Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes that automatically syncs applications from a Git repository to a cluster.
{
"argocd-integration": {
"name": "ArgoCD",
"type": "argocd",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"argocd-global-role"
],
"integration_config": {
"k8s_server_url": "<Kubernetes Server URL>",
"argocd_ui_url": "<ArgoCD UI URL>",
"k8s_certificate_authority": "<Kubernetes Certificate Authority>",
"argo_namespace": "<ArgoCD Namespace>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}Amazon Relational Database Service (Amazon RDS) is a collection of managed services that makes it simple to set up, operate, and scale databases in the cloud.
resource "apono_resource_integration" "aws-ec2-ssh-integration" {
name = "AWS EC2 SSH"
type = "aws-ec2-ssh"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-ec2-ssh-server"]
integration_config = {
region = "<Region>"
user = "<User>"
groups = "<User Groups>"
shell = "<User's Login Shell>"
user_key_name = "<User Key Name>"
ip_type_preference = "<IP Type Preference>"
cross_account_role_arn = "<Cross Account Role ARN>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
aws = {
region = "aws_region_template_value"
secret_id = "aws_secret_id_template_value"
}
}{
"aws-ec2-ssh-integration": {
"name": "AWS EC2 SSH",
"type": "aws-ec2-ssh",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-ec2-ssh-server"
],
"integration_config": {
"region": "<Region>",
"user": "<User>",
"groups": "<User Groups>",
"shell": "<User's Login Shell>",
"user_key_name": "<User Key Name>",
"ip_type_preference": "<IP Type Preference>",
"cross_account_role_arn": "<Cross Account Role ARN>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"grafana-integration": {
"name": "Grafana",
"type": "grafana",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"grafana-datasource"
],
"integration_config": {
"address": "<Grafana Portal URL>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"harmony-integration": {
"name": "Harmony",
"type": "harmony",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"harmony-group"
],
"integration_config": {
"region": "<Region>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}resource "apono_integration" "azure-ad-integration" {
name = "Entra ID (Azure AD) Groups"
type = "azure-ad"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-ad-group"]
metadata = {
cloud_type = "<Cloud Type>"
}
}resource "apono_resource_integration" "azure-ad-integration" {
name = "Entra ID (Azure AD) Groups"
type = "azure-ad"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-ad-group"]
integration_config = {
cloud_type = "<Cloud Type>"
}
}{
"azure-ad-integration": {
"name": "Entra ID (Azure AD) Groups",
"type": "azure-ad",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-ad-group"
],
"integration_config": {
"cloud_type": "<Cloud Type>",
}
}
}resource "apono_integration" "aws-account-integration" {
name = "Amazon Account"
type = "aws-account"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-account-s3-bucket"]
metadata = {
region = "<Region>"
profile = "<AWS Profile Name (Optional)>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
enable_audit = "<Enable Audit>"
}
}resource "apono_resource_integration" "aws-account-integration" {
name = "Amazon Account"
type = "aws-account"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-account-s3-bucket"]
integration_config = {
region = "<Region>"
profile = "<AWS Profile Name (Optional)>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
enable_audit = "<Enable Audit>"
}
}resource "apono_integration" "aws-lambda-custom-integration-integration" {
name = "AWS Lambda Custom Integration"
type = "aws-lambda-custom-integration"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-lambda-custom-integration"]
metadata = {
access_details = "<Access Details>"
custom_parameters = "<Custom Parameters>"
region = "<Region>"
function_name = "<Function Name>"
}
}resource "apono_resource_integration" "aws-lambda-custom-integration-integration" {
name = "AWS Lambda Custom Integration"
type = "aws-lambda-custom-integration"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-lambda-custom-integration"]
integration_config = {
access_details = "<Access Details>"
custom_parameters = "<Custom Parameters>"
region = "<Region>"
function_name = "<Function Name>"
}
}resource "apono_integration" "elastic-cloud-integration" {
name = "Elastic Cloud"
type = "elastic-cloud"
connector_id = "apono-connector-id"
connected_resource_types = ["elastic-cloud-deployment"]
metadata = {
organization_id = "<Organization ID>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "elastic-cloud-integration" {
name = "Elastic Cloud"
type = "elastic-cloud"
connector_id = "apono-connector-id"
connected_resource_types = ["elastic-cloud-deployment"]
integration_config = {
organization_id = "<Organization ID>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "github-integration" {
name = "Github"
type = "github"
connector_id = "apono-connector-id"
connected_resource_types = ["github-repository"]
metadata = {
org = "<Organization>"
}
aws_secret = {
region = "aws_region_template_value"
secret_id = "aws_secret_id_template_value"
}
}resource "apono_resource_integration" "github-integration" {
name = "Github"
type = "github"
connector_id = "apono-connector-id"
connected_resource_types = ["github-repository"]
integration_config = {
org = "<Organization>"
}
secret_store_config = {
aws = {
