arrow-left

Only this pageAll pages
gitbookPowered by GitBook
1 of 59

Metadata for Integration Config

INTEGRATION METADATA

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

ArgoCD

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes that automatically syncs applications from a Git repository to a cluster.

hashtag
Example Usage


argocd-integration.tf
resource "apono_integration" "argocd-integration" {
argocd-integration.tf
resource "apono_resource_integration" "argocd-integration" {

hashtag
Schema


  • type argocd

  • connected_resource_types List of resource types to sync.

chevron-rightAvailable resource types you can usehashtag
  • argocd-global-role

  • argocd-project-role

hashtag
Integration Config


  • k8s_server_url (Optional | String) Kubernetes Server URL

  • argocd_ui_url (Required | String) ArgoCD UI URL

  • k8s_certificate_authority (Optional | String) Kubernetes Certificate Authority

argocd-integration.json
{
    "argocd-integration": {
        "name": "ArgoCD",
        "type": "argocd",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "argocd-global-role"
        ],
        "integration_config": {
            "k8s_server_url": "<Kubernetes Server URL>",
            "argocd_ui_url": "<ArgoCD UI URL>",
            "k8s_certificate_authority": "<Kubernetes Certificate Authority>",
            "argo_namespace": "<ArgoCD Namespace>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}

argo_namespace (Required | String) ArgoCD Namespace

  • Default value: argocd

name = "ArgoCD"
type = "argocd"
connector_id = "apono-connector-id"
connected_resource_types = ["argocd-global-role"]
metadata = {
k8s_server_url = "<Kubernetes Server URL>"
argocd_ui_url = "<ArgoCD UI URL>"
k8s_certificate_authority = "<Kubernetes Certificate Authority>"
argo_namespace = "<ArgoCD Namespace>"
}
kubernetes_secret = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}
name = "ArgoCD"
type = "argocd"
connector_id = "apono-connector-id"
connected_resource_types = ["argocd-global-role"]
integration_config = {
k8s_server_url = "<Kubernetes Server URL>"
argocd_ui_url = "<ArgoCD UI URL>"
k8s_certificate_authority = "<Kubernetes Certificate Authority>"
argo_namespace = "<ArgoCD Namespace>"
}
secret_store_config = {
kubernetes = {
name = "name_template_value"
namespace = "namespace_template_value"
}
}

AWS EC2 SSH

EC2 SSH allows secure remote access to Amazon EC2 instances for configuration, management, and troubleshooting.

hashtag
Example Usage


aws-ec2-ssh-integration.tf
resource "apono_integration" "aws-ec2-ssh-integration" {

hashtag
Schema


  • type aws-ec2-ssh

  • connected_resource_types List of resource types to sync.

chevron-rightAvailable resource types you can usehashtag
  • aws-ec2-ssh-server

hashtag
Integration Config


  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • user

Amazon RDS

Amazon Relational Database Service (Amazon RDS) is a collection of managed services that makes it simple to set up, operate, and scale databases in the cloud.

hashtag
Example Usage


aws-rds-integration.tf
resource "apono_integration" "aws-rds-integration" {
aws-rds-integration.tf
resource "apono_resource_integration" "aws-rds-integration" {
aws-rds-integration.json
{
    "aws-rds-integration": 

hashtag
Schema


  • type aws-rds

  • connected_resource_types List of resource types to sync.

chevron-rightAvailable resource types you can usehashtag
  • aws-rds-instance

hashtag
Integration Config


  • cross_account_role_arn (Optional | String) Cross Account Role ARN

  • region (Required | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

Grafana

Grafana is an open-source analytics and monitoring platform

hashtag
Example Usage


grafana-integration.tf
resource "apono_integration" "grafana-integration" {
grafana-integration.tf
resource "apono_resource_integration" "grafana-integration" {

hashtag
Schema


  • type grafana

  • connected_resource_types List of resource types to sync.

chevron-rightAvailable resource types you can usehashtag
  • grafana-datasource

hashtag
Integration Config


  • address (Required | String) Grafana Portal URL

Harmony

Harmony SASE provides secure access to local networks, applications and cloud infrastructures with one unified platform

hashtag
Example Usage


harmony-integration.tf
resource "apono_integration" "harmony-integration" {
harmony-integration.tf
resource "apono_resource_integration" "harmony-integration" {

hashtag
Schema


  • type harmony

  • connected_resource_types List of resource types to sync.

chevron-rightAvailable resource types you can usehashtag
  • harmony-group

hashtag
Integration Config


  • region (Required | String) Region

    • Possible values: global, eu

Amazon Account

Integrate a specific account and its resources

hashtag
Example Usage


AWS Lambda Custom Integration

AWS Lambda Custom Integration allows use AWS Lambda as a custom implementation for resource integration

hashtag
Example Usage


Elastic Cloud

Elastic Cloud is the official managed Elasticsearch service that provides a fully managed Elasticsearch, Kibana, and APM solution in the cloud

hashtag
Example Usage


Entra ID (Azure AD) Groups

Azure Active Directory (Azure AD) is Microsoft&#39;s cloud-based identity and access management service, providing group and role management to securely control and streamline user access to enterpris

hashtag
Example Usage


Github

A code hosting platform for version control and collaboration tool.

hashtag
Example Usage


Redis Cloud (Redislabs)

Redis Cloud delivers a fully managed Redis database offering hosted on major public cloud services.

hashtag
Example Usage


Cloud Function Custom Integration

Cloud Function Custom Integration allows use GCP Cloud Function as a custom implementation for resource integration

hashtag
Example Usage


aws-ec2-ssh-integration.tf
resource "apono_resource_integration" "aws-ec2-ssh-integration" {
  name                     = "AWS EC2 SSH"
  type                     = "aws-ec2-ssh"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-ec2-ssh-server"]
  integration_config = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    ip_type_preference = "<IP Type Preference>"
    cross_account_role_arn = "<Cross Account Role ARN>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    aws = {
      region    = "aws_region_template_value"
      secret_id = "aws_secret_id_template_value"
    }
}
aws-ec2-ssh-integration.json
{
    "aws-ec2-ssh-integration": {
        "name": "AWS EC2 SSH",
        "type": "aws-ec2-ssh",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-ec2-ssh-server"
        ],
        "integration_config": {
            "region": "<Region>",
            "user": "<User>",
            "groups": "<User Groups>",
            "shell": "<User&#39;s Login Shell>",
            "user_key_name": "<User Key Name>",
            "ip_type_preference": "<IP Type Preference>",
            "cross_account_role_arn": "<Cross Account Role ARN>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
grafana-integration.json
{
    "grafana-integration": {
        "name": "Grafana",
        "type": "grafana",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "grafana-datasource"
        ],
        "integration_config": {
            "address": "<Grafana Portal URL>",
        },
	"secret_store_config": {
    	    "name": "name_template_value",
    	    "namespace": "namespace_template_value"
  	    }
    }
}
harmony-integration.json
{
    "harmony-integration": {
        "name": "Harmony",
        "type": "harmony",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "harmony-group"
        ],
        "integration_config": {
            "region": "<Region>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}
(Required | String) User
  • groups (Optional | String) User Groups

  • shell (Optional | String) User's Login Shell

  • user_key_name (Optional | String) User Key Name

  • ip_type_preference (Optional | String) IP Type Preference

    • Default value: public

    • Possible values: public, private

  • cross_account_role_arn (Optional | String) Cross Account Role ARN

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "AWS EC2 SSH"
    type = "aws-ec2-ssh"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-ec2-ssh-server"]
    metadata = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    ip_type_preference = "<IP Type Preference>"
    cross_account_role_arn = "<Cross Account Role ARN>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "Amazon RDS"
    type = "aws-rds"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-rds-instance"]
    metadata = {
    cross_account_role_arn = "<Cross Account Role ARN>"
    region = "<Region>"
    }
    }
    name = "Amazon RDS"
    type = "aws-rds"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-rds-instance"]
    integration_config = {
    cross_account_role_arn = "<Cross Account Role ARN>"
    region = "<Region>"
    }
    }
    {
    "name": "Amazon RDS",
    "type": "aws-rds",
    "connector_id": "apono-connector-id",
    "connected_resource_types": [
    "aws-rds-instance"
    ],
    "integration_config": {
    "cross_account_role_arn": "<Cross Account Role ARN>",
    "region": "<Region>",
    }
    }
    }
    name = "Grafana"
    type = "grafana"
    connector_id = "apono-connector-id"
    connected_resource_types = ["grafana-datasource"]
    metadata = {
    address = "<Grafana Portal URL>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Grafana"
    type = "grafana"
    connector_id = "apono-connector-id"
    connected_resource_types = ["grafana-datasource"]
    integration_config = {
    address = "<Grafana Portal URL>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Harmony"
    type = "harmony"
    connector_id = "apono-connector-id"
    connected_resource_types = ["harmony-group"]
    metadata = {
    region = "<Region>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "Harmony"
    type = "harmony"
    connector_id = "apono-connector-id"
    connected_resource_types = ["harmony-group"]
    integration_config = {
    region = "<Region>"
    }
    secret_store_config = {
    aws = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    hashtag
    Schema

