

Integration Config


  • auth_type (Required | String) Auth Type

    • Possible values: aws-iam-auth, user-password

  • aws_region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_instance_id (Required | String) Instance ID

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Default value: require

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • enable_audit (Optional | String) Enable Audit

    • Default value: false

    • Possible values: true, false

Amazon Organization

Integrate all accounts and resources, and manage access with IAM Identity Center (SSO)

Example Usage


Schema


  • type aws-organization

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-organization-account

  • aws-organization-s3-bucket

  • aws-organization-s3-folder

  • aws-organization-iam-group

  • aws-organization-iam-role

  • aws-organization-customer-managed-iam-policy

  • aws-organization-account-iam-managed-policy

  • aws-organization-systems-manager-parameter-store

  • aws-organization-systems-manager-parameter-store-param

  • aws-organization-ec2-loadbalancer

  • aws-organization-ec2-instance

  • aws-organization-ec2-service

  • aws-organization-ecr

  • aws-organization-ecr-repository

  • aws-organization-ecs-cluster

  • aws-organization-sagemaker-notebook

  • aws-organization-lambda-function

  • aws-organization-secrets-manager-secret

  • aws-organization-sqs-queue

  • aws-organization-sns-topic

  • aws-organization-dynamodb-table

  • aws-organization-cloudformation-stack

  • aws-organization-cloudformation-stackset

  • aws-organization-kms-key

  • aws-organization-emr-cluster

  • aws-organization-acm-certificate

  • aws-organization-ses

  • aws-organization-cognito

  • aws-organization-elasticache

  • aws-organization-route53

  • aws-organization-route53-hostedzone

  • aws-organization-permission-boundary

Integration Config


  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_sso_region (Required | String) AWS SSO Region

    • Default value: us-east-1

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_sso_portal (Required | String) SSO Portal

  • management_account_role_arn (Optional | String) Management Account Role ARN

  • filter_not_organizational_unit_ids (Optional | String) Exclude Organizational Unit IDs

  • user_assuming_role_arns (Optional | String) Assumable Roles

  • session_duration_hours (Optional | String) Session Duration (in Hours)

    • Possible values: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12

  • filter_not_account_ids (Optional | String) Exclude Account IDs

  • enable_audit (Optional | String) Enable Audit

    • Default value: false

    • Possible values: true, false

Databricks

Databricks is a managed data and AI platform.

Example Usage


Schema


  • type databricks

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • databricks-group

Integration Config


  • address (Required | String) Databricks Accounts URL

  • account_id (Required | String) Account Id

Github

A code hosting platform for version control and collaboration tool.

Example Usage


Schema


  • type github

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • github-repository

  • github-organization-role

  • github-team

  • github-owner-role

Integration Config


  • org (Required | String) Organization

Elastic Cloud

Elastic Cloud is the official managed Elasticsearch service that provides a fully managed Elasticsearch, Kibana, and APM solution in the cloud

Example Usage


Schema


  • type elastic-cloud

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • elastic-cloud-deployment

Integration Config


  • organization_id (Required | String) Organization ID

Harmony

Harmony SASE provides secure access to local networks, applications and cloud infrastructures with one unified platform

Example Usage


Schema


  • type harmony

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • harmony-group

Integration Config


  • region (Required | String) Region

    • Possible values: global, eu

Web App

A search engine based on the Lucene library that provides a distributed, multitenant-capable full-text search engine.

Example Usage


Schema


  • type web-app

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • envoy-web-app

Integration Config


  • proxy_address (Required | String) Proxy Address

  • addresses (Required | String) Addresses

Google Project

Google Project

Example Usage


Schema


  • type gcp-project

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • gcp-project

  • gcp-project-cloud-spanner-table

  • gcp-project-cloud-storage-bucket

  • gcp-project-secret-manager-secret

  • gcp-project-bigquery-dataset

  • gcp-project-bigquery-table

  • gcp-project-function

  • gcp-project-compute-instance

  • gcp-project-cloud-run-service

  • gcp-project-cloud-run-job

  • gcp-project-artifact-registry-repository

  • gcp-project-pubsub-topic

  • gcp-project-pubsub-subscription

Integration Config


  • project_id (Required | String) Project ID

JumpCloud

This integration allows user to request temporary membership to JumpCloud user groups

Example Usage


Schema


  • type jumpcloud

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • jumpcloud-group

Integration Config


OpenVPN

OpenVPN is a leading global private networking and cybersecurity company that allows organizations to truly safeguard their assets in a dynamic, cost effective, and scalable way.

Example Usage


Schema


  • type openvpn

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • openvpn-tunnel

Integration Config


1Password

Example Usage


Schema


  • type onepassword

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • onepassword-secret

Integration Config


Grafana

Grafana is an open-source analytics and monitoring platform

Example Usage


Schema


  • type grafana

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • grafana-datasource

Integration Config


  • address (Required | String) Grafana Portal URL

OneLogin Group

OneLogin roles membership facilitates the organization of users into logical units, enabling streamlined management of access permissions and policies.