region = "aws_region_template_value"
secret_id = "aws_secret_id_template_value"
}
}resource "apono_integration" "redislabs-integration" {
name = "Redis Cloud (Redislabs)"
type = "redislabs"
connector_id = "apono-connector-id"
connected_resource_types = ["redislabs-database"]
metadata = {
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "redislabs-integration" {
name = "Redis Cloud (Redislabs)"
type = "redislabs"
connector_id = "apono-connector-id"
connected_resource_types = ["redislabs-database"]
integration_config = {
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "cloudfunction-custom-integration-integration" {
name = "Cloud Function Custom Integration"
type = "cloudfunction-custom-integration"
connector_id = "apono-connector-id"
connected_resource_types = ["custom-cloud-function"]
metadata = {
access_details = "<Access Details>"
custom_parameters = "<Custom Parameters>"
project_id = "<Project ID>"
region = "<Region>"
function_name = "<Function Name>"
}
}resource "apono_resource_integration" "cloudfunction-custom-integration-integration" {
name = "Cloud Function Custom Integration"
type = "cloudfunction-custom-integration"
connector_id = "apono-connector-id"
connected_resource_types = ["custom-cloud-function"]
integration_config = {
access_details = "<Access Details>"
custom_parameters = "<Custom Parameters>"
project_id = "<Project ID>"
region = "<Region>"
function_name = "<Function Name>"
}
}{
"aws-account-integration": {
"name": "Amazon Account",
"type": "aws-account",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-account-s3-bucket"
],
"integration_config": {
"region": "<Region>",
"profile": "<AWS Profile Name (Optional)>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"enable_audit": "<Enable Audit>",
}
}
}{
"aws-lambda-custom-integration-integration": {
"name": "AWS Lambda Custom Integration",
"type": "aws-lambda-custom-integration",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-lambda-custom-integration"
],
"integration_config": {
"access_details": "<Access Details>",
"custom_parameters": "<Custom Parameters>",
"region": "<Region>",
"function_name": "<Function Name>",
}
}
}{
"elastic-cloud-integration": {
"name": "Elastic Cloud",
"type": "elastic-cloud",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"elastic-cloud-deployment"
],
"integration_config": {
"organization_id": "<Organization ID>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"github-integration": {
"name": "Github",
"type": "github",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"github-repository"
],
"integration_config": {
"org": "<Organization>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"redislabs-integration": {
"name": "Redis Cloud (Redislabs)",
"type": "redislabs",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"redislabs-database"
],
"integration_config": {
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"cloudfunction-custom-integration-integration": {
"name": "Cloud Function Custom Integration",
"type": "cloudfunction-custom-integration",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"custom-cloud-function"
],
"integration_config": {
"access_details": "<Access Details>",
"custom_parameters": "<Custom Parameters>",
"project_id": "<Project ID>",
"region": "<Region>",
"function_name": "<Function Name>",
}
}
}Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.
MongoDB Atlas UI is a user-friendly platform for managing and deploying MongoDB databases in the cloud.
A search engine based on the Lucene library that provides a distributed, multitenant-capable full-text search engine.
{
"aws-eks-integration": {
"name": "Elastic Kubernetes Service (EKS)",
"type": "aws-eks",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-eks-cluster"
],
"integration_config": {
"server_url": "<Server URL>",
"certificate_authority": "<Certificate Authority>",
"cluster_name": "<EKS Cluster Name>",
"aws_role_name": "<AWS Role Name>",
"region": "<Region>",
"eks_identity_mapping_type": "<Identity Mapping Type>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"aws-rds-mysql-integration": {
"name": "AWS RDS MySQL",
"type": "aws-rds-mysql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-rds-mysql-instance"
],
"integration_config": {
"auth_type": "<Auth Type>",
"aws_region": "<Region>",
"aws_instance_id": "<Instance ID>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"mongodb-atlas-organization-integration": {
"name": "Mongo Atlas Portal",
"type": "mongodb-atlas-organization",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"mongodb-atlas-organization"
],
"integration_config": {
"organization_id": "<Organization Id>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"databricks-integration": {
"name": "Databricks",
"type": "databricks",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"databricks-group"
],
"integration_config": {
"address": "<Databricks Accounts URL>",
"account_id": "<Account Id>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"hashicorp-vault-integration": {
"name": "HashiCorp Vault",
"type": "hashicorp-vault",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"hashicorp-vault-kv-secret"
],
"integration_config": {
"address": "<Vault URL>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"okta-group-integration": {
"name": "Okta Group",
"type": "okta-group",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"okta-group"
],
"integration_config": {
"org_url": "<Okta Organization URL>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"rabbitmq-integration": {