    • type azure-ad

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-ad-group

    • azure-ad-role

    hashtag
    Integration Config


    • cloud_type (Optional | String) Cloud Type

      • Default value: azure

      • Possible values: azure, azure-gov

    azure-ad-integration.tf
    resource "apono_integration" "azure-ad-integration" {
      name                     = "Entra ID (Azure AD) Groups"
      type                     = "azure-ad"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-ad-group"]
      metadata = {
        cloud_type = "<Cloud Type>"
      }
    }
    azure-ad-integration.tf
    resource "apono_resource_integration" "azure-ad-integration" {
      name                     = "Entra ID (Azure AD) Groups"
      type                     = "azure-ad"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-ad-group"]
      integration_config = {
        cloud_type = "<Cloud Type>"
      }
    }
    azure-ad-integration.json
    {
        "azure-ad-integration": {
            "name": "Entra ID (Azure AD) Groups",
            "type": "azure-ad",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-ad-group"
            ],
            "integration_config": {
                "cloud_type": "<Cloud Type>",
            }
        }
    }
    hashtag
    Schema

    • type aws-account

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-account-s3-bucket

    • aws-account-s3-folder

    • aws-account-iam-group

    • aws-account-iam-policy

    • aws-account-iam-role

    • aws-account-systems-manager-parameter-store

    • aws-account-systems-manager-parameter-store-param

    • aws-account-ec2-loadbalancer

    • aws-account-ec2-instance

    • aws-account-ec2-service

    • aws-account-ecr

    • aws-account-ecr-repository

    • aws-account-ecs-cluster

    • aws-account-sagemaker-notebook

    • aws-account-lambda-function

    • aws-account-secrets-manager-secret

    • aws-account-sqs-queue

    • aws-account-sns-topic

    • aws-account-dynamodb-table

    • aws-account-cloudformation-stack

    • aws-account-cloudformation-stackset

    • aws-account-kms-key

    • aws-account-emr-cluster

    • aws-account-acm-certificate

    • aws-account-ses

    • aws-account-route53

    • aws-account-route53-hostedzone

    • aws-account-cognito

    • aws-account-elasticache

    hashtag
    Integration Config


    • region (Required | String) Region

      • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

    • profile (Required | String) AWS Profile Name (Optional)

      • Default value: apono

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    • enable_audit (Optional | String) Enable Audit

      • Default value: false

      • Possible values: true, false

    aws-account-integration.tf
    resource "apono_integration" "aws-account-integration" {
      name                     = "Amazon Account"
      type                     = "aws-account"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["aws-account-s3-bucket"]
      metadata = {
        region = "<Region>"
        profile = "<AWS Profile Name (Optional)>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        enable_audit = "<Enable Audit>"
      }
    }
    aws-account-integration.tf
    resource "apono_resource_integration" "aws-account-integration" {
      name                     = "Amazon Account"
      type                     = "aws-account"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["aws-account-s3-bucket"]
      integration_config = {
        region = "<Region>"
        profile = "<AWS Profile Name (Optional)>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        enable_audit = "<Enable Audit>"
      }
    }
    hashtag
    Schema

    • type aws-lambda-custom-integration

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-lambda-custom-integration

    hashtag
    Integration Config


    • access_details (Required | String) Access Details

    • custom_parameters (Required | String) Custom Parameters

    • region (Required | String) Region

      • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

    • function_name (Required | String) Function Name

    aws-lambda-custom-integration-integration.tf
    resource "apono_integration" "aws-lambda-custom-integration-integration" {
      name                     = "AWS Lambda Custom Integration"
      type                     = "aws-lambda-custom-integration"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["aws-lambda-custom-integration"]
      metadata = {
        access_details = "<Access Details>"
        custom_parameters = "<Custom Parameters>"
        region = "<Region>"
        function_name = "<Function Name>"
      }
    }
    aws-lambda-custom-integration-integration.tf
    resource "apono_resource_integration" "aws-lambda-custom-integration-integration" {
      name                     = "AWS Lambda Custom Integration"
      type                     = "aws-lambda-custom-integration"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["aws-lambda-custom-integration"]
      integration_config = {
        access_details = "<Access Details>"
        custom_parameters = "<Custom Parameters>"
        region = "<Region>"
        function_name = "<Function Name>"
      }
    }
    hashtag
    Schema

    • type elastic-cloud

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • elastic-cloud-deployment

    hashtag
    Integration Config


    • organization_id (Required | String) Organization ID

    elastic-cloud-integration.tf
    resource "apono_integration" "elastic-cloud-integration" {
      name                     = "Elastic Cloud"
      type                     = "elastic-cloud"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["elastic-cloud-deployment"]
      metadata = {
        organization_id = "<Organization ID>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    elastic-cloud-integration.tf
    resource "apono_resource_integration" "elastic-cloud-integration" {
      name                     = "Elastic Cloud"
      type                     = "elastic-cloud"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["elastic-cloud-deployment"]
      integration_config = {
        organization_id = "<Organization ID>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type github

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • github-repository

    • github-organization-role

    • github-team

    • github-owner-role

    hashtag
    Integration Config


    • org (Required | String) Organization

    github-integration.tf
    resource "apono_integration" "github-integration" {
      name                     = "Github"
      type                     = "github"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["github-repository"]
      metadata = {
        org = "<Organization>"
      }
      aws_secret = {
        region    = "aws_region_template_value"
        secret_id = "aws_secret_id_template_value"
      }
    }
    github-integration.tf
    resource "apono_resource_integration" "github-integration" {
      name                     = "Github"
      type                     = "github"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["github-repository"]
      integration_config = {
        org = "<Organization>"
      }
      secret_store_config = {
        aws = {
          region    = "aws_region_template_value"
          secret_id = "aws_secret_id_template_value"
        }
    }
    hashtag
    Schema

    • type redislabs

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • redislabs-database

    hashtag
    Integration Config


    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    redislabs-integration.tf
    resource "apono_integration" "redislabs-integration" {
      name                     = "Redis Cloud (Redislabs)"
      type                     = "redislabs"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["redislabs-database"]
      metadata = {
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    redislabs-integration.tf
    resource "apono_resource_integration" "redislabs-integration" {
      name                     = "Redis Cloud (Redislabs)"
      type                     = "redislabs"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["redislabs-database"]
      integration_config = {
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type cloudfunction-custom-integration