Example Usage


Schema


  • type onelogin-group

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • onelogin-role

Integration Config


  • subdomain (Required | String) Subdomain

aws-organization-integration.json
{
    "aws-organization-integration": {
        "name": "Amazon Organization",
        "type": "aws-organization",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-organization-account"
        ],
        "integration_config": {
            "region": "<Region>",
            "aws_sso_region": "<AWS SSO Region>",
            "aws_sso_portal": "<SSO Portal>",
            "management_account_role_arn": "<Management Account Role ARN>",
            "filter_not_organizational_unit_ids": "<Exclude Organizational Unit IDs>",
            "user_assuming_role_arns": "<Assumable Roles>",
            "session_duration_hours": "<Session Duration (in Hours)>",
            "filter_not_account_ids": "<Exclude Account IDs>",
            "enable_audit": "<Enable Audit>",
        }
    }
}
aws-organization-integration.tf
resource "apono_integration" "aws-organization-integration" {
  name                     = "Amazon Organization"
  type                     = "aws-organization"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-organization-account"]
  metadata = {
    region = "<Region>"
    aws_sso_region = "<AWS SSO Region>"
    aws_sso_portal = "<SSO Portal>"
    management_account_role_arn = "<Management Account Role ARN>"
    filter_not_organizational_unit_ids = "<Exclude Organizational Unit IDs>"
    user_assuming_role_arns = "<Assumable Roles>"
    session_duration_hours = "<Session Duration (in Hours)>"
    filter_not_account_ids = "<Exclude Account IDs>"
    enable_audit = "<Enable Audit>"
  }
}
aws-organization-integration.tf
resource "apono_resource_integration" "aws-organization-integration" {
  name                     = "Amazon Organization"
  type                     = "aws-organization"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-organization-account"]
  integration_config = {
    region = "<Region>"
    aws_sso_region = "<AWS SSO Region>"
    aws_sso_portal = "<SSO Portal>"
    management_account_role_arn = "<Management Account Role ARN>"
    filter_not_organizational_unit_ids = "<Exclude Organizational Unit IDs>"
    user_assuming_role_arns = "<Assumable Roles>"
    session_duration_hours = "<Session Duration (in Hours)>"
    filter_not_account_ids = "<Exclude Account IDs>"
    enable_audit = "<Enable Audit>"
  }
}
databricks-integration.json
{
    "databricks-integration": {
        "name": "Databricks",
        "type": "databricks",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "databricks-group"
        ],
        "integration_config": {
            "address": "<Databricks Accounts URL>",
            "account_id": "<Account Id>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
databricks-integration.tf
resource "apono_integration" "databricks-integration" {
  name                     = "Databricks"
  type                     = "databricks"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["databricks-group"]
  metadata = {
    address = "<Databricks Accounts URL>"
    account_id = "<Account Id>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
databricks-integration.tf
resource "apono_resource_integration" "databricks-integration" {
  name                     = "Databricks"
  type                     = "databricks"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["databricks-group"]
  integration_config = {
    address = "<Databricks Accounts URL>"
    account_id = "<Account Id>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
github-integration.json
{
    "github-integration": {
        "name": "Github",
        "type": "github",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "github-repository"
        ],
        "integration_config": {
            "org": "<Organization>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
github-integration.tf
resource "apono_integration" "github-integration" {
  name                     = "Github"
  type                     = "github"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["github-repository"]
  metadata = {
    org = "<Organization>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
github-integration.tf
resource "apono_resource_integration" "github-integration" {
  name                     = "Github"
  type                     = "github"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["github-repository"]
  integration_config = {
    org = "<Organization>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
elastic-cloud-integration.json
{
    "elastic-cloud-integration": {
        "name": "Elastic Cloud",
        "type": "elastic-cloud",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "elastic-cloud-deployment"
        ],
        "integration_config": {
            "organization_id": "<Organization ID>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
elastic-cloud-integration.tf
resource "apono_integration" "elastic-cloud-integration" {
  name                     = "Elastic Cloud"
  type                     = "elastic-cloud"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["elastic-cloud-deployment"]
  metadata = {
    organization_id = "<Organization ID>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
elastic-cloud-integration.tf
resource "apono_resource_integration" "elastic-cloud-integration" {
  name                     = "Elastic Cloud"
  type                     = "elastic-cloud"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["elastic-cloud-deployment"]
  integration_config = {
    organization_id = "<Organization ID>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
harmony-integration.json
{
    "harmony-integration": {
        "name": "Harmony",
        "type": "harmony",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "harmony-group"
        ],
        "integration_config": {
            "region": "<Region>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
harmony-integration.tf
resource "apono_integration" "harmony-integration" {
  name                     = "Harmony"
  type                     = "harmony"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["harmony-group"]
  metadata = {
    region = "<Region>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
harmony-integration.tf
resource "apono_resource_integration" "harmony-integration" {
  name                     = "Harmony"
  type                     = "harmony"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["harmony-group"]
  integration_config = {
    region = "<Region>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
web-app-integration.tf
resource "apono_integration" "web-app-integration" {
  name                     = "Web App"
  type                     = "web-app"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["envoy-web-app"]
  metadata = {
    proxy_address = "<Proxy Address>"
    addresses = "<Addresses>"
  }
}
web-app-integration.tf
resource "apono_resource_integration" "web-app-integration" {
  name                     = "Web App"
  type                     = "web-app"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["envoy-web-app"]
  integration_config = {
    proxy_address = "<Proxy Address>"
    addresses = "<Addresses>"
  }
}
web-app-integration.json
{
    "web-app-integration": {
        "name": "Web App",
        "type": "web-app",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "envoy-web-app"
        ],
        "integration_config": {
            "proxy_address": "<Proxy Address>",
            "addresses": "<Addresses>",
        }
    }
}
gcp-project-integration.tf
resource "apono_integration" "gcp-project-integration" {
  name                     = "Google Project"
  type                     = "gcp-project"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-project"]
  metadata = {
    project_id = "<Project ID>"
  }
}
gcp-project-integration.tf
resource "apono_resource_integration" "gcp-project-integration" {
  name                     = "Google Project"
  type                     = "gcp-project"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-project"]
  integration_config = {
    project_id = "<Project ID>"
  }
}
gcp-project-integration.json
{
    "gcp-project-integration": {
        "name": "Google Project",
        "type": "gcp-project",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "gcp-project"
        ],
        "integration_config": {
            "project_id": "<Project ID>",
        }
    }
}
jumpcloud-integration.json
{
    "jumpcloud-integration": {
        "name": "JumpCloud",
        "type": "jumpcloud",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "jumpcloud-group"
        ],
        "integration_config": {
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
jumpcloud-integration.tf
resource "apono_integration" "jumpcloud-integration" {
  name                     = "JumpCloud"
  type                     = "jumpcloud"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["jumpcloud-group"]
  metadata = {
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
jumpcloud-integration.tf
resource "apono_resource_integration" "jumpcloud-integration" {
  name                     = "JumpCloud"
  type                     = "jumpcloud"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["jumpcloud-group"]
  integration_config = {
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
openvpn-integration.tf
resource "apono_integration" "openvpn-integration" {
  name                     = "OpenVPN"
  type                     = "openvpn"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["openvpn-tunnel"]
  metadata = {
  }
}
openvpn-integration.tf
resource "apono_resource_integration" "openvpn-integration" {
  name                     = "OpenVPN"
  type                     = "openvpn"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["openvpn-tunnel"]
  integration_config = {
  }
}
openvpn-integration.json
{
    "openvpn-integration": {
        "name": "OpenVPN",
        "type": "openvpn",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "openvpn-tunnel"
        ],
        "integration_config": {
        }
    }
}
onepassword-integration.json
{
    "onepassword-integration": {
        "name": "1Password",
        "type": "onepassword",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "onepassword-secret"
        ],
        "integration_config": {
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
onepassword-integration.tf
resource "apono_integration" "onepassword-integration" {
  name                     = "1Password"
  type                     = "onepassword"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["onepassword-secret"]
  metadata = {
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
onepassword-integration.tf
resource "apono_resource_integration" "onepassword-integration" {
  name                     = "1Password"
  type                     = "onepassword"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["onepassword-secret"]
  integration_config = {
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
grafana-integration.json
{
    "grafana-integration": {
        "name": "Grafana",
        "type": "grafana",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "grafana-datasource"
        ],
        "integration_config": {
            "address": "<Grafana Portal URL>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
grafana-integration.tf
resource "apono_integration" "grafana-integration" {
  name                     = "Grafana"
  type                     = "grafana"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["grafana-datasource"]
  metadata = {
    address = "<Grafana Portal URL>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
grafana-integration.tf
resource "apono_resource_integration" "grafana-integration" {
  name                     = "Grafana"
  type                     = "grafana"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["grafana-datasource"]
  integration_config = {
    address = "<Grafana Portal URL>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
onelogin-group-integration.json
{
    "onelogin-group-integration": {
        "name": "OneLogin Group",
        "type": "onelogin-group",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "onelogin-role"
        ],
        "integration_config": {
            "subdomain": "<Subdomain>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
onelogin-group-integration.tf
resource "apono_integration" "onelogin-group-integration" {
  name                     = "OneLogin Group"
  type                     = "onelogin-group"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["onelogin-role"]
  metadata = {
    subdomain = "<Subdomain>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
onelogin-group-integration.tf
resource "apono_resource_integration" "onelogin-group-integration" {
  name                     = "OneLogin Group"
  type                     = "onelogin-group"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["onelogin-role"]
  integration_config = {
    subdomain = "<Subdomain>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}