"name": "RabbitMQ",
"type": "rabbitmq",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"rabbitmq-cluster-management"
],
"integration_config": {
"url": "<Url>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}resource "apono_integration" "gcp-organization-integration" {
name = "Google Organization"
type = "gcp-organization"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-organization"]
metadata = {
organization_id = "<Organization ID>"
customer_id = "<Customer ID>"
}
}resource "apono_resource_integration" "gcp-organization-integration" {
name = "Google Organization"
type = "gcp-organization"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-organization"]
integration_config = {
organization_id = "<Organization ID>"
customer_id = "<Customer ID>"
}
}{
"gcp-organization-integration": {
"name": "Google Organization",
"type": "gcp-organization",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"gcp-organization"
],
"integration_config": {
"organization_id": "<Organization ID>",
"customer_id": "<Customer ID>",
}
}
}resource "apono_integration" "openvpn-integration" {
name = "OpenVPN"
type = "openvpn"
connector_id = "apono-connector-id"
connected_resource_types = ["openvpn-tunnel"]
metadata = {
}
}resource "apono_resource_integration" "openvpn-integration" {
name = "OpenVPN"
type = "openvpn"
connector_id = "apono-connector-id"
connected_resource_types = ["openvpn-tunnel"]
integration_config = {
}
}{
"openvpn-integration": {
"name": "OpenVPN",
"type": "openvpn",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"openvpn-tunnel"
],
"integration_config": {
}
}
}resource "apono_integration" "azure-aks-integration" {
name = "Azure Kubernetes Service (AKS)"
type = "azure-aks"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-aks-cluster"]
metadata = {
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
resource_group = "<Resource Group>"
cluster_name = "<Cluster Name>"
subscription_id = "<Subscription ID>"
}
}resource "apono_resource_integration" "azure-aks-integration" {
name = "Azure Kubernetes Service (AKS)"
type = "azure-aks"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-aks-cluster"]
integration_config = {
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
resource_group = "<Resource Group>"
cluster_name = "<Cluster Name>"
subscription_id = "<Subscription ID>"
}
secret_store_config = {
azure = {
vault_url = "vault_url_template_value"
name = "name_template_value"
}
}resource "apono_integration" "azure-postgresql-integration" {
name = "Azure PostgreSQL"
type = "azure-postgresql"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-postgresql-instance"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
dbname = "<Database Name>"
sslmode = "<SSL Mode>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "azure-postgresql-integration" {
name = "Azure PostgreSQL"
type = "azure-postgresql"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-postgresql-instance"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
dbname = "<Database Name>"
sslmode = "<SSL Mode>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "azure-subscription-integration" {
name = "Azure Subscription"
type = "azure-subscription"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-subscription"]
metadata = {
subscription_id = "<Azure Subscription Id>"
directory = "<Azure Primary Domain>"
disable_locks = "<Disable Locks>"
cloud_type = "<Cloud Type>"
}
}resource "apono_resource_integration" "azure-subscription-integration" {
name = "Azure Subscription"
type = "azure-subscription"
connector_id = "apono-connector-id"
connected_resource_types = ["azure-subscription"]
integration_config = {
subscription_id = "<Azure Subscription Id>"
directory = "<Azure Primary Domain>"
disable_locks = "<Disable Locks>"
cloud_type = "<Cloud Type>"
}
}resource "apono_integration" "f5-webtop-integration" {
name = "F5 Network"
type = "f5-webtop"
connector_id = "apono-connector-id"
connected_resource_types = ["f5-webtop-policy"]
metadata = {
hostname = "<F5 Hostname>"
access_profile_id = "<Access Profile Id>"
resource_assign_id = "<Resource Assign Id>"
webtop = "<Webtop>"
webtop_sections = "<Webtop Sections (Optional)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "f5-webtop-integration" {
name = "F5 Network"
type = "f5-webtop"
connector_id = "apono-connector-id"
connected_resource_types = ["f5-webtop-policy"]
integration_config = {
hostname = "<F5 Hostname>"
access_profile_id = "<Access Profile Id>"
resource_assign_id = "<Resource Assign Id>"
webtop = "<Webtop>"
webtop_sections = "<Webtop Sections (Optional)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "gcp-gke-integration" {
name = "Google Kubernetes Engine (GKE)"
type = "gcp-gke"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-gke-cluster"]
metadata = {
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
project_id = "<Project ID>"
region = "<Region>"
cluster_name = "<Cluster Name>"
}
gcp_secret = {
project = "project_template_value"
secret_id = "gcp_secret_id_template_value"
}
}resource "apono_resource_integration" "gcp-gke-integration" {
name = "Google Kubernetes Engine (GKE)"
type = "gcp-gke"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-gke-cluster"]
integration_config = {
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
project_id = "<Project ID>"
region = "<Region>"
cluster_name = "<Cluster Name>"
}
secret_store_config = {
gcp = {
project = "project_template_value"