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • custom-cloud-function

    hashtag
    Integration Config


    • access_details (Required | String) Access Details

    • custom_parameters (Required | String) Custom Parameters

    • project_id (Required | String) Project ID

    • region (Required | String) Region

    • function_name (Required | String) Function Name

    cloudfunction-custom-integration-integration.tf
    resource "apono_integration" "cloudfunction-custom-integration-integration" {
      name                     = "Cloud Function Custom Integration"
      type                     = "cloudfunction-custom-integration"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["custom-cloud-function"]
      metadata = {
        access_details = "<Access Details>"
        custom_parameters = "<Custom Parameters>"
        project_id = "<Project ID>"
        region = "<Region>"
        function_name = "<Function Name>"
      }
    }
    cloudfunction-custom-integration-integration.tf
    resource "apono_resource_integration" "cloudfunction-custom-integration-integration" {
      name                     = "Cloud Function Custom Integration"
      type                     = "cloudfunction-custom-integration"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["custom-cloud-function"]
      integration_config = {
        access_details = "<Access Details>"
        custom_parameters = "<Custom Parameters>"
        project_id = "<Project ID>"
        region = "<Region>"
        function_name = "<Function Name>"
      }
    }
    aws-account-integration.json
    {
        "aws-account-integration": {
            "name": "Amazon Account",
            "type": "aws-account",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-account-s3-bucket"
            ],
            "integration_config": {
                "region": "<Region>",
                "profile": "<AWS Profile Name (Optional)>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "enable_audit": "<Enable Audit>",
            }
        }
    }
    aws-lambda-custom-integration-integration.json
    {
        "aws-lambda-custom-integration-integration": {
            "name": "AWS Lambda Custom Integration",
            "type": "aws-lambda-custom-integration",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-lambda-custom-integration"
            ],
            "integration_config": {
                "access_details": "<Access Details>",
                "custom_parameters": "<Custom Parameters>",
                "region": "<Region>",
                "function_name": "<Function Name>",
            }
        }
    }
    elastic-cloud-integration.json
    {
        "elastic-cloud-integration": {
            "name": "Elastic Cloud",
            "type": "elastic-cloud",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "elastic-cloud-deployment"
            ],
            "integration_config": {
                "organization_id": "<Organization ID>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    github-integration.json
    {
        "github-integration": {
            "name": "Github",
            "type": "github",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "github-repository"
            ],
            "integration_config": {
                "org": "<Organization>",
            },
    	"secret_store_config": {
        	    "region": "aws_region_template_value",
        	    "secret_id": "aws_secret_id_template_value"
      	    }
        }
    }
    redislabs-integration.json
    {
        "redislabs-integration": {
            "name": "Redis Cloud (Redislabs)",
            "type": "redislabs",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "redislabs-database"
            ],
            "integration_config": {
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    cloudfunction-custom-integration-integration.json
    {
        "cloudfunction-custom-integration-integration": {
            "name": "Cloud Function Custom Integration",
            "type": "cloudfunction-custom-integration",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "custom-cloud-function"
            ],
            "integration_config": {
                "access_details": "<Access Details>",
                "custom_parameters": "<Custom Parameters>",
                "project_id": "<Project ID>",
                "region": "<Region>",
                "function_name": "<Function Name>",
            }
        }
    }

    Elastic Kubernetes Service (EKS)

    Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

    hashtag
    Example Usage


    aws-eks-integration.tf
    resource "apono_integration" "aws-eks-integration" {
    
    aws-eks-integration.tf
    resource "apono_resource_integration" "aws-eks-integration" {
    

    hashtag
    Schema


    • type aws-eks

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-eks-cluster

    • aws-eks-namespace

    hashtag
    Integration Config


    • server_url (Optional | String) Server URL

    • certificate_authority (Optional | String) Certificate Authority

    • cluster_name (Required | String) EKS Cluster Name

    AWS RDS MySQL

    An open-source relational database management system.

    hashtag
    Example Usage


    aws-rds-mysql-integration.tf
    resource "apono_integration" "aws-rds-mysql-integration" {
    
    aws-rds-mysql-integration.tf
    resource "apono_resource_integration" "aws-rds-mysql-integration" {
    

    hashtag
    Schema


    • type aws-rds-mysql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-rds-mysql-instance

    • aws-rds-mysql-database

    hashtag
    Integration Config


    • auth_type (Required | String) Auth Type

      • Possible values: aws-iam-auth, user-password

    • aws_region (Required | String) Region

    Mongo Atlas Portal

    MongoDB Atlas UI is a user-friendly platform for managing and deploying MongoDB databases in the cloud.

    hashtag
    Example Usage


    mongodb-atlas-organization-integration.tf
    resource "apono_integration" "mongodb-atlas-organization-integration" {
    
    mongodb-atlas-organization-integration.tf
    resource "apono_resource_integration" "mongodb-atlas-organization-integration" {
    

    hashtag
    Schema


    • type mongodb-atlas-organization

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • mongodb-atlas-organization

    • mongodb-atlas-organization-project

    hashtag
    Integration Config


    • organization_id (Required | String) Organization Id

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    Databricks

    Databricks is a managed data and AI platform.

    hashtag
    Example Usage


    databricks-integration.tf
    resource "apono_integration" "databricks-integration" {
    
    databricks-integration.tf
    resource "apono_resource_integration" "databricks-integration" {
    

    hashtag
    Schema


    • type databricks

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • databricks-group

    hashtag
    Integration Config


    • address (Required | String) Databricks Accounts URL

    • account_id (Required | String) Account Id

    HashiCorp Vault

    hashtag
    Example Usage


    hashicorp-vault-integration.tf
    resource "apono_integration" "hashicorp-vault-integration" {
    
    hashicorp-vault-integration.tf
    resource "apono_resource_integration" "hashicorp-vault-integration" {
    

    hashtag
    Schema


    • type hashicorp-vault

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • hashicorp-vault-kv-secret

    • hashicorp-vault-transit-key

    hashtag
    Integration Config


    • address (Required | String) Vault URL

    Okta Group

    This integration allows user to request temporary membership to Okta groups

    hashtag
    Example Usage


    okta-group-integration.tf
    resource "apono_integration" "okta-group-integration" {
    
    okta-group-integration.tf
    resource "apono_resource_integration" "okta-group-integration" {
    

    hashtag
    Schema


    • type okta-group

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • okta-group

    hashtag
    Integration Config


    • org_url (Required | String) Okta Organization URL

    Web App

    A search engine based on the Lucene library that provides a distributed, multitenant-capable full-text search engine.

    hashtag
    Example Usage


    web-app-integration.tf
    resource "apono_integration" "web-app-integration" {
    
    web-app-integration.tf
    resource "apono_resource_integration" "web-app-integration" {
    
    web-app-integration.json
    {
        "web-app-integration": 
    

    hashtag
    Schema


    • type web-app

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • envoy-web-app

    hashtag
    Integration Config


    • proxy_address (Required | String) Proxy Address

    • addresses (Required | String) Addresses

    RabbitMQ

    RabbitMQ is an open-source message-broker software that implements the Advanced Message Queuing Protocol (AMQP)

    hashtag
    Example Usage


    rabbitmq-integration.tf
    resource "apono_integration" "rabbitmq-integration" {
    
    rabbitmq-integration.tf
    resource "apono_resource_integration" "rabbitmq-integration" {
    

    hashtag
    Schema


    • type rabbitmq

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • rabbitmq-cluster-management

    • rabbitmq-vhost

    hashtag
    Integration Config


    • url (Required | String) Url

    Azure Kubernetes Service (AKS)

    Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

    hashtag
    Example Usage


    Azure PostgreSQL

    Azure Database for PostgreSQL is a relational database service based on the open-source Postgres database engine. It&#39;s a fully managed database-as-a-service that can handle mission-critical worklo

    hashtag
    Example Usage


    Azure Subscription

    Azure Subscription

    hashtag
    Example Usage


    F5 Network

    Integration that allows users to request access to a F5 Webtop

    hashtag
    Example Usage


    Google Kubernetes Engine (GKE)

    Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

    hashtag
    Example Usage


    MongoDB

    An opensource NoSQL database program. MongoDB uses JSON-like documents with optional schemas.

    hashtag
    Example Usage


    LDAP Group

    LDAP (Lightweight Directory Access Protocol) is a standardized protocol for accessing and managing directory services, crucial for centralized authentication and data storage in networks.

    hashtag
    Example Usage


    Kubernetes Proxy

    Allow proxy using kubernetes port forward to socat tunnel

    hashtag
    Example Usage


    Snowflake

    Snowflake is a fully managed SaaS (software as a service) that provides a single platform for data warehousing, data lakes, data engineering, data science, data application development, and secure sha

    hashtag
    Example Usage


    OpenSearch

    OpenSearch is a search engine based on Apache Lucene, a free and open-source search engine

    hashtag
    Example Usage


    Rancher

    Rancher is a Kubernetes management tool to deploy and run clusters anywhere and on any provider.

    hashtag
    Example Usage


    Amazon Redshift

    Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud.

    hashtag
    Example Usage


    Google Organization

    Google Organization

    hashtag
    Example Usage


    MySQL

    An open-source relational database management system.

    hashtag
    Example Usage


    MariaDB

    An open-source relational database management system.

    hashtag
    Example Usage


    Oracle Database

    Oracle Database is a powerful and widely-used relational database management system known for its robustness, scalability, and comprehensive feature set, developed and maintained by Oracle Corporation

    hashtag
    Example Usage


    OneLogin Roles

    OneLogin roles membership facilitates the organization of users into logical units, enabling streamlined management of access permissions and policies.

    hashtag
    Example Usage


    OpenVPN

    OpenVPN is a leading global private networking and cybersecurity company that allows organizations to truly safeguard their assets in a dynamic, cost effective, and scalable way.