Okta Group

This integration allows user to request temporary membership to Okta groups

Example Usage


okta-group-integration.tf
resource "apono_integration" "okta-group-integration" {
  name                     = "Okta Group"
  type                     = "okta-group"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["okta-group"]
  metadata = {
    org_url = "<Okta Organization URL>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
okta-group-integration.tf
resource "apono_resource_integration" "okta-group-integration" {
  name                     = "Okta Group"
  type                     = "okta-group"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["okta-group"]
  integration_config = {
    org_url = "<Okta Organization URL>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
okta-group-integration.json
{
    "okta-group-integration": {
        "name": "Okta Group",
        "type": "okta-group",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "okta-group"
        ],
        "integration_config": {
            "org_url": "<Okta Organization URL>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}

Schema


  • type okta-group

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • okta-group

Integration Config


  • org_url (Required | String) Okta Organization URL

MongoDB Atlas

Fully managed MongoDB service

Example Usage


mongodb-atlas-integration.tf
resource "apono_integration" "mongodb-atlas-integration" {
  name                     = "MongoDB Atlas"
  type                     = "mongodb-atlas"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mongodb-atlas-cluster"]
  metadata = {
    project_id = "<Project Id>"
    cluster_name = "<Cluster Name>"
    connection_type = "<Connection Type>"
    private_endpoint_id = "<Private Endpoint Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
mongodb-atlas-integration.tf
resource "apono_resource_integration" "mongodb-atlas-integration" {
  name                     = "MongoDB Atlas"
  type                     = "mongodb-atlas"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mongodb-atlas-cluster"]
  integration_config = {
    project_id = "<Project Id>"
    cluster_name = "<Cluster Name>"
    connection_type = "<Connection Type>"
    private_endpoint_id = "<Private Endpoint Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
mongodb-atlas-integration.json
{
    "mongodb-atlas-integration": {
        "name": "MongoDB Atlas",
        "type": "mongodb-atlas",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "mongodb-atlas-cluster"
        ],
        "integration_config": {
            "project_id": "<Project Id>",
            "cluster_name": "<Cluster Name>",
            "connection_type": "<Connection Type>",
            "private_endpoint_id": "<Private Endpoint Id>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type mongodb-atlas

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • mongodb-atlas-cluster

  • mongodb-atlas-database

  • mongodb-atlas-collection

  • mongodb-atlas-custom-role

Integration Config


  • project_id (Required | String) Project Id

  • cluster_name (Required | String) Cluster Name

  • connection_type (Required | String) Connection Type

    • Default value: Standard

    • Possible values: Standard, Private, PrivateEndpoint

  • private_endpoint_id (Optional | String) Private Endpoint Id

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

RabbitMQ

RabbitMQ is an open-source message-broker software that implements the Advanced Message Queuing Protocol (AMQP)

Example Usage


rabbitmq-integration.tf
resource "apono_integration" "rabbitmq-integration" {
  name                     = "RabbitMQ"
  type                     = "rabbitmq"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["rabbitmq-cluster-management"]
  metadata = {
    url = "<Url>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
rabbitmq-integration.tf
resource "apono_resource_integration" "rabbitmq-integration" {
  name                     = "RabbitMQ"
  type                     = "rabbitmq"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["rabbitmq-cluster-management"]
  integration_config = {
    url = "<Url>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
rabbitmq-integration.json
{
    "rabbitmq-integration": {
        "name": "RabbitMQ",
        "type": "rabbitmq",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "rabbitmq-cluster-management"
        ],
        "integration_config": {
            "url": "<Url>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type rabbitmq

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • rabbitmq-cluster-management

  • rabbitmq-vhost

Integration Config


  • url (Required | String) Url

Cloud Function Custom Integration

Cloud Function Custom Integration allows use GCP Cloud Function as a custom implementation for resource integration

Example Usage


cloudfunction-custom-integration-integration.tf
resource "apono_integration" "cloudfunction-custom-integration-integration" {
  name                     = "Cloud Function Custom Integration"
  type                     = "cloudfunction-custom-integration"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["custom-cloud-function"]
  metadata = {
    access_details = "<Access Details>"
    custom_parameters = "<Custom Parameters>"
    project_id = "<Project ID>"
    region = "<Region>"
    function_name = "<Function Name>"
  }
}
cloudfunction-custom-integration-integration.tf
resource "apono_resource_integration" "cloudfunction-custom-integration-integration" {
  name                     = "Cloud Function Custom Integration"
  type                     = "cloudfunction-custom-integration"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["custom-cloud-function"]
  integration_config = {
    access_details = "<Access Details>"
    custom_parameters = "<Custom Parameters>"
    project_id = "<Project ID>"
    region = "<Region>"
    function_name = "<Function Name>"
  }
}
cloudfunction-custom-integration-integration.json
{
    "cloudfunction-custom-integration-integration": {
        "name": "Cloud Function Custom Integration",
        "type": "cloudfunction-custom-integration",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "custom-cloud-function"
        ],
        "integration_config": {
            "access_details": "<Access Details>",
            "custom_parameters": "<Custom Parameters>",
            "project_id": "<Project ID>",
            "region": "<Region>",
            "function_name": "<Function Name>",
        }
    }
}

Schema


  • type cloudfunction-custom-integration

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • custom-cloud-function

Integration Config


  • access_details (Required | String) Access Details

  • custom_parameters (Required | String) Custom Parameters

  • project_id (Required | String) Project ID

  • region (Required | String) Region

  • function_name (Required | String) Function Name

Redis Cloud (Redislabs)

Redis Cloud delivers a fully managed Redis database offering hosted on major public cloud services.

Example Usage


redislabs-integration.tf
resource "apono_integration" "redislabs-integration" {
  name                     = "Redis Cloud (Redislabs)"
  type                     = "redislabs"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["redislabs-database"]
  metadata = {
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
redislabs-integration.tf
resource "apono_resource_integration" "redislabs-integration" {
  name                     = "Redis Cloud (Redislabs)"
  type                     = "redislabs"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["redislabs-database"]
  integration_config = {
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
redislabs-integration.json
{
    "redislabs-integration": {
        "name": "Redis Cloud (Redislabs)",
        "type": "redislabs",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "redislabs-database"
        ],
        "integration_config": {
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type redislabs

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • redislabs-database

Integration Config


  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

HashiCorp Vault

Example Usage


hashicorp-vault-integration.tf
resource "apono_integration" "hashicorp-vault-integration" {
  name                     = "HashiCorp Vault"
  type                     = "hashicorp-vault"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["hashicorp-vault-kv-secret"]
  metadata = {
    address = "<Vault URL>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
hashicorp-vault-integration.tf
resource "apono_resource_integration" "hashicorp-vault-integration" {
  name                     = "HashiCorp Vault"
  type                     = "hashicorp-vault"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["hashicorp-vault-kv-secret"]
  integration_config = {
    address = "<Vault URL>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
hashicorp-vault-integration.json
{
    "hashicorp-vault-integration": {
        "name": "HashiCorp Vault",
        "type": "hashicorp-vault",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "hashicorp-vault-kv-secret"
        ],
        "integration_config": {
            "address": "<Vault URL>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type hashicorp-vault