secret_id = "gcp_secret_id_template_value"
}
}resource "apono_integration" "mongodb-integration" {
name = "MongoDB"
type = "mongodb"
connector_id = "apono-connector-id"
connected_resource_types = ["mongodb-cluster"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "mongodb-integration" {
name = "MongoDB"
type = "mongodb"
connector_id = "apono-connector-id"
connected_resource_types = ["mongodb-cluster"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "ldap-directory-integration" {
name = "LDAP Group"
type = "ldap-directory"
connector_id = "apono-connector-id"
connected_resource_types = ["ldap-directory-group"]
metadata = {
url = "<LDAP Server URL>"
custom_ca_cert = "<Self signed server or CA certificate>"
domain = "<Domain>"
groups_scope = "<Groups Scope>"
users_scope = "<Users Scope>"
user_email_attribute = "<User Email Attribute>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "ldap-directory-integration" {
name = "LDAP Group"
type = "ldap-directory"
connector_id = "apono-connector-id"
connected_resource_types = ["ldap-directory-group"]
integration_config = {
url = "<LDAP Server URL>"
custom_ca_cert = "<Self signed server or CA certificate>"
domain = "<Domain>"
groups_scope = "<Groups Scope>"
users_scope = "<Users Scope>"
user_email_attribute = "<User Email Attribute>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "k8s-port-forward-proxy-integration" {
name = "Kubernetes Proxy"
type = "k8s-port-forward-proxy"
connector_id = "apono-connector-id"
connected_resource_types = ["k8s-port-forward-proxy"]
metadata = {
target_host = "<Target Host>"
target_port = "<Target Port>"
local_port = "<Local Port>"
proxy_id = "<Proxy ID>"
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
cluster_name = "<kubeconfig Cluster Name>"
kubeconfig_api_server_url = "<kubeconfig Server URL>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
aws_secret = {
region = "aws_region_template_value"
secret_id = "aws_secret_id_template_value"
}
}resource "apono_integration" "snowflake-integration" {
name = "Snowflake"
type = "snowflake"
connector_id = "apono-connector-id"
connected_resource_types = ["snowflake-role"]
metadata = {
hostname = "<Hostname>"
auth_type = "<Select Auth Type>"
role = "<Role>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
sso_url = "<SSO Portal URL>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "snowflake-integration" {
name = "Snowflake"
type = "snowflake"
connector_id = "apono-connector-id"
connected_resource_types = ["snowflake-role"]
integration_config = {
hostname = "<Hostname>"
auth_type = "<Select Auth Type>"
role = "<Role>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
sso_url = "<SSO Portal URL>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "opensearch-integration" {
name = "OpenSearch"
type = "opensearch"
connector_id = "apono-connector-id"
connected_resource_types = ["opensearch-role"]
metadata = {
auth_type = "<Auth Type>"
url = "<Url>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
sso_url = "<SSO Portal URL>"
}
}resource "apono_resource_integration" "opensearch-integration" {
name = "OpenSearch"
type = "opensearch"
connector_id = "apono-connector-id"
connected_resource_types = ["opensearch-role"]
integration_config = {
auth_type = "<Auth Type>"
url = "<Url>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
sso_url = "<SSO Portal URL>"
}
}resource "apono_integration" "rancher-integration" {
name = "Rancher"
type = "rancher"
connector_id = "apono-connector-id"
connected_resource_types = ["rancher-cluster"]
metadata = {
host = "<Host>"
port = "<Port>"
certificate_authority = "<Certificate Authority>"
rancher_ui_url = "<Rancher UI URL>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "rancher-integration" {
name = "Rancher"
type = "rancher"
connector_id = "apono-connector-id"
connected_resource_types = ["rancher-cluster"]
integration_config = {
host = "<Host>"
port = "<Port>"
certificate_authority = "<Certificate Authority>"
rancher_ui_url = "<Rancher UI URL>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "redshift-integration" {
name = "Amazon Redshift"
type = "redshift"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-redshift-database"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
db_name = "<Database Name>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "redshift-integration" {
name = "Amazon Redshift"
type = "redshift"
connector_id = "apono-connector-id"
connected_resource_types = ["aws-redshift-database"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
db_name = "<Database Name>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "mysql-integration" {
name = "MySQL"
type = "mysql"
connector_id = "apono-connector-id"
connected_resource_types = ["mysql-instance"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
hostname_user_override = "<Hostname User Override>"
username_transform_override = "<Username Transform>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "mysql-integration" {
name = "MySQL"
type = "mysql"
connector_id = "apono-connector-id"
connected_resource_types = ["mysql-instance"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
hostname_user_override = "<Hostname User Override>"
username_transform_override = "<Username Transform>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "mariadb-integration" {
name = "MariaDB"
type = "mariadb"
connector_id = "apono-connector-id"
connected_resource_types = ["mariadb-instance"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "mariadb-integration" {