    hashtag
    Example Usage


    aws-eks-integration.json
    {
        "aws-eks-integration": {
            "name": "Elastic Kubernetes Service (EKS)",
            "type": "aws-eks",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-eks-cluster"
            ],
            "integration_config": {
                "server_url": "<Server URL>",
                "certificate_authority": "<Certificate Authority>",
                "cluster_name": "<EKS Cluster Name>",
                "aws_role_name": "<AWS Role Name>",
                "region": "<Region>",
                "eks_identity_mapping_type": "<Identity Mapping Type>",
            },
    	"secret_store_config": {
        	    "region": "aws_region_template_value",
        	    "secret_id": "aws_secret_id_template_value"
      	    }
        }
    }
    aws-rds-mysql-integration.json
    {
        "aws-rds-mysql-integration": {
            "name": "AWS RDS MySQL",
            "type": "aws-rds-mysql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-rds-mysql-instance"
            ],
            "integration_config": {
                "auth_type": "<Auth Type>",
                "aws_region": "<Region>",
                "aws_instance_id": "<Instance ID>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "region": "aws_region_template_value",
        	    "secret_id": "aws_secret_id_template_value"
      	    }
        }
    }
    mongodb-atlas-organization-integration.json
    {
        "mongodb-atlas-organization-integration": {
            "name": "Mongo Atlas Portal",
            "type": "mongodb-atlas-organization",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "mongodb-atlas-organization"
            ],
            "integration_config": {
                "organization_id": "<Organization Id>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    databricks-integration.json
    {
        "databricks-integration": {
            "name": "Databricks",
            "type": "databricks",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "databricks-group"
            ],
            "integration_config": {
                "address": "<Databricks Accounts URL>",
                "account_id": "<Account Id>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    hashicorp-vault-integration.json
    {
        "hashicorp-vault-integration": {
            "name": "HashiCorp Vault",
            "type": "hashicorp-vault",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "hashicorp-vault-kv-secret"
            ],
            "integration_config": {
                "address": "<Vault URL>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    okta-group-integration.json
    {
        "okta-group-integration": {
            "name": "Okta Group",
            "type": "okta-group",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "okta-group"
            ],
            "integration_config": {
                "org_url": "<Okta Organization URL>",
            },
    	"secret_store_config": {
        	    "region": "aws_region_template_value",
        	    "secret_id": "aws_secret_id_template_value"
      	    }
        }
    }
    rabbitmq-integration.json
    {
        "rabbitmq-integration": {
            "name": "RabbitMQ",
            "type": "rabbitmq",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "rabbitmq-cluster-management"
            ],
            "integration_config": {
                "url": "<Url>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    aws-eks-secret
  • aws-eks-configmap

  • aws-eks-deployment

  • aws-eks-statefulset

  • aws-eks-ingress

  • aws-eks-cronjob

  • aws-eks-job

  • aws-eks-daemonset

  • aws_role_name (Optional | String) AWS Role Name

  • region (Optional | String) Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • eks_identity_mapping_type (Optional | String) Identity Mapping Type

    • Possible values: access-entries, config-map

  • name = "Elastic Kubernetes Service (EKS)"
    type = "aws-eks"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-eks-cluster"]
    metadata = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    cluster_name = "<EKS Cluster Name>"
    aws_role_name = "<AWS Role Name>"
    region = "<Region>"
    eks_identity_mapping_type = "<Identity Mapping Type>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "Elastic Kubernetes Service (EKS)"
    type = "aws-eks"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-eks-cluster"]
    integration_config = {
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    cluster_name = "<EKS Cluster Name>"
    aws_role_name = "<AWS Role Name>"
    region = "<Region>"
    eks_identity_mapping_type = "<Identity Mapping Type>"
    }
    secret_store_config = {
    aws = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    aws-rds-mysql-table
  • aws-rds-mysql-role

  • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_instance_id (Required | String) Instance ID

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "AWS RDS MySQL"
    type = "aws-rds-mysql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-rds-mysql-instance"]
    metadata = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "AWS RDS MySQL"
    type = "aws-rds-mysql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-rds-mysql-instance"]
    integration_config = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    aws = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "Mongo Atlas Portal"
    type = "mongodb-atlas-organization"
    connector_id = "apono-connector-id"
    connected_resource_types = ["mongodb-atlas-organization"]
    metadata = {
    organization_id = "<Organization Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Mongo Atlas Portal"
    type = "mongodb-atlas-organization"
    connector_id = "apono-connector-id"
    connected_resource_types = ["mongodb-atlas-organization"]
    integration_config = {
    organization_id = "<Organization Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Databricks"
    type = "databricks"
    connector_id = "apono-connector-id"
    connected_resource_types = ["databricks-group"]
    metadata = {
    address = "<Databricks Accounts URL>"
    account_id = "<Account Id>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Databricks"
    type = "databricks"
    connector_id = "apono-connector-id"
    connected_resource_types = ["databricks-group"]
    integration_config = {
    address = "<Databricks Accounts URL>"
    account_id = "<Account Id>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "HashiCorp Vault"
    type = "hashicorp-vault"
    connector_id = "apono-connector-id"
    connected_resource_types = ["hashicorp-vault-kv-secret"]
    metadata = {
    address = "<Vault URL>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "HashiCorp Vault"
    type = "hashicorp-vault"
    connector_id = "apono-connector-id"
    connected_resource_types = ["hashicorp-vault-kv-secret"]
    integration_config = {
    address = "<Vault URL>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Okta Group"
    type = "okta-group"
    connector_id = "apono-connector-id"
    connected_resource_types = ["okta-group"]
    metadata = {
    org_url = "<Okta Organization URL>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "Okta Group"
    type = "okta-group"
    connector_id = "apono-connector-id"
    connected_resource_types = ["okta-group"]
    integration_config = {
    org_url = "<Okta Organization URL>"
    }
    secret_store_config = {
    aws = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "Web App"
    type = "web-app"
    connector_id = "apono-connector-id"
    connected_resource_types = ["envoy-web-app"]
    metadata = {
    proxy_address = "<Proxy Address>"
    addresses = "<Addresses>"
    }
    }
    name = "Web App"
    type = "web-app"
    connector_id = "apono-connector-id"
    connected_resource_types = ["envoy-web-app"]
    integration_config = {
    proxy_address = "<Proxy Address>"
    addresses = "<Addresses>"
    }
    }
    {
    "name": "Web App",
    "type": "web-app",
    "connector_id": "apono-connector-id",
    "connected_resource_types": [
    "envoy-web-app"
    ],
    "integration_config": {
    "proxy_address": "<Proxy Address>",
    "addresses": "<Addresses>",
    }
    }
    }
    name = "RabbitMQ"
    type = "rabbitmq"
    connector_id = "apono-connector-id"
    connected_resource_types = ["rabbitmq-cluster-management"]
    metadata = {
    url = "<Url>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "RabbitMQ"
    type = "rabbitmq"
    connector_id = "apono-connector-id"
    connected_resource_types = ["rabbitmq-cluster-management"]
    integration_config = {
    url = "<Url>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    hashtag
    Schema

    • type gcp-organization

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • gcp-organization

    • gcp-organization-folder

    • gcp-organization-project

    • gcp-organization-function

    • gcp-organization-secret-manager-secret

    • gcp-organization-bigquery-dataset

    • gcp-organization-bigquery-table

    • gcp-organization-kms-key-ring

    • gcp-organization-kms-key

    • gcp-organization-cloud-storage-bucket

    • gcp-organization-spanner-instance

    • gcp-organization-spanner-instance-database

    • gcp-organization-compute-instance

    • gcp-organization-cloud-run-service

    • gcp-organization-cloud-run-job

    • gcp-organization-artifact-registry-repository

    • gcp-organization-pubsub-topic

    • gcp-organization-pubsub-subscription

    • gcp-organization-service-account

    hashtag
    Integration Config


    • organization_id (Required | String) Organization ID

    • customer_id (Optional | String) Customer ID

    gcp-organization-integration.tf
    resource "apono_integration" "gcp-organization-integration" {
      name                     = "Google Organization"
      type                     = "gcp-organization"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-organization"]
      metadata = {
        organization_id = "<Organization ID>"
        customer_id = "<Customer ID>"
      }
    }
    gcp-organization-integration.tf
    resource "apono_resource_integration" "gcp-organization-integration" {
      name                     = "Google Organization"
      type                     = "gcp-organization"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-organization"]
      integration_config = {
        organization_id = "<Organization ID>"
        customer_id = "<Customer ID>"
      }
    }
    gcp-organization-integration.json
    {
        "gcp-organization-integration": {
            "name": "Google Organization",
            "type": "gcp-organization",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "gcp-organization"
            ],
            "integration_config": {
                "organization_id": "<Organization ID>",
                "customer_id": "<Customer ID>",
            }
        }
    }
    hashtag
    Schema