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • hashicorp-vault-kv-secret

  • hashicorp-vault-transit-key

Integration Config


  • address (Required | String) Vault URL

Kubernetes

Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

Example Usage


Schema


  • type k8s-roles

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • k8s-cluster

  • k8s-namespace

  • k8s-secret

  • k8s-configmap

  • k8s-deployment

  • k8s-statefulset

  • k8s-ingress

  • k8s-cronjob

  • k8s-job

  • k8s-daemonset

Integration Config


  • cluster_name (Required | String) kubeconfig Cluster Name

  • kubeconfig_api_server_url (Required | String) kubeconfig Server URL

  • server_url (Optional | String) Server URL

  • certificate_authority (Optional | String) Certificate Authority

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Google AlloyDB

Google Cloud AlloyDB is a fully managed, high-performance PostgreSQL-compatible database service. It offers low-latency, automatic scaling, and integrates with Google Cloud’s AI&#x2F;ML tools, making

Example Usage


Schema


  • type gcp-alloydb

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • gcp-alloydb-database

  • gcp-alloydb-table

  • gcp-alloydb-role

Integration Config


  • auth_type (Required | String) Auth Type

    • Possible values: gcp-alloydb-iam-auth, user-password

  • gcp_project_id (Required | String) Project ID

  • gcp_region (Required | String) Location

  • gcp_alloydb_cluster (Required | String) Cluster ID

  • gcp_instance_id (Required | String) Primary Instance ID

  • port (Required | String) Port

    • Default value: 5432

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

PostgreSQL

An open-source relational database management system emphasizing extensibility and SQL compliance.

Example Usage


Schema


  • type postgresql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • postgresql-instance

  • postgresql-database

  • postgresql-table

  • postgresql-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 5432

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Required | String) SSL Mode

    • Default value: disable

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Google Kubernetes Engine (GKE)

Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

Example Usage


Schema


  • type gcp-gke

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • gcp-gke-cluster

  • gcp-gke-namespace

  • gcp-gke-secret

  • gcp-gke-configmap

  • gcp-gke-deployment

  • gcp-gke-statefulset

  • gcp-gke-ingress

  • gcp-gke-cronjob

  • gcp-gke-job

  • gcp-gke-daemonset

Integration Config


  • server_url (Optional | String) Server URL

  • certificate_authority (Optional | String) Certificate Authority

  • project_id (Optional | String) Project ID

  • region (Optional | String) Region

  • cluster_name (Optional | String) Cluster Name

Amazon Redshift

Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud.

Example Usage


Schema


  • type redshift

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • aws-redshift-database

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 5439

  • db_name (Required | String) Database Name

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Vertica Database

Vertica is a high-performance, scalable analytics database designed for fast querying and analytics on large datasets.

Example Usage


Schema


  • type vertica

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • vertica-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 5433

  • dbname (Required | String) Database Name

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Google Organization

Google Organization

Example Usage


Schema


  • type gcp-organization

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • gcp-organization

  • gcp-organization-folder

  • gcp-organization-project

  • gcp-organization-function

  • gcp-organization-secret-manager-secret

  • gcp-organization-bigquery-dataset

  • gcp-organization-bigquery-table

  • gcp-organization-kms-key-ring

  • gcp-organization-kms-key

  • gcp-organization-cloud-storage-bucket

  • gcp-organization-spanner-instance

  • gcp-organization-spanner-instance-database

  • gcp-organization-compute-instance

  • gcp-organization-cloud-run-service

  • gcp-organization-cloud-run-job

  • gcp-organization-artifact-registry-repository

  • gcp-organization-pubsub-topic

  • gcp-organization-pubsub-subscription

  • gcp-organization-service-account

Integration Config


  • organization_id (Required | String) Organization ID

  • customer_id (Optional | String) Customer ID

Windows Domain Controller

A Windows Domain Controller is the hub of network management in a Windows domain, handling user authentication, resource access, and security policies.

Example Usage


Schema


  • type windows-domain-controller

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • windows-domain-controller-server

  • windows-domain-controller-server-group

Integration Config


  • host (Required | String) Host

  • port (Required | String) WinRM Port

    • Default value: 5985

  • rdp_port (Optional | String) RDP Port

    • Default value: 3389

  • ssl (Required | String) Use SSL connection

    • Default value: false

    • Possible values: false, true

  • email_selector_field_name_override (Optional | String) User Email Attribute Name

    • Default value: UserPrincipalName

Elasticsearch

Elasticsearch is a distributed, RESTful search and analytics engine capable of addressing a growing number of use cases

Example Usage


Schema


  • type elasticsearch

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • elasticsearch-role

  • elasticsearch-index

  • elasticsearch-cluster

Integration Config


  • url (Required | String) Url

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Kubernetes Proxy

Allow proxy using kubernetes port forward to socat tunnel

Example Usage


Schema


  • type k8s-port-forward-proxy

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • k8s-port-forward-proxy

Integration Config


  • target_host (Required | String) Target Host

  • target_port (Required | String) Target Port

  • local_port (Required | String) Local Port

  • proxy_id (Required | String) Proxy ID

  • server_url (Optional | String) Server URL

  • certificate_authority (Optional | String) Certificate Authority

  • cluster_name (Required | String) kubeconfig Cluster Name

  • kubeconfig_api_server_url (Optional | String) kubeconfig Server URL

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Rancher

Rancher is a Kubernetes management tool to deploy and run clusters anywhere and on any provider.

Example Usage


Schema


  • type rancher

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • rancher-cluster

  • rancher-project

Integration Config


  • host (Required | String) Host

  • port (Required | String) Port

  • certificate_authority (Optional | String) Certificate Authority

  • rancher_ui_url (Optional | String) Rancher UI URL

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Microsoft SQL Server

Microsoft SQL Server Integration

Example Usage


Schema


  • type mssql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • mssql-server-role