name = "MariaDB"
type = "mariadb"
connector_id = "apono-connector-id"
connected_resource_types = ["mariadb-instance"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "oracle-db-integration" {
name = "Oracle Database"
type = "oracle-db"
connector_id = "apono-connector-id"
connected_resource_types = ["oracle-db-role"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
service_name = "<Sarvice Name>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "oracle-db-integration" {
name = "Oracle Database"
type = "oracle-db"
connector_id = "apono-connector-id"
connected_resource_types = ["oracle-db-role"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
service_name = "<Sarvice Name>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "onelogin-group-integration" {
name = "OneLogin Roles"
type = "onelogin-group"
connector_id = "apono-connector-id"
connected_resource_types = ["onelogin-role"]
metadata = {
subdomain = "<Subdomain>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "onelogin-group-integration" {
name = "OneLogin Roles"
type = "onelogin-group"
connector_id = "apono-connector-id"
connected_resource_types = ["onelogin-role"]
integration_config = {
subdomain = "<Subdomain>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}{
"azure-aks-integration": {
"name": "Azure Kubernetes Service (AKS)",
"type": "azure-aks",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-aks-cluster"
],
"integration_config": {
"server_url": "<Server URL>",
"certificate_authority": "<Certificate Authority>",
"resource_group": "<Resource Group>",
"cluster_name": "<Cluster Name>",
"subscription_id": "<Subscription ID>",
},
"azure": {
"vault_url": "vault_url_template_value",
"name": "name_template_value"
}
}
}{
"azure-postgresql-integration": {
"name": "Azure PostgreSQL",
"type": "azure-postgresql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-postgresql-instance"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"dbname": "<Database Name>",
"sslmode": "<SSL Mode>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"azure-subscription-integration": {
"name": "Azure Subscription",
"type": "azure-subscription",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-subscription"
],
"integration_config": {
"subscription_id": "<Azure Subscription Id>",
"directory": "<Azure Primary Domain>",
"disable_locks": "<Disable Locks>",
"cloud_type": "<Cloud Type>",
}
}
}{
"f5-webtop-integration": {
"name": "F5 Network",
"type": "f5-webtop",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"f5-webtop-policy"
],
"integration_config": {
"hostname": "<F5 Hostname>",
"access_profile_id": "<Access Profile Id>",
"resource_assign_id": "<Resource Assign Id>",
"webtop": "<Webtop>",
"webtop_sections": "<Webtop Sections (Optional)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"gcp-gke-integration": {
"name": "Google Kubernetes Engine (GKE)",
"type": "gcp-gke",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"gcp-gke-cluster"
],
"integration_config": {
"server_url": "<Server URL>",
"certificate_authority": "<Certificate Authority>",
"project_id": "<Project ID>",
"region": "<Region>",
"cluster_name": "<Cluster Name>",
},
"secret_store_config": {
"project": "project_template_value",
"secret_id": "gcp_secret_id_template_value"
}
}
}{
"mongodb-integration": {
"name": "MongoDB",
"type": "mongodb",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"mongodb-cluster"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"ldap-directory-integration": {
"name": "LDAP Group",
"type": "ldap-directory",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"ldap-directory-group"
],
"integration_config": {
"url": "<LDAP Server URL>",
"custom_ca_cert": "<Self signed server or CA certificate>",
"domain": "<Domain>",
"groups_scope": "<Groups Scope>",
"users_scope": "<Users Scope>",
"user_email_attribute": "<User Email Attribute>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}resource "apono_resource_integration" "k8s-port-forward-proxy-integration" {
name = "Kubernetes Proxy"
type = "k8s-port-forward-proxy"
connector_id = "apono-connector-id"
connected_resource_types = ["k8s-port-forward-proxy"]
integration_config = {
target_host = "<Target Host>"
target_port = "<Target Port>"
local_port = "<Local Port>"
proxy_id = "<Proxy ID>"
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
cluster_name = "<kubeconfig Cluster Name>"
kubeconfig_api_server_url = "<kubeconfig Server URL>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
aws = {
region = "aws_region_template_value"
secret_id = "aws_secret_id_template_value"
}
}{
"k8s-port-forward-proxy-integration": {
"name": "Kubernetes Proxy",
"type": "k8s-port-forward-proxy",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"k8s-port-forward-proxy"
],
"integration_config": {
"target_host": "<Target Host>",
"target_port": "<Target Port>",
"local_port": "<Local Port>",
"proxy_id": "<Proxy ID>",
"server_url": "<Server URL>",
"certificate_authority": "<Certificate Authority>",
"cluster_name": "<kubeconfig Cluster Name>",
"kubeconfig_api_server_url": "<kubeconfig Server URL>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"snowflake-integration": {
"name": "Snowflake",
"type": "snowflake",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"snowflake-role"
],
"integration_config": {
"hostname": "<Hostname>",
"auth_type": "<Select Auth Type>",