    • type openvpn

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • openvpn-tunnel

    hashtag
    Integration Config


    openvpn-integration.tf
    resource "apono_integration" "openvpn-integration" {
      name                     = "OpenVPN"
      type                     = "openvpn"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["openvpn-tunnel"]
      metadata = {
      }
    }
    openvpn-integration.tf
    resource "apono_resource_integration" "openvpn-integration" {
      name                     = "OpenVPN"
      type                     = "openvpn"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["openvpn-tunnel"]
      integration_config = {
      }
    }
    openvpn-integration.json
    {
        "openvpn-integration": {
            "name": "OpenVPN",
            "type": "openvpn",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "openvpn-tunnel"
            ],
            "integration_config": {
            }
        }
    }
    hashtag
    Schema

    • type azure-aks

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-aks-cluster

    • azure-aks-namespace

    • azure-aks-secret

    • azure-aks-configmap

    • azure-aks-deployment

    • azure-aks-statefulset

    • azure-aks-ingress

    • azure-aks-cronjob

    • azure-aks-job

    • azure-aks-daemonset

    hashtag
    Integration Config


    • server_url (Optional | String) Server URL

    • certificate_authority (Optional | String) Certificate Authority

    • resource_group (Optional | String) Resource Group

    • cluster_name (Optional | String) Cluster Name

    • subscription_id (Optional | String) Subscription ID

    azure-aks-integration.tf
    resource "apono_integration" "azure-aks-integration" {
      name                     = "Azure Kubernetes Service (AKS)"
      type                     = "azure-aks"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-aks-cluster"]
      metadata = {
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        resource_group = "<Resource Group>"
        cluster_name = "<Cluster Name>"
        subscription_id = "<Subscription ID>"
      }
    }
    azure-aks-integration.tf
    resource "apono_resource_integration" "azure-aks-integration" {
      name                     = "Azure Kubernetes Service (AKS)"
      type                     = "azure-aks"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-aks-cluster"]
      integration_config = {
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        resource_group = "<Resource Group>"
        cluster_name = "<Cluster Name>"
        subscription_id = "<Subscription ID>"
      }
      secret_store_config = {
        azure = {
          vault_url = "vault_url_template_value"
          name      = "name_template_value"
        }
    }
    hashtag
    Schema

    • type azure-postgresql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-postgresql-instance

    • azure-postgresql-database

    • azure-postgresql-table

    • azure-postgresql-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 5432

    • dbname (Required | String) Database Name

      • Default value: postgres

    • sslmode (Required | String) SSL Mode

      • Default value: disable

      • Possible values: disable, allow, prefer, require, verify-ca, verify-full

    azure-postgresql-integration.tf
    resource "apono_integration" "azure-postgresql-integration" {
      name                     = "Azure PostgreSQL"
      type                     = "azure-postgresql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-postgresql-instance"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        dbname = "<Database Name>"
        sslmode = "<SSL Mode>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    azure-postgresql-integration.tf
    resource "apono_resource_integration" "azure-postgresql-integration" {
      name                     = "Azure PostgreSQL"
      type                     = "azure-postgresql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-postgresql-instance"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        dbname = "<Database Name>"
        sslmode = "<SSL Mode>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type azure-subscription

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-subscription

    • azure-subscription-resource-group

    • azure-subscription-resource-group-storage-account

    • azure-subscription-web-site

    • azure-subscription-container-instance

    • azure-subscription-vm

    • azure-subscription-galleries

    • azure-subscription-vm-scale-set

    • azure-subscription-container-registry

    • azure-subscription-static-web-app

    • azure-subscription-service-bus-namespace

    • azure-subscription-event-grid-domain

    • azure-subscription-event-grid-topic

    • azure-subscription-event-grid-namespace

    • azure-subscription-event-hub-namespace

    • azure-subscription-machine-learning-workspace

    • azure-subscription-machine-learning-registry

    • azure-subscription-virtual-desktop-host-pool

    • azure-subscription-virtual-desktop-workspace

    • azure-subscription-data-factory

    • azure-subscription-automation-account

    • azure-subscription-synapse-workspace

    • azure-subscription-function

    • azure-subscription-logic-app

    • azure-subscription-cosmos-db-account

    • azure-subscription-sql-server

    • azure-subscription-managed-instance

    • azure-subscription-key-vault

    • azure-subscription-kubernetes-cluster

    hashtag
    Integration Config


    • subscription_id (Optional | String) Azure Subscription Id

    • directory (Optional | String) Azure Primary Domain

    • disable_locks (Optional | String) Disable Locks

      • Default value: false

      • Possible values: true, false

    • cloud_type (Optional | String) Cloud Type

      • Default value: azure

      • Possible values: azure, azure-gov

    azure-subscription-integration.tf
    resource "apono_integration" "azure-subscription-integration" {
      name                     = "Azure Subscription"
      type                     = "azure-subscription"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-subscription"]
      metadata = {
        subscription_id = "<Azure Subscription Id>"
        directory = "<Azure Primary Domain>"
        disable_locks = "<Disable Locks>"
        cloud_type = "<Cloud Type>"
      }
    }
    azure-subscription-integration.tf
    resource "apono_resource_integration" "azure-subscription-integration" {
      name                     = "Azure Subscription"
      type                     = "azure-subscription"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["azure-subscription"]
      integration_config = {
        subscription_id = "<Azure Subscription Id>"
        directory = "<Azure Primary Domain>"
        disable_locks = "<Disable Locks>"
        cloud_type = "<Cloud Type>"
      }
    }
    hashtag
    Schema

    • type f5-webtop

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • f5-webtop-policy

    hashtag
    Integration Config


    • hostname (Required | String) F5 Hostname

    • access_profile_id (Required | String) Access Profile Id

    • resource_assign_id (Required | String) Resource Assign Id

    • webtop (Required | String) Webtop

    • webtop_sections (Optional | String) Webtop Sections (Optional)

    f5-webtop-integration.tf
    resource "apono_integration" "f5-webtop-integration" {
      name                     = "F5 Network"
      type                     = "f5-webtop"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["f5-webtop-policy"]
      metadata = {
        hostname = "<F5 Hostname>"
        access_profile_id = "<Access Profile Id>"
        resource_assign_id = "<Resource Assign Id>"
        webtop = "<Webtop>"
        webtop_sections = "<Webtop Sections (Optional)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    f5-webtop-integration.tf
    resource "apono_resource_integration" "f5-webtop-integration" {
      name                     = "F5 Network"
      type                     = "f5-webtop"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["f5-webtop-policy"]
      integration_config = {
        hostname = "<F5 Hostname>"
        access_profile_id = "<Access Profile Id>"
        resource_assign_id = "<Resource Assign Id>"
        webtop = "<Webtop>"
        webtop_sections = "<Webtop Sections (Optional)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type gcp-gke

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • gcp-gke-cluster

    • gcp-gke-namespace

    • gcp-gke-secret

    • gcp-gke-configmap

    • gcp-gke-deployment

    • gcp-gke-statefulset

    • gcp-gke-ingress

    • gcp-gke-cronjob

    • gcp-gke-job

    • gcp-gke-daemonset

    hashtag
    Integration Config


    • server_url (Optional | String) Server URL

    • certificate_authority (Optional | String) Certificate Authority

    • project_id (Optional | String) Project ID

    • region (Optional | String) Region

    • cluster_name (Optional | String) Cluster Name

    gcp-gke-integration.tf
    resource "apono_integration" "gcp-gke-integration" {
      name                     = "Google Kubernetes Engine (GKE)"
      type                     = "gcp-gke"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-gke-cluster"]
      metadata = {
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        project_id = "<Project ID>"
        region = "<Region>"
        cluster_name = "<Cluster Name>"
      }
      gcp_secret = {
        project    = "project_template_value"
        secret_id  = "gcp_secret_id_template_value"
      }
    }
    gcp-gke-integration.tf
    resource "apono_resource_integration" "gcp-gke-integration" {
      name                     = "Google Kubernetes Engine (GKE)"
      type                     = "gcp-gke"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-gke-cluster"]
      integration_config = {
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        project_id = "<Project ID>"
        region = "<Region>"
        cluster_name = "<Cluster Name>"
      }
      secret_store_config = {
        gcp = {
          project    = "project_template_value"
          secret_id  = "gcp_secret_id_template_value"
        }
    }
    hashtag
    Schema