  • mssql-database

  • mssql-table

  • mssql-view

  • mssql-function

  • mssql-procedure

  • mssql-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 1433

  • dbname (Required | String) Database Name

    • Default value: master

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

k8s-roles-integration.json
{
    "k8s-roles-integration": {
        "name": "Kubernetes",
        "type": "k8s-roles",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "k8s-cluster"
        ],
        "integration_config": {
            "cluster_name": "<kubeconfig Cluster Name>",
            "kubeconfig_api_server_url": "<kubeconfig Server URL>",
            "server_url": "<Server URL>",
            "certificate_authority": "<Certificate Authority>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
k8s-roles-integration.tf
resource "apono_integration" "k8s-roles-integration" {
  name                     = "Kubernetes"
  type                     = "k8s-roles"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["k8s-cluster"]
  metadata = {
    cluster_name = "<kubeconfig Cluster Name>"
    kubeconfig_api_server_url = "<kubeconfig Server URL>"
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
k8s-roles-integration.tf
resource "apono_resource_integration" "k8s-roles-integration" {
  name                     = "Kubernetes"
  type                     = "k8s-roles"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["k8s-cluster"]
  integration_config = {
    cluster_name = "<kubeconfig Cluster Name>"
    kubeconfig_api_server_url = "<kubeconfig Server URL>"
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
gcp-alloydb-integration.tf
resource "apono_resource_integration" "gcp-alloydb-integration" {
  name                     = "Google AlloyDB"
  type                     = "gcp-alloydb"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-alloydb-database"]
  integration_config = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Location>"
    gcp_alloydb_cluster = "<Cluster ID>"
    gcp_instance_id = "<Primary Instance ID>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    gcp = {
      project    = "project_template_value"
      secret_id  = "gcp_secret_id_template_value"
    }
}
gcp-alloydb-integration.json
{
    "gcp-alloydb-integration": {
        "name": "Google AlloyDB",
        "type": "gcp-alloydb",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "gcp-alloydb-database"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "gcp_project_id": "<Project ID>",
            "gcp_region": "<Location>",
            "gcp_alloydb_cluster": "<Cluster ID>",
            "gcp_instance_id": "<Primary Instance ID>",
            "port": "<Port>",
            "dbname": "<Database Name>",
            "sslmode": "<SSL Mode>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "project": "project_template_value",
    	    "secret_id": "gcp_secret_id_template_value"
  	    }
    }
}
gcp-alloydb-integration.tf
resource "apono_integration" "gcp-alloydb-integration" {
  name                     = "Google AlloyDB"
  type                     = "gcp-alloydb"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-alloydb-database"]
  metadata = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Location>"
    gcp_alloydb_cluster = "<Cluster ID>"
    gcp_instance_id = "<Primary Instance ID>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  gcp_secret = {
    project    = "project_template_value"
    secret_id  = "gcp_secret_id_template_value"
  }
}
postgresql-integration.json
{
    "postgresql-integration": {
        "name": "PostgreSQL",
        "type": "postgresql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "postgresql-instance"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "dbname": "<Database Name>",
            "sslmode": "<SSL Mode>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
postgresql-integration.tf
resource "apono_integration" "postgresql-integration" {
  name                     = "PostgreSQL"
  type                     = "postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["postgresql-instance"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
postgresql-integration.tf
resource "apono_resource_integration" "postgresql-integration" {
  name                     = "PostgreSQL"
  type                     = "postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["postgresql-instance"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
gcp-gke-integration.json
{
    "gcp-gke-integration": {
        "name": "Google Kubernetes Engine (GKE)",
        "type": "gcp-gke",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "gcp-gke-cluster"
        ],
        "integration_config": {
            "server_url": "<Server URL>",
            "certificate_authority": "<Certificate Authority>",
            "project_id": "<Project ID>",
            "region": "<Region>",
            "cluster_name": "<Cluster Name>",
        },
	"secret_store_config": {
    	    "project": "project_template_value",
    	    "secret_id": "gcp_secret_id_template_value"
  	    }
    }
}
gcp-gke-integration.tf
resource "apono_integration" "gcp-gke-integration" {
  name                     = "Google Kubernetes Engine (GKE)"
  type                     = "gcp-gke"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-gke-cluster"]
  metadata = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    project_id = "<Project ID>"
    region = "<Region>"
    cluster_name = "<Cluster Name>"
  }
  gcp_secret = {
    project    = "project_template_value"
    secret_id  = "gcp_secret_id_template_value"
  }
}
gcp-gke-integration.tf
resource "apono_resource_integration" "gcp-gke-integration" {
  name                     = "Google Kubernetes Engine (GKE)"
  type                     = "gcp-gke"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-gke-cluster"]
  integration_config = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    project_id = "<Project ID>"
    region = "<Region>"
    cluster_name = "<Cluster Name>"
  }
  secret_store_config = {
    gcp = {
      project    = "project_template_value"
      secret_id  = "gcp_secret_id_template_value"
    }
}
redshift-integration.json
{
    "redshift-integration": {
        "name": "Amazon Redshift",
        "type": "redshift",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-redshift-database"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "db_name": "<Database Name>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
redshift-integration.tf
resource "apono_integration" "redshift-integration" {
  name                     = "Amazon Redshift"
  type                     = "redshift"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-redshift-database"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    db_name = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
redshift-integration.tf
resource "apono_resource_integration" "redshift-integration" {
  name                     = "Amazon Redshift"
  type                     = "redshift"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-redshift-database"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    db_name = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
vertica-integration.json
{
    "vertica-integration": {
        "name": "Vertica Database",
        "type": "vertica",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "vertica-role"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "dbname": "<Database Name>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
vertica-integration.tf
resource "apono_integration" "vertica-integration" {
  name                     = "Vertica Database"
  type                     = "vertica"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["vertica-role"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
vertica-integration.tf
resource "apono_resource_integration" "vertica-integration" {
  name                     = "Vertica Database"
  type                     = "vertica"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["vertica-role"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
gcp-organization-integration.tf
resource "apono_integration" "gcp-organization-integration" {
  name                     = "Google Organization"
  type                     = "gcp-organization"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-organization"]
  metadata = {
    organization_id = "<Organization ID>"
    customer_id = "<Customer ID>"
  }
}
gcp-organization-integration.tf
resource "apono_resource_integration" "gcp-organization-integration" {
  name                     = "Google Organization"
  type                     = "gcp-organization"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-organization"]
  integration_config = {
    organization_id = "<Organization ID>"
    customer_id = "<Customer ID>"
  }
}
gcp-organization-integration.json
{
    "gcp-organization-integration": {
        "name": "Google Organization",
        "type": "gcp-organization",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "gcp-organization"
        ],
        "integration_config": {
            "organization_id": "<Organization ID>",
            "customer_id": "<Customer ID>",
        }
    }
}
windows-domain-controller-integration.json
{
    "windows-domain-controller-integration": {
        "name": "Windows Domain Controller",
        "type": "windows-domain-controller",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "windows-domain-controller-server"
        ],
        "integration_config": {
            "host": "<Host>",
            "port": "<WinRM Port>",
            "rdp_port": "<RDP Port>",
            "ssl": "<Use SSL connection>",
            "email_selector_field_name_override": "<User Email Attribute Name>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
windows-domain-controller-integration.tf
resource "apono_integration" "windows-domain-controller-integration" {
  name                     = "Windows Domain Controller"
  type                     = "windows-domain-controller"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["windows-domain-controller-server"]
  metadata = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    email_selector_field_name_override = "<User Email Attribute Name>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
windows-domain-controller-integration.tf
resource "apono_resource_integration" "windows-domain-controller-integration" {
  name                     = "Windows Domain Controller"
  type                     = "windows-domain-controller"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["windows-domain-controller-server"]
  integration_config = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    email_selector_field_name_override = "<User Email Attribute Name>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
elasticsearch-integration.json
{
    "elasticsearch-integration": {
        "name": "Elasticsearch",
        "type": "elasticsearch",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "elasticsearch-role"
        ],
        "integration_config": {
            "url": "<Url>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
elasticsearch-integration.tf
resource "apono_integration" "elasticsearch-integration" {
  name                     = "Elasticsearch"
  type                     = "elasticsearch"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["elasticsearch-role"]
  metadata = {
    url = "<Url>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
elasticsearch-integration.tf
resource "apono_resource_integration" "elasticsearch-integration" {
  name                     = "Elasticsearch"
  type                     = "elasticsearch"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["elasticsearch-role"]
  integration_config = {
    url = "<Url>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
k8s-port-forward-proxy-integration.tf
resource "apono_resource_integration" "k8s-port-forward-proxy-integration" {
  name                     = "Kubernetes Proxy"
  type                     = "k8s-port-forward-proxy"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["k8s-port-forward-proxy"]
  integration_config = {
    target_host = "<Target Host>"
    target_port = "<Target Port>"
    local_port = "<Local Port>"
    proxy_id = "<Proxy ID>"
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    cluster_name = "<kubeconfig Cluster Name>"
    kubeconfig_api_server_url = "<kubeconfig Server URL>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
k8s-port-forward-proxy-integration.json
{
    "k8s-port-forward-proxy-integration": {
        "name": "Kubernetes Proxy",
        "type": "k8s-port-forward-proxy",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "k8s-port-forward-proxy"
        ],
        "integration_config": {
            "target_host": "<Target Host>",
            "target_port": "<Target Port>",
            "local_port": "<Local Port>",
            "proxy_id": "<Proxy ID>",
            "server_url": "<Server URL>",
            "certificate_authority": "<Certificate Authority>",
            "cluster_name": "<kubeconfig Cluster Name>",
            "kubeconfig_api_server_url": "<kubeconfig Server URL>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
k8s-port-forward-proxy-integration.tf
resource "apono_integration" "k8s-port-forward-proxy-integration" {
  name                     = "Kubernetes Proxy"
  type                     = "k8s-port-forward-proxy"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["k8s-port-forward-proxy"]
  metadata = {
    target_host = "<Target Host>"
    target_port = "<Target Port>"
    local_port = "<Local Port>"
    proxy_id = "<Proxy ID>"
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    cluster_name = "<kubeconfig Cluster Name>"
    kubeconfig_api_server_url = "<kubeconfig Server URL>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  aws_secret = {
    region    = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
  }
}
rancher-integration.json
{
    "rancher-integration": {
        "name": "Rancher",
        "type": "rancher",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "rancher-cluster"
        ],
        "integration_config": {
            "host": "<Host>",
            "port": "<Port>",
            "certificate_authority": "<Certificate Authority>",
            "rancher_ui_url": "<Rancher UI URL>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
rancher-integration.tf
resource "apono_integration" "rancher-integration" {
  name                     = "Rancher"
  type                     = "rancher"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["rancher-cluster"]
  metadata = {
    host = "<Host>"
    port = "<Port>"
    certificate_authority = "<Certificate Authority>"
    rancher_ui_url = "<Rancher UI URL>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
rancher-integration.tf
resource "apono_resource_integration" "rancher-integration" {
  name                     = "Rancher"
  type                     = "rancher"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["rancher-cluster"]
  integration_config = {
    host = "<Host>"
    port = "<Port>"
    certificate_authority = "<Certificate Authority>"
    rancher_ui_url = "<Rancher UI URL>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
mssql-integration.json
{
    "mssql-integration": {
        "name": "Microsoft SQL Server",
        "type": "mssql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "mssql-server-role"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "dbname": "<Database Name>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
mssql-integration.tf
resource "apono_integration" "mssql-integration" {
  name                     = "Microsoft SQL Server"
  type                     = "mssql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mssql-server-role"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
mssql-integration.tf
resource "apono_resource_integration" "mssql-integration" {
  name                     = "Microsoft SQL Server"
  type                     = "mssql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mssql-server-role"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}