"role": "<Role>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"sso_url": "<SSO Portal URL>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"opensearch-integration": {
"name": "OpenSearch",
"type": "opensearch",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"opensearch-role"
],
"integration_config": {
"auth_type": "<Auth Type>",
"url": "<Url>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"sso_url": "<SSO Portal URL>",
}
}
}{
"rancher-integration": {
"name": "Rancher",
"type": "rancher",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"rancher-cluster"
],
"integration_config": {
"host": "<Host>",
"port": "<Port>",
"certificate_authority": "<Certificate Authority>",
"rancher_ui_url": "<Rancher UI URL>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"redshift-integration": {
"name": "Amazon Redshift",
"type": "redshift",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-redshift-database"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"db_name": "<Database Name>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"mysql-integration": {
"name": "MySQL",
"type": "mysql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"mysql-instance"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"custom_permissions_json": "<Custom Permissions (JSON array that maps custom permissions to actions)>",
"hostname_user_override": "<Hostname User Override>",
"username_transform_override": "<Username Transform>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"mariadb-integration": {
"name": "MariaDB",
"type": "mariadb",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"mariadb-instance"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"custom_permissions_json": "<Custom Permissions (JSON array that maps custom permissions to actions)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"oracle-db-integration": {
"name": "Oracle Database",
"type": "oracle-db",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"oracle-db-role"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"service_name": "<Sarvice Name>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"onelogin-group-integration": {
"name": "OneLogin Roles",
"type": "onelogin-group",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"onelogin-role"
],
"integration_config": {
"subdomain": "<Subdomain>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}Google Cloud AlloyDB is a fully managed, high-performance PostgreSQL-compatible database service. It offers low-latency, automatic scaling, and integrates with Google Cloud’s AI/ML tools, making
A Windows Domain Controller is the hub of network management in a Windows domain, handling user authentication, resource access, and security policies.
{
"aws-organization-integration": {
"name": "Amazon Organization",
"type": "aws-organization",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-organization-account"
],
"integration_config": {
"region": "<Region>",
"aws_sso_region": "<AWS SSO Region>",
"aws_resource_explorer_region": "<AWS Resource Explorer Region>",
"aws_sso_portal": "<SSO Portal>",
"management_account_role_arn": "<Management Account Role ARN>",
"filter_not_organizational_unit_ids": "<Exclude Organizational Unit IDs>",
"user_assuming_role_arns": "<Assumable Roles>",
"session_duration_hours": "<Session Duration (in Hours)>",
"filter_not_account_ids": "<Exclude Account IDs>",
"enable_audit": "<Enable Audit>",
}
}
}{
"azure-management-group-integration": {
"name": "Azure Management Group",
"type": "azure-management-group",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-management-group"
],
"integration_config": {
"management_group_id": "<Azure Management Group Id>",
"directory": "<Azure Primary Domain>",
"disable_locks": "<Disable Locks>",
"cloud_type": "<Cloud Type>",
}
}
}{
"azure-vm-ssh-integration": {
"name": "Azure VM SSH",
"type": "azure-vm-ssh",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-vm-ssh-server"
],
"integration_config": {
"region": "<Region>",
"user": "<User>",
"groups": "<User Groups>",
"shell": "<User's Login Shell>",
"user_key_name": "<User Key Name>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}resource "apono_resource_integration" "gcp-alloydb-integration" {
name = "Google AlloyDB"
type = "gcp-alloydb"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-alloydb-database"]
integration_config = {
auth_type = "<Auth Type>"
gcp_project_id = "<Project ID>"
gcp_region = "<Location>"
gcp_alloydb_cluster = "<Cluster ID>"
gcp_instance_id = "<Primary Instance ID>"
port = "<Port>"
dbname = "<Database Name>"
sslmode = "<SSL Mode>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
gcp = {
project = "project_template_value"
secret_id = "gcp_secret_id_template_value"
}
}{
"gcp-alloydb-integration": {
"name": "Google AlloyDB",
"type": "gcp-alloydb",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"gcp-alloydb-database"
],
"integration_config": {
"auth_type": "<Auth Type>",
"gcp_project_id": "<Project ID>",
"gcp_region": "<Location>",
"gcp_alloydb_cluster": "<Cluster ID>",
"gcp_instance_id": "<Primary Instance ID>",
"port": "<Port>",
"dbname": "<Database Name>",
"sslmode": "<SSL Mode>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"project": "project_template_value",
"secret_id": "gcp_secret_id_template_value"
}
}
}{
"mongodb-atlas-integration": {
"name": "MongoDB Atlas",
"type": "mongodb-atlas",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"mongodb-atlas-cluster"
],
"integration_config": {
"project_id": "<Project Id>",
"cluster_name": "<Cluster Name>",