    • type mongodb

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • mongodb-cluster

    • mongodb-database

    • mongodb-custom-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 27017

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    mongodb-integration.tf
    resource "apono_integration" "mongodb-integration" {
      name                     = "MongoDB"
      type                     = "mongodb"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mongodb-cluster"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    mongodb-integration.tf
    resource "apono_resource_integration" "mongodb-integration" {
      name                     = "MongoDB"
      type                     = "mongodb"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mongodb-cluster"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type ldap-directory

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • ldap-directory-group

    hashtag
    Integration Config


    • url (Required | String) LDAP Server URL

    • custom_ca_cert (Optional | String) Self signed server or CA certificate

    • domain (Required | String) Domain

    • groups_scope (Optional | String) Groups Scope

    • users_scope (Optional | String) Users Scope

    • user_email_attribute (Optional | String) User Email Attribute

    ldap-directory-integration.tf
    resource "apono_integration" "ldap-directory-integration" {
      name                     = "LDAP Group"
      type                     = "ldap-directory"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["ldap-directory-group"]
      metadata = {
        url = "<LDAP Server URL>"
        custom_ca_cert = "<Self signed server or CA certificate>"
        domain = "<Domain>"
        groups_scope = "<Groups Scope>"
        users_scope = "<Users Scope>"
        user_email_attribute = "<User Email Attribute>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    ldap-directory-integration.tf
    resource "apono_resource_integration" "ldap-directory-integration" {
      name                     = "LDAP Group"
      type                     = "ldap-directory"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["ldap-directory-group"]
      integration_config = {
        url = "<LDAP Server URL>"
        custom_ca_cert = "<Self signed server or CA certificate>"
        domain = "<Domain>"
        groups_scope = "<Groups Scope>"
        users_scope = "<Users Scope>"
        user_email_attribute = "<User Email Attribute>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type k8s-port-forward-proxy

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • k8s-port-forward-proxy

    hashtag
    Integration Config


    • target_host (Required | String) Target Host

    • target_port (Required | String) Target Port

    • local_port (Required | String) Local Port

    • proxy_id (Required | String) Proxy ID

    • server_url (Optional | String) Server URL

    • certificate_authority (Optional | String) Certificate Authority

    • cluster_name (Required | String) kubeconfig Cluster Name

    • kubeconfig_api_server_url (Optional | String) kubeconfig Server URL

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    k8s-port-forward-proxy-integration.tf
    resource "apono_integration" "k8s-port-forward-proxy-integration" {
      name                     = "Kubernetes Proxy"
      type                     = "k8s-port-forward-proxy"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["k8s-port-forward-proxy"]
      metadata = {
        target_host = "<Target Host>"
        target_port = "<Target Port>"
        local_port = "<Local Port>"
        proxy_id = "<Proxy ID>"
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        cluster_name = "<kubeconfig Cluster Name>"
        kubeconfig_api_server_url = "<kubeconfig Server URL>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      aws_secret = {
        region    = "aws_region_template_value"
        secret_id = "aws_secret_id_template_value"
      }
    }
    hashtag
    Schema

    • type snowflake

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • snowflake-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • auth_type (Optional | String) Select Auth Type

      • Default value: user-password

      • Possible values: sso-auth, user-password

    • role (Optional | String) Role

      • Default value: ACCOUNTADMIN

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    • sso_url (Optional | String) SSO Portal URL

    snowflake-integration.tf
    resource "apono_integration" "snowflake-integration" {
      name                     = "Snowflake"
      type                     = "snowflake"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["snowflake-role"]
      metadata = {
        hostname = "<Hostname>"
        auth_type = "<Select Auth Type>"
        role = "<Role>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        sso_url = "<SSO Portal URL>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    snowflake-integration.tf
    resource "apono_resource_integration" "snowflake-integration" {
      name                     = "Snowflake"
      type                     = "snowflake"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["snowflake-role"]
      integration_config = {
        hostname = "<Hostname>"
        auth_type = "<Select Auth Type>"
        role = "<Role>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        sso_url = "<SSO Portal URL>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type opensearch

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • opensearch-role

    • opensearch-index

    hashtag
    Integration Config


    • auth_type (Optional | String) Auth Type

      • Default value: user-password

      • Possible values: sso-auth, user-password

    • url (Required | String) Url

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    • sso_url (Optional | String) SSO Portal URL

    opensearch-integration.tf
    resource "apono_integration" "opensearch-integration" {
      name                     = "OpenSearch"
      type                     = "opensearch"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["opensearch-role"]
      metadata = {
        auth_type = "<Auth Type>"
        url = "<Url>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        sso_url = "<SSO Portal URL>"
      }
    }
    opensearch-integration.tf
    resource "apono_resource_integration" "opensearch-integration" {
      name                     = "OpenSearch"
      type                     = "opensearch"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["opensearch-role"]
      integration_config = {
        auth_type = "<Auth Type>"
        url = "<Url>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        sso_url = "<SSO Portal URL>"
      }
    }
    hashtag
    Schema

    • type rancher

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • rancher-cluster

    • rancher-project

    hashtag
    Integration Config


    • host (Required | String) Host

    • port (Required | String) Port

    • certificate_authority (Optional | String) Certificate Authority

    • rancher_ui_url (Optional | String) Rancher UI URL

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    rancher-integration.tf
    resource "apono_integration" "rancher-integration" {
      name                     = "Rancher"
      type                     = "rancher"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["rancher-cluster"]
      metadata = {
        host = "<Host>"
        port = "<Port>"
        certificate_authority = "<Certificate Authority>"
        rancher_ui_url = "<Rancher UI URL>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    rancher-integration.tf
    resource "apono_resource_integration" "rancher-integration" {
      name                     = "Rancher"
      type                     = "rancher"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["rancher-cluster"]
      integration_config = {
        host = "<Host>"
        port = "<Port>"
        certificate_authority = "<Certificate Authority>"
        rancher_ui_url = "<Rancher UI URL>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type redshift

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-redshift-database

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 5439

    • db_name (Required | String) Database Name

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    redshift-integration.tf
    resource "apono_integration" "redshift-integration" {
      name                     = "Amazon Redshift"
      type                     = "redshift"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["aws-redshift-database"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        db_name = "<Database Name>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    redshift-integration.tf
    resource "apono_resource_integration" "redshift-integration" {
      name                     = "Amazon Redshift"
      type                     = "redshift"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["aws-redshift-database"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        db_name = "<Database Name>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type mysql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • mysql-instance

    • mysql-database

    • mysql-table

    • mysql-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 3306

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    • custom_permissions_json (Optional | String) Custom Permissions (JSON array that maps custom permissions to actions)

    • hostname_user_override (Optional | String) Hostname User Override

    • username_transform_override (Optional | String) Username Transform

    mysql-integration.tf
    resource "apono_integration" "mysql-integration" {
      name                     = "MySQL"
      type                     = "mysql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mysql-instance"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
        hostname_user_override = "<Hostname User Override>"
        username_transform_override = "<Username Transform>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    mysql-integration.tf
    resource "apono_resource_integration" "mysql-integration" {
      name                     = "MySQL"
      type                     = "mysql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mysql-instance"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
        hostname_user_override = "<Hostname User Override>"
        username_transform_override = "<Username Transform>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type mariadb

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • mariadb-instance

    • mariadb-database

    • mariadb-table

    • mariadb-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 3306

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    • custom_permissions_json (Optional | String) Custom Permissions (JSON array that maps custom permissions to actions)

    mariadb-integration.tf
    resource "apono_integration" "mariadb-integration" {
      name                     = "MariaDB"
      type                     = "mariadb"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mariadb-instance"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    mariadb-integration.tf
    resource "apono_resource_integration" "mariadb-integration" {
      name                     = "MariaDB"
      type                     = "mariadb"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mariadb-instance"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        custom_permissions_json = "<Custom Permissions (JSON array that maps custom permissions to actions)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type oracle-db

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • oracle-db-role

    • oracle-db-table

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 1521

    • service_name (Required | String) Sarvice Name

      • Default value: ORCL

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    oracle-db-integration.tf
    resource "apono_integration" "oracle-db-integration" {
      name                     = "Oracle Database"
      type                     = "oracle-db"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["oracle-db-role"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        service_name = "<Sarvice Name>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    oracle-db-integration.tf
    resource "apono_resource_integration" "oracle-db-integration" {
      name                     = "Oracle Database"
      type                     = "oracle-db"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["oracle-db-role"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        service_name = "<Sarvice Name>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type onelogin-group