Mongo Atlas Portal

MongoDB Atlas UI is a user-friendly platform for managing and deploying MongoDB databases in the cloud.

Example Usage


mongodb-atlas-organization-integration.tf
resource "apono_integration" "mongodb-atlas-organization-integration" {
  name                     = "Mongo Atlas Portal"
  type                     = "mongodb-atlas-organization"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mongodb-atlas-organization"]
  metadata = {
    organization_id = "<Organization Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
mongodb-atlas-organization-integration.tf
resource "apono_resource_integration" "mongodb-atlas-organization-integration" {
  name                     = "Mongo Atlas Portal"
  type                     = "mongodb-atlas-organization"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mongodb-atlas-organization"]
  integration_config = {
    organization_id = "<Organization Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
mongodb-atlas-organization-integration.json
{
    "mongodb-atlas-organization-integration": {
        "name": "Mongo Atlas Portal",
        "type": "mongodb-atlas-organization",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "mongodb-atlas-organization"
        ],
        "integration_config": {
            "organization_id": "<Organization Id>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type mongodb-atlas-organization

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • mongodb-atlas-organization

  • mongodb-atlas-organization-project

Integration Config


  • organization_id (Required | String) Organization Id

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Oracle Database

Oracle Database is a powerful and widely-used relational database management system known for its robustness, scalability, and comprehensive feature set, developed and maintained by Oracle Corporation

Example Usage


oracle-db-integration.tf
resource "apono_integration" "oracle-db-integration" {
  name                     = "Oracle Database"
  type                     = "oracle-db"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["oracle-db-role"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    service_name = "<Sarvice Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
oracle-db-integration.tf
resource "apono_resource_integration" "oracle-db-integration" {
  name                     = "Oracle Database"
  type                     = "oracle-db"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["oracle-db-role"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    service_name = "<Sarvice Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
oracle-db-integration.json
{
    "oracle-db-integration": {
        "name": "Oracle Database",
        "type": "oracle-db",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "oracle-db-role"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "service_name": "<Sarvice Name>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type oracle-db

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • oracle-db-role

  • oracle-db-table

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 1521

  • service_name (Required | String) Sarvice Name

    • Default value: ORCL

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

MySQL

An open-source relational database management system.

Example Usage


mysql-integration.tf
resource "apono_integration" "mysql-integration" {
  name                     = "MySQL"
  type                     = "mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mysql-instance"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
mysql-integration.tf
resource "apono_resource_integration" "mysql-integration" {
  name                     = "MySQL"
  type                     = "mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mysql-instance"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
mysql-integration.json
{
    "mysql-integration": {
        "name": "MySQL",
        "type": "mysql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "mysql-instance"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "custom_permissions_json": "<Custom Permissions (JSON array that maps custom permissions to actions)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type mysql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • mysql-instance

  • mysql-database

  • mysql-table

  • mysql-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 3306

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • custom_permissions_json (Optional | String) Custom Permissions (JSON array that maps custom permissions to actions)