"connection_type": "<Connection Type>",
"private_endpoint_id": "<Private Endpoint Id>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}resource "apono_resource_integration" "gcp-cloud-sql-postgresql-integration" {
name = "Google Cloud SQL - PostgreSQL"
type = "gcp-cloud-sql-postgresql"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-cloud-sql-postgresql-instance"]
integration_config = {
auth_type = "<Auth Type>"
gcp_project_id = "<Project ID>"
gcp_region = "<Region>"
gcp_instance_id = "<Instance ID>"
gcp_instance_id_user_override = "<Instance ID User Override>"
dbname = "<Database Name>"
sslmode = "<SSL Mode>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
gcp = {
project = "project_template_value"
secret_id = "gcp_secret_id_template_value"
}
}{
"gcp-cloud-sql-postgresql-integration": {
"name": "Google Cloud SQL - PostgreSQL",
"type": "gcp-cloud-sql-postgresql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"gcp-cloud-sql-postgresql-instance"
],
"integration_config": {
"auth_type": "<Auth Type>",
"gcp_project_id": "<Project ID>",
"gcp_region": "<Region>",
"gcp_instance_id": "<Instance ID>",
"gcp_instance_id_user_override": "<Instance ID User Override>",
"dbname": "<Database Name>",
"sslmode": "<SSL Mode>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"project": "project_template_value",
"secret_id": "gcp_secret_id_template_value"
}
}
}{
"aws-rds-postgresql-integration": {
"name": "AWS RDS PostgreSQL",
"type": "aws-rds-postgresql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"aws-rds-postgresql-instance"
],
"integration_config": {
"auth_type": "<Auth Type>",
"aws_region": "<Region>",
"aws_instance_id": "<Instance ID>",
"dbname": "<Database Name>",
"sslmode": "<SSL Mode>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"enable_audit": "<Enable Audit>",
},
"secret_store_config": {
"region": "aws_region_template_value",
"secret_id": "aws_secret_id_template_value"
}
}
}{
"rdp-integration": {
"name": "RDP",
"type": "rdp",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"rdp-server"
],
"integration_config": {
"host": "<Host>",
"port": "<WinRM Port>",
"rdp_port": "<RDP Port>",
"ssl": "<Use SSL connection>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"windows-domain-controller-integration": {
"name": "Windows Domain Controller",
"type": "windows-domain-controller",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"windows-domain-controller-server"
],
"integration_config": {
"host": "<Host>",
"port": "<WinRM Port>",
"rdp_port": "<RDP Port>",
"ssl": "<Use SSL connection>",
"email_selector_field_name_override": "<User Email Attribute Name>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"jumpcloud-integration": {
"name": "JumpCloud",
"type": "jumpcloud",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"jumpcloud-group"
],
"integration_config": {
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"vertica-integration": {
"name": "Vertica Database",
"type": "vertica",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"vertica-role"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"dbname": "<Database Name>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}user (Required | String) Userresource "apono_integration" "gcp-project-integration" {
name = "Google Project"
type = "gcp-project"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-project"]
metadata = {
project_id = "<Project ID>"
}
}resource "apono_resource_integration" "gcp-project-integration" {
name = "Google Project"
type = "gcp-project"
connector_id = "apono-connector-id"
connected_resource_types = ["gcp-project"]
integration_config = {
project_id = "<Project ID>"
}
}{
"gcp-project-integration": {
"name": "Google Project",
"type": "gcp-project",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"gcp-project"
],
"integration_config": {
"project_id": "<Project ID>",
}
}
}resource "apono_integration" "mssql-integration" {
name = "Microsoft SQL Server"
type = "mssql"
connector_id = "apono-connector-id"
connected_resource_types = ["mssql-server-role"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
dbname = "<Database Name>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "mssql-integration" {
name = "Microsoft SQL Server"
type = "mssql"
connector_id = "apono-connector-id"
connected_resource_types = ["mssql-server-role"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
dbname = "<Database Name>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "elasticsearch-integration" {
name = "Elasticsearch"
type = "elasticsearch"
connector_id = "apono-connector-id"
connected_resource_types = ["elasticsearch-role"]
metadata = {
url = "<Url>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "elasticsearch-integration" {
name = "Elasticsearch"
type = "elasticsearch"
connector_id = "apono-connector-id"
connected_resource_types = ["elasticsearch-role"]
integration_config = {
url = "<Url>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "ssh-integration" {
name = "SSH"
type = "ssh"
connector_id = "apono-connector-id"
connected_resource_types = ["ssh-server"]
metadata = {
servers = "<Servers>"
groups = "<User Groups>"
shell = "<User's Login Shell>"
user_key_name = "<User Key Name>"
enable_session_audit = "<Audit sessions>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "ssh-integration" {
name = "SSH"
type = "ssh"
connector_id = "apono-connector-id"
connected_resource_types = ["ssh-server"]
integration_config = {
servers = "<Servers>"