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • onelogin-role

    hashtag
    Integration Config


    • subdomain (Required | String) Subdomain

    onelogin-group-integration.tf
    resource "apono_integration" "onelogin-group-integration" {
      name                     = "OneLogin Roles"
      type                     = "onelogin-group"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["onelogin-role"]
      metadata = {
        subdomain = "<Subdomain>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    onelogin-group-integration.tf
    resource "apono_resource_integration" "onelogin-group-integration" {
      name                     = "OneLogin Roles"
      type                     = "onelogin-group"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["onelogin-role"]
      integration_config = {
        subdomain = "<Subdomain>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    azure-aks-integration.json
    {
        "azure-aks-integration": {
            "name": "Azure Kubernetes Service (AKS)",
            "type": "azure-aks",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-aks-cluster"
            ],
            "integration_config": {
                "server_url": "<Server URL>",
                "certificate_authority": "<Certificate Authority>",
                "resource_group": "<Resource Group>",
                "cluster_name": "<Cluster Name>",
                "subscription_id": "<Subscription ID>",
            },
    	"azure": {
        	    "vault_url": "vault_url_template_value",
        	    "name": "name_template_value"
      	    }
        }
    }
    azure-postgresql-integration.json
    {
        "azure-postgresql-integration": {
            "name": "Azure PostgreSQL",
            "type": "azure-postgresql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-postgresql-instance"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "dbname": "<Database Name>",
                "sslmode": "<SSL Mode>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    azure-subscription-integration.json
    {
        "azure-subscription-integration": {
            "name": "Azure Subscription",
            "type": "azure-subscription",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-subscription"
            ],
            "integration_config": {
                "subscription_id": "<Azure Subscription Id>",
                "directory": "<Azure Primary Domain>",
                "disable_locks": "<Disable Locks>",
                "cloud_type": "<Cloud Type>",
            }
        }
    }
    f5-webtop-integration.json
    {
        "f5-webtop-integration": {
            "name": "F5 Network",
            "type": "f5-webtop",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "f5-webtop-policy"
            ],
            "integration_config": {
                "hostname": "<F5 Hostname>",
                "access_profile_id": "<Access Profile Id>",
                "resource_assign_id": "<Resource Assign Id>",
                "webtop": "<Webtop>",
                "webtop_sections": "<Webtop Sections (Optional)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    gcp-gke-integration.json
    {
        "gcp-gke-integration": {
            "name": "Google Kubernetes Engine (GKE)",
            "type": "gcp-gke",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "gcp-gke-cluster"
            ],
            "integration_config": {
                "server_url": "<Server URL>",
                "certificate_authority": "<Certificate Authority>",
                "project_id": "<Project ID>",
                "region": "<Region>",
                "cluster_name": "<Cluster Name>",
            },
    	"secret_store_config": {
        	    "project": "project_template_value",
        	    "secret_id": "gcp_secret_id_template_value"
      	    }
        }
    }
    mongodb-integration.json
    {
        "mongodb-integration": {
            "name": "MongoDB",
            "type": "mongodb",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "mongodb-cluster"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    ldap-directory-integration.json
    {
        "ldap-directory-integration": {
            "name": "LDAP Group",
            "type": "ldap-directory",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "ldap-directory-group"
            ],
            "integration_config": {
                "url": "<LDAP Server URL>",
                "custom_ca_cert": "<Self signed server or CA certificate>",
                "domain": "<Domain>",
                "groups_scope": "<Groups Scope>",
                "users_scope": "<Users Scope>",
                "user_email_attribute": "<User Email Attribute>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    k8s-port-forward-proxy-integration.tf
    resource "apono_resource_integration" "k8s-port-forward-proxy-integration" {
      name                     = "Kubernetes Proxy"
      type                     = "k8s-port-forward-proxy"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["k8s-port-forward-proxy"]
      integration_config = {
        target_host = "<Target Host>"
        target_port = "<Target Port>"
        local_port = "<Local Port>"
        proxy_id = "<Proxy ID>"
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        cluster_name = "<kubeconfig Cluster Name>"
        kubeconfig_api_server_url = "<kubeconfig Server URL>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        aws = {
          region    = "aws_region_template_value"
          secret_id = "aws_secret_id_template_value"
        }
    }
    k8s-port-forward-proxy-integration.json
    {
        "k8s-port-forward-proxy-integration": {
            "name": "Kubernetes Proxy",
            "type": "k8s-port-forward-proxy",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "k8s-port-forward-proxy"
            ],
            "integration_config": {
                "target_host": "<Target Host>",
                "target_port": "<Target Port>",
                "local_port": "<Local Port>",
                "proxy_id": "<Proxy ID>",
                "server_url": "<Server URL>",
                "certificate_authority": "<Certificate Authority>",
                "cluster_name": "<kubeconfig Cluster Name>",
                "kubeconfig_api_server_url": "<kubeconfig Server URL>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "region": "aws_region_template_value",
        	    "secret_id": "aws_secret_id_template_value"
      	    }
        }
    }
    snowflake-integration.json
    {
        "snowflake-integration": {
            "name": "Snowflake",
            "type": "snowflake",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "snowflake-role"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "auth_type": "<Select Auth Type>",
                "role": "<Role>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "sso_url": "<SSO Portal URL>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    opensearch-integration.json
    {
        "opensearch-integration": {
            "name": "OpenSearch",
            "type": "opensearch",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "opensearch-role"
            ],
            "integration_config": {
                "auth_type": "<Auth Type>",
                "url": "<Url>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "sso_url": "<SSO Portal URL>",
            }
        }
    }
    rancher-integration.json
    {
        "rancher-integration": {
            "name": "Rancher",
            "type": "rancher",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "rancher-cluster"
            ],
            "integration_config": {
                "host": "<Host>",
                "port": "<Port>",
                "certificate_authority": "<Certificate Authority>",
                "rancher_ui_url": "<Rancher UI URL>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    redshift-integration.json
    {
        "redshift-integration": {
            "name": "Amazon Redshift",
            "type": "redshift",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-redshift-database"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "db_name": "<Database Name>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    mysql-integration.json
    {
        "mysql-integration": {
            "name": "MySQL",
            "type": "mysql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "mysql-instance"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "custom_permissions_json": "<Custom Permissions (JSON array that maps custom permissions to actions)>",
                "hostname_user_override": "<Hostname User Override>",
                "username_transform_override": "<Username Transform>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    mariadb-integration.json
    {
        "mariadb-integration": {
            "name": "MariaDB",
            "type": "mariadb",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "mariadb-instance"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "custom_permissions_json": "<Custom Permissions (JSON array that maps custom permissions to actions)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    oracle-db-integration.json
    {
        "oracle-db-integration": {
            "name": "Oracle Database",
            "type": "oracle-db",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "oracle-db-role"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "service_name": "<Sarvice Name>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    onelogin-group-integration.json
    {
        "onelogin-group-integration": {
            "name": "OneLogin Roles",
            "type": "onelogin-group",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "onelogin-role"
            ],
            "integration_config": {
                "subdomain": "<Subdomain>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }

    Amazon Organization

    Integrate all accounts and resources, and manage access with IAM Identity Center (SSO)

    hashtag
    Example Usage


    aws-organization-integration.tf
    resource "apono_integration" "aws-organization-integration" {
    
    aws-organization-integration.tf
    resource "apono_resource_integration" "aws-organization-integration" {
    

    hashtag
    Schema


    • type aws-organization

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-organization-account

    • aws-organization-s3-bucket

    hashtag
    Integration Config


    • region (Required | String) Region

      • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

    • aws_sso_region

    Azure Management Group

    Azure Management Group

    hashtag
    Example Usage


    azure-management-group-integration.tf
    resource "apono_integration" "azure-management-group-integration" {
    
    azure-management-group-integration.tf
    resource "apono_resource_integration" "azure-management-group-integration" {
    

    hashtag
    Schema


    • type azure-management-group

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-management-group

    • azure-management-group-subscription

    hashtag
    Integration Config


    • management_group_id (Required | String) Azure Management Group Id

    • directory (Optional | String) Azure Primary Domain

    • disable_locks (Optional | String) Disable Locks

    Azure VM SSH

    VM SSH allows secure remote access to Azure VM instances for configuration, management, and troubleshooting.