SSH

This integration allows user to request temporary SSH access

Example Usage


ssh-integration.tf
resource "apono_integration" "ssh-integration" {
  name                     = "SSH"
  type                     = "ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["ssh-server"]
  metadata = {
    servers = "<Servers>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
ssh-integration.tf
resource "apono_resource_integration" "ssh-integration" {
  name                     = "SSH"
  type                     = "ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["ssh-server"]
  integration_config = {
    servers = "<Servers>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
ssh-integration.json
{
    "ssh-integration": {
        "name": "SSH",
        "type": "ssh",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "ssh-server"
        ],
        "integration_config": {
            "servers": "<Servers>",
            "groups": "<User Groups>",
            "shell": "<User&#39;s Login Shell>",
            "user_key_name": "<User Key Name>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type ssh

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • ssh-server

Integration Config


  • servers (Required | String) Servers

  • groups (Optional | String) User Groups

  • shell (Optional | String) User's Login Shell

  • user_key_name (Optional | String) User Key Name

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

OpenSearch

OpenSearch is a search engine based on Apache Lucene, a free and open-source search engine

Example Usage


opensearch-integration.tf
resource "apono_integration" "opensearch-integration" {
  name                     = "OpenSearch"
  type                     = "opensearch"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["opensearch-role"]
  metadata = {
    auth_type = "<Auth Type>"
    url = "<Url>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    sso_url = "<SSO Portal URL>"
  }
}
opensearch-integration.tf
resource "apono_resource_integration" "opensearch-integration" {
  name                     = "OpenSearch"
  type                     = "opensearch"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["opensearch-role"]
  integration_config = {
    auth_type = "<Auth Type>"
    url = "<Url>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    sso_url = "<SSO Portal URL>"
  }
}
opensearch-integration.json
{
    "opensearch-integration": {
        "name": "OpenSearch",
        "type": "opensearch",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "opensearch-role"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "url": "<Url>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "sso_url": "<SSO Portal URL>",
        }
    }
}

Schema


  • type opensearch

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • opensearch-role

  • opensearch-index

Integration Config


  • auth_type (Optional | String) Auth Type

    • Default value: user-password

    • Possible values: sso-auth, user-password

  • url (Required | String) Url

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • sso_url (Optional | String) SSO Portal URL

Google Cloud SQL - PostgreSQL

An open-source relational database management system emphasizing extensibility and SQL compliance.

Example Usage


gcp-cloud-sql-postgresql-integration.tf
resource "apono_integration" "gcp-cloud-sql-postgresql-integration" {
  name                     = "Google Cloud SQL - PostgreSQL"
  type                     = "gcp-cloud-sql-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-cloud-sql-postgresql-instance"]
  metadata = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  gcp_secret = {
    project    = "project_template_value"
    secret_id  = "gcp_secret_id_template_value"
  }
}
gcp-cloud-sql-postgresql-integration.tf
resource "apono_resource_integration" "gcp-cloud-sql-postgresql-integration" {
  name                     = "Google Cloud SQL - PostgreSQL"
  type                     = "gcp-cloud-sql-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-cloud-sql-postgresql-instance"]
  integration_config = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    gcp = {
      project    = "project_template_value"
      secret_id  = "gcp_secret_id_template_value"
    }
}
gcp-cloud-sql-postgresql-integration.json
{
    "gcp-cloud-sql-postgresql-integration": {
        "name": "Google Cloud SQL - PostgreSQL",
        "type": "gcp-cloud-sql-postgresql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "gcp-cloud-sql-postgresql-instance"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "gcp_project_id": "<Project ID>",
            "gcp_region": "<Region>",
            "gcp_instance_id": "<Instance ID>",
            "gcp_instance_id_user_override": "<Instance ID User Override>",
            "dbname": "<Database Name>",
            "sslmode": "<SSL Mode>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "project": "project_template_value",
    	    "secret_id": "gcp_secret_id_template_value"
  	    }
    }
}

Schema


  • type gcp-cloud-sql-postgresql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • gcp-cloud-sql-postgresql-instance

  • gcp-cloud-sql-postgresql-database

  • gcp-cloud-sql-postgresql-table

  • gcp-cloud-sql-postgresql-role

Integration Config


  • auth_type (Required | String) Auth Type

    • Possible values: gcp-iam-auth, user-password

  • gcp_project_id (Required | String) Project ID

  • gcp_region (Required | String) Region

  • gcp_instance_id (Required | String) Instance ID

  • gcp_instance_id_user_override (Optional | String) Instance ID User Override

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

F5 Network

Integration that allows users to request access to a F5 Webtop

Example Usage


f5-webtop-integration.tf
resource "apono_integration" "f5-webtop-integration" {
  name                     = "F5 Network"
  type                     = "f5-webtop"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["f5-webtop-policy"]
  metadata = {
    hostname = "<F5 Hostname>"
    access_profile_id = "<Access Profile Id>"
    resource_assign_id = "<Resource Assign Id>"
    webtop = "<Webtop>"
    webtop_sections = "<Webtop Sections (Optional)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
f5-webtop-integration.tf
resource "apono_resource_integration" "f5-webtop-integration" {
  name                     = "F5 Network"
  type                     = "f5-webtop"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["f5-webtop-policy"]
  integration_config = {
    hostname = "<F5 Hostname>"
    access_profile_id = "<Access Profile Id>"
    resource_assign_id = "<Resource Assign Id>"
    webtop = "<Webtop>"
    webtop_sections = "<Webtop Sections (Optional)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
f5-webtop-integration.json
{
    "f5-webtop-integration": {
        "name": "F5 Network",
        "type": "f5-webtop",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "f5-webtop-policy"
        ],
        "integration_config": {
            "hostname": "<F5 Hostname>",
            "access_profile_id": "<Access Profile Id>",
            "resource_assign_id": "<Resource Assign Id>",
            "webtop": "<Webtop>",
            "webtop_sections": "<Webtop Sections (Optional)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type f5-webtop

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • f5-webtop-policy

Integration Config


  • hostname (Required | String) F5 Hostname

  • access_profile_id (Required | String) Access Profile Id

  • resource_assign_id (Required | String) Resource Assign Id

  • webtop (Required | String) Webtop

  • webtop_sections (Optional | String) Webtop Sections (Optional)

MongoDB

An opensource NoSQL database program. MongoDB uses JSON-like documents with optional schemas.

Example Usage


mongodb-integration.tf
resource "apono_integration" "mongodb-integration" {
  name                     = "MongoDB"
  type                     = "mongodb"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mongodb-cluster"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
mongodb-integration.tf
resource "apono_resource_integration" "mongodb-integration" {
  name                     = "MongoDB"
  type                     = "mongodb"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mongodb-cluster"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
mongodb-integration.json
{
    "mongodb-integration": {
        "name": "MongoDB",
        "type": "mongodb",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "mongodb-cluster"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type mongodb

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • mongodb-cluster

  • mongodb-database

  • mongodb-custom-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 27017

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

LDAP Group

LDAP (Lightweight Directory Access Protocol) is a standardized protocol for accessing and managing directory services, crucial for centralized authentication and data storage in networks.