groups = "<User Groups>"
shell = "<User's Login Shell>"
user_key_name = "<User Key Name>"
enable_session_audit = "<Audit sessions>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "k8s-roles-integration" {
name = "Kubernetes"
type = "k8s-roles"
connector_id = "apono-connector-id"
connected_resource_types = ["k8s-cluster"]
metadata = {
cluster_name = "<kubeconfig Cluster Name>"
kubeconfig_api_server_url = "<kubeconfig Server URL>"
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "k8s-roles-integration" {
name = "Kubernetes"
type = "k8s-roles"
connector_id = "apono-connector-id"
connected_resource_types = ["k8s-cluster"]
integration_config = {
cluster_name = "<kubeconfig Cluster Name>"
kubeconfig_api_server_url = "<kubeconfig Server URL>"
server_url = "<Server URL>"
certificate_authority = "<Certificate Authority>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "postgresql-integration" {
name = "PostgreSQL"
type = "postgresql"
connector_id = "apono-connector-id"
connected_resource_types = ["postgresql-instance"]
metadata = {
hostname = "<Hostname>"
port = "<Port>"
dbname = "<Database Name>"
sslmode = "<SSL Mode>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
hostname_user_override = "<Hostname User Override>"
username_transform_override = "<Username Transform>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "postgresql-integration" {
name = "PostgreSQL"
type = "postgresql"
connector_id = "apono-connector-id"
connected_resource_types = ["postgresql-instance"]
integration_config = {
hostname = "<Hostname>"
port = "<Port>"
dbname = "<Database Name>"
sslmode = "<SSL Mode>"
credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
hostname_user_override = "<Hostname User Override>"
username_transform_override = "<Username Transform>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_integration" "onepassword-integration" {
name = "1Password"
type = "onepassword"
connector_id = "apono-connector-id"
connected_resource_types = ["onepassword-secret"]
metadata = {
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}resource "apono_resource_integration" "onepassword-integration" {
name = "1Password"
type = "onepassword"
connector_id = "apono-connector-id"
connected_resource_types = ["onepassword-secret"]
integration_config = {
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}{
"mssql-integration": {
"name": "Microsoft SQL Server",
"type": "mssql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"mssql-server-role"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"dbname": "<Database Name>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"elasticsearch-integration": {
"name": "Elasticsearch",
"type": "elasticsearch",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"elasticsearch-role"
],
"integration_config": {
"url": "<Url>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"ssh-integration": {
"name": "SSH",
"type": "ssh",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"ssh-server"
],
"integration_config": {
"servers": "<Servers>",
"groups": "<User Groups>",
"shell": "<User's Login Shell>",
"user_key_name": "<User Key Name>",
"enable_session_audit": "<Audit sessions>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"k8s-roles-integration": {
"name": "Kubernetes",
"type": "k8s-roles",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"k8s-cluster"
],
"integration_config": {
"cluster_name": "<kubeconfig Cluster Name>",
"kubeconfig_api_server_url": "<kubeconfig Server URL>",
"server_url": "<Server URL>",
"certificate_authority": "<Certificate Authority>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"postgresql-integration": {
"name": "PostgreSQL",
"type": "postgresql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"postgresql-instance"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
"dbname": "<Database Name>",
"sslmode": "<SSL Mode>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
"hostname_user_override": "<Hostname User Override>",
"username_transform_override": "<Username Transform>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}{
"onepassword-integration": {
"name": "1Password",
"type": "onepassword",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"onepassword-secret"
],
"integration_config": {
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}Azure Database for MySQL is a relational database service powered by the MySQL community edition. It's a fully managed database as a service offering that can handle mission-critical workloads wit
{
"gcp-cloud-sql-mysql-integration": {
"name": "Google Cloud SQL - MySQL",
"type": "gcp-cloud-sql-mysql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"gcp-cloud-sql-mysql-instance"
],
"integration_config": {
"auth_type": "<Auth Type>",
"gcp_project_id": "<Project ID>",
"gcp_region": "<Region>",
"gcp_instance_id": "<Instance ID>",
"gcp_instance_id_user_override": "<Instance ID User Override>",
"credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
"credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
},
"secret_store_config": {
"project": "project_template_value",
"secret_id": "gcp_secret_id_template_value"
}
}
}{
"azure-mysql-integration": {
"name": "Azure MySQL",
"type": "azure-mysql",
"connector_id": "apono-connector-id",
"connected_resource_types": [
"azure-mysql-instance"
],
"integration_config": {
"hostname": "<Hostname>",
"port": "<Port>",
},
"secret_store_config": {
"name": "name_template_value",
"namespace": "namespace_template_value"
}
}
}