    hashtag
    Example Usage


    azure-vm-ssh-integration.tf
    resource "apono_integration" "azure-vm-ssh-integration" {
    
    azure-vm-ssh-integration.tf
    resource "apono_resource_integration" "azure-vm-ssh-integration" {
    

    hashtag
    Schema


    • type azure-vm-ssh

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-vm-ssh-server

    hashtag
    Integration Config


    • region (Optional | String) Region

      • Possible values: eastus, eastus2, centralus, northcentralus, southcentralus, westus, westus2, westus3, canadacentral, canadaeast, brazilsouth, brazilsoutheast, northeurope, westeurope, uksouth, ukwest, francecentral, germanywestcentral, norwayeast, swedencentral, switzerlandnorth, switzerlandwest, uaenorth, mecentral, mesouth, israelcentral, southafricanorth, eastasia, southeastasia, australiaeast, australiasoutheast, japaneast, japanwest, koreacentral, centralindia, southindia, westindia

    Google AlloyDB

    Google Cloud AlloyDB is a fully managed, high-performance PostgreSQL-compatible database service. It offers low-latency, automatic scaling, and integrates with Google Cloud’s AI&#x2F;ML tools, making

    hashtag
    Example Usage


    gcp-alloydb-integration.tf
    resource "apono_integration" "gcp-alloydb-integration" {
    

    hashtag
    Schema


    • type gcp-alloydb

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • gcp-alloydb-database

    • gcp-alloydb-table

    hashtag
    Integration Config


    • auth_type (Required | String) Auth Type

      • Possible values: gcp-alloydb-iam-auth, user-password

    • gcp_project_id (Required | String) Project ID

    MongoDB Atlas

    Fully managed MongoDB service

    hashtag
    Example Usage


    mongodb-atlas-integration.tf
    resource "apono_integration" "mongodb-atlas-integration" {
    
    mongodb-atlas-integration.tf
    resource "apono_resource_integration" "mongodb-atlas-integration" {
    

    hashtag
    Schema


    • type mongodb-atlas

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • mongodb-atlas-cluster

    • mongodb-atlas-database

    hashtag
    Integration Config


    • project_id (Required | String) Project Id

    • cluster_name (Required | String) Cluster Name

    • connection_type (Required | String) Connection Type

    Google Cloud SQL - PostgreSQL

    An open-source relational database management system emphasizing extensibility and SQL compliance.

    hashtag
    Example Usage


    gcp-cloud-sql-postgresql-integration.tf
    resource "apono_integration" "gcp-cloud-sql-postgresql-integration" {
    

    hashtag
    Schema


    • type gcp-cloud-sql-postgresql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • gcp-cloud-sql-postgresql-instance

    • gcp-cloud-sql-postgresql-database

    hashtag
    Integration Config


    • auth_type (Required | String) Auth Type

      • Possible values: gcp-iam-auth, user-password

    • gcp_project_id (Required | String) Project ID

    AWS RDS PostgreSQL

    An open-source relational database management system emphasizing extensibility and SQL compliance.

    hashtag
    Example Usage


    aws-rds-postgresql-integration.tf
    resource "apono_integration" "aws-rds-postgresql-integration" {
    
    aws-rds-postgresql-integration.tf
    resource "apono_resource_integration" "aws-rds-postgresql-integration" {
    

    hashtag
    Schema


    • type aws-rds-postgresql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • aws-rds-postgresql-instance

    • aws-rds-postgresql-database

    hashtag
    Integration Config


    • auth_type (Required | String) Auth Type

      • Possible values: aws-iam-auth, user-password

    • aws_region (Required | String) Region

    RDP

    This integration allows user to request temporary RDP access

    hashtag
    Example Usage


    rdp-integration.tf
    resource "apono_integration" "rdp-integration" {
    
    rdp-integration.tf
    resource "apono_resource_integration" "rdp-integration" {
    

    hashtag
    Schema


    • type rdp

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • rdp-server

    • rdp-server-group

    hashtag
    Integration Config


    • host (Required | String) Host

    • port (Required | String) WinRM Port

      • Default value: 5985

    Windows Domain Controller

    A Windows Domain Controller is the hub of network management in a Windows domain, handling user authentication, resource access, and security policies.

    hashtag
    Example Usage


    windows-domain-controller-integration.tf
    resource "apono_integration" "windows-domain-controller-integration" {
    
    windows-domain-controller-integration.tf
    resource "apono_resource_integration" "windows-domain-controller-integration" {
    

    hashtag
    Schema


    • type windows-domain-controller

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • windows-domain-controller-server

    • windows-domain-controller-server-group

    hashtag
    Integration Config


    • host (Required | String) Host

    • port (Required | String) WinRM Port

      • Default value: 5985

    JumpCloud

    This integration allows user to request temporary membership to JumpCloud user groups

    hashtag
    Example Usage


    jumpcloud-integration.tf
    resource "apono_integration" "jumpcloud-integration" {
    
    jumpcloud-integration.tf
    resource "apono_resource_integration" "jumpcloud-integration" {
    

    hashtag
    Schema


    • type jumpcloud

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • jumpcloud-group

    hashtag
    Integration Config


    Vertica Database

    Vertica is a high-performance, scalable analytics database designed for fast querying and analytics on large datasets.

    hashtag
    Example Usage


    vertica-integration.tf
    resource "apono_integration" "vertica-integration" {
    
    vertica-integration.tf
    resource "apono_resource_integration" "vertica-integration" {
    

    hashtag
    Schema


    • type vertica

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • vertica-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 5433

    Microsoft SQL Server

    Microsoft SQL Server Integration

    hashtag
    Example Usage


    Elasticsearch

    Elasticsearch is a distributed, RESTful search and analytics engine capable of addressing a growing number of use cases

    hashtag
    Example Usage


    SSH

    This integration allows user to request temporary SSH access

    hashtag
    Example Usage


    Kubernetes

    Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

    hashtag
    Example Usage


    Google Project

    Google Project

    hashtag
    Example Usage


    PostgreSQL

    An open-source relational database management system emphasizing extensibility and SQL compliance.

    hashtag
    Example Usage


    1Password

    hashtag
    Example Usage


    aws-organization-integration.json
    {
        "aws-organization-integration": {
            "name": "Amazon Organization",
            "type": "aws-organization",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-organization-account"
            ],
            "integration_config": {
                "region": "<Region>",
                "aws_sso_region": "<AWS SSO Region>",
                "aws_resource_explorer_region": "<AWS Resource Explorer Region>",
                "aws_sso_portal": "<SSO Portal>",
                "management_account_role_arn": "<Management Account Role ARN>",
                "filter_not_organizational_unit_ids": "<Exclude Organizational Unit IDs>",
                "user_assuming_role_arns": "<Assumable Roles>",
                "session_duration_hours": "<Session Duration (in Hours)>",
                "filter_not_account_ids": "<Exclude Account IDs>",
                "enable_audit": "<Enable Audit>",
            }
        }
    }
    azure-management-group-integration.json
    {
        "azure-management-group-integration": {
            "name": "Azure Management Group",
            "type": "azure-management-group",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-management-group"
            ],
            "integration_config": {
                "management_group_id": "<Azure Management Group Id>",
                "directory": "<Azure Primary Domain>",
                "disable_locks": "<Disable Locks>",
                "cloud_type": "<Cloud Type>",
            }
        }
    }
    azure-vm-ssh-integration.json
    {
        "azure-vm-ssh-integration": {
            "name": "Azure VM SSH",
            "type": "azure-vm-ssh",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-vm-ssh-server"
            ],
            "integration_config": {
                "region": "<Region>",
                "user": "<User>",
                "groups": "<User Groups>",
                "shell": "<User&#39;s Login Shell>",
                "user_key_name": "<User Key Name>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    gcp-alloydb-integration.tf
    resource "apono_resource_integration" "gcp-alloydb-integration" {
      name                     = "Google AlloyDB"
      type                     = "gcp-alloydb"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-alloydb-database"]
      integration_config = {
        auth_type = "<Auth Type>"
        gcp_project_id = "<Project ID>"
        gcp_region = "<Location>"
        gcp_alloydb_cluster = "<Cluster ID>"
        gcp_instance_id = "<Primary Instance ID>"
        port = "<Port>"
        dbname = "<Database Name>"
        sslmode = "<SSL Mode>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        gcp = {
          project    = "project_template_value"
          secret_id  = "gcp_secret_id_template_value"
        }
    }
    gcp-alloydb-integration.json
    {
        "gcp-alloydb-integration": {