Example Usage


ldap-directory-integration.tf
resource "apono_integration" "ldap-directory-integration" {
  name                     = "LDAP Group"
  type                     = "ldap-directory"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["ldap-directory-group"]
  metadata = {
    url = "<LDAP Server URL>"
    custom_ca_cert = "<Self signed server or CA certificate>"
    domain = "<Domain>"
    groups_scope = "<Groups Scope>"
    users_scope = "<Users Scope>"
    user_email_attribute = "<User Email Attribute>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
ldap-directory-integration.tf
resource "apono_resource_integration" "ldap-directory-integration" {
  name                     = "LDAP Group"
  type                     = "ldap-directory"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["ldap-directory-group"]
  integration_config = {
    url = "<LDAP Server URL>"
    custom_ca_cert = "<Self signed server or CA certificate>"
    domain = "<Domain>"
    groups_scope = "<Groups Scope>"
    users_scope = "<Users Scope>"
    user_email_attribute = "<User Email Attribute>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
ldap-directory-integration.json
{
    "ldap-directory-integration": {
        "name": "LDAP Group",
        "type": "ldap-directory",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "ldap-directory-group"
        ],
        "integration_config": {
            "url": "<LDAP Server URL>",
            "custom_ca_cert": "<Self signed server or CA certificate>",
            "domain": "<Domain>",
            "groups_scope": "<Groups Scope>",
            "users_scope": "<Users Scope>",
            "user_email_attribute": "<User Email Attribute>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type ldap-directory

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • ldap-directory-group

Integration Config


  • url (Required | String) LDAP Server URL

  • custom_ca_cert (Optional | String) Self signed server or CA certificate

  • domain (Required | String) Domain

  • groups_scope (Optional | String) Groups Scope

  • users_scope (Optional | String) Users Scope

  • user_email_attribute (Optional | String) User Email Attribute

Google Cloud SQL - MySQL

An open-source relational database management system.

Example Usage


gcp-cloud-sql-mysql-integration.tf
resource "apono_integration" "gcp-cloud-sql-mysql-integration" {
  name                     = "Google Cloud SQL - MySQL"
  type                     = "gcp-cloud-sql-mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-cloud-sql-mysql-instance"]
  metadata = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  gcp_secret = {
    project    = "project_template_value"
    secret_id  = "gcp_secret_id_template_value"
  }
}
gcp-cloud-sql-mysql-integration.tf
resource "apono_resource_integration" "gcp-cloud-sql-mysql-integration" {
  name                     = "Google Cloud SQL - MySQL"
  type                     = "gcp-cloud-sql-mysql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["gcp-cloud-sql-mysql-instance"]
  integration_config = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    gcp = {
      project    = "project_template_value"
      secret_id  = "gcp_secret_id_template_value"
    }
}
gcp-cloud-sql-mysql-integration.json
{
    "gcp-cloud-sql-mysql-integration": {
        "name": "Google Cloud SQL - MySQL",
        "type": "gcp-cloud-sql-mysql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "gcp-cloud-sql-mysql-instance"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "gcp_project_id": "<Project ID>",
            "gcp_region": "<Region>",
            "gcp_instance_id": "<Instance ID>",
            "gcp_instance_id_user_override": "<Instance ID User Override>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "project": "project_template_value",
    	    "secret_id": "gcp_secret_id_template_value"
  	    }
    }
}

Schema


  • type gcp-cloud-sql-mysql

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • gcp-cloud-sql-mysql-instance

  • gcp-cloud-sql-mysql-database

  • gcp-cloud-sql-mysql-table

  • gcp-cloud-sql-mysql-role

Integration Config


  • auth_type (Required | String) Auth Type

    • Possible values: gcp-iam-auth, user-password

  • gcp_project_id (Required | String) Project ID

  • gcp_region (Required | String) Region

  • gcp_instance_id (Required | String) Instance ID

  • gcp_instance_id_user_override (Optional | String) Instance ID User Override

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

Snowflake

Snowflake is a fully managed SaaS (software as a service) that provides a single platform for data warehousing, data lakes, data engineering, data science, data application development, and secure sha

Example Usage


snowflake-integration.tf
resource "apono_integration" "snowflake-integration" {
  name                     = "Snowflake"
  type                     = "snowflake"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["snowflake-role"]
  metadata = {
    hostname = "<Hostname>"
    auth_type = "<Select Auth Type>"
    role = "<Role>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    sso_url = "<SSO Portal URL>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
snowflake-integration.tf
resource "apono_resource_integration" "snowflake-integration" {
  name                     = "Snowflake"
  type                     = "snowflake"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["snowflake-role"]
  integration_config = {
    hostname = "<Hostname>"
    auth_type = "<Select Auth Type>"
    role = "<Role>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    sso_url = "<SSO Portal URL>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
snowflake-integration.json
{
    "snowflake-integration": {
        "name": "Snowflake",
        "type": "snowflake",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "snowflake-role"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "auth_type": "<Select Auth Type>",
            "role": "<Role>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "sso_url": "<SSO Portal URL>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

Schema


  • type snowflake

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • snowflake-role

Integration Config


  • hostname (Required | String) Hostname

  • auth_type (Optional | String) Select Auth Type

    • Default value: user-password

    • Possible values: sso-auth, user-password

  • role (Optional | String) Role

    • Default value: ACCOUNTADMIN

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • sso_url (Optional | String) SSO Portal URL

MariaDB

An open-source relational database management system.

Example Usage


Schema


  • type mariadb

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • mariadb-instance

  • mariadb-database

  • mariadb-table

  • mariadb-role

Integration Config


  • hostname (Required | String) Hostname

  • port (Required | String) Port

    • Default value: 3306

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • custom_permissions_json (Optional | String) Custom Permissions (JSON array that maps custom permissions to actions)

RDP

This integration allows user to request temporary RDP access

Example Usage


Schema


  • type rdp

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • rdp-server

  • rdp-server-group

Integration Config


  • host (Required | String) Host

  • port (Required | String) WinRM Port

    • Default value: 5985

  • rdp_port (Optional | String) RDP Port

    • Default value: 3389

  • ssl (Required | String) Use SSL connection

    • Default value: false

    • Possible values: false, true

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

mariadb-integration.json
{
    "mariadb-integration": {
        "name": "MariaDB",
        "type": "mariadb",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "mariadb-instance"
        ],
        "integration_config": {
            "hostname": "<Hostname>",
            "port": "<Port>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "custom_permissions_json": "<Custom Permissions (JSON array that maps custom permissions to actions)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
mariadb-integration.tf
resource "apono_integration" "mariadb-integration" {
  name                     = "MariaDB"
  type                     = "mariadb"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mariadb-instance"]
  metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
mariadb-integration.tf
resource "apono_resource_integration" "mariadb-integration" {
  name                     = "MariaDB"
  type                     = "mariadb"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["mariadb-instance"]
  integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}
rdp-integration.json
{
    "rdp-integration": {
        "name": "RDP",
        "type": "rdp",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "rdp-server"
        ],
        "integration_config": {
            "host": "<Host>",
            "port": "<WinRM Port>",
            "rdp_port": "<RDP Port>",
            "ssl": "<Use SSL connection>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
rdp-integration.tf
resource "apono_integration" "rdp-integration" {
  name                     = "RDP"
  type                     = "rdp"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["rdp-server"]
  metadata = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
rdp-integration.tf
resource "apono_resource_integration" "rdp-integration" {
  name                     = "RDP"
  type                     = "rdp"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["rdp-server"]
  integration_config = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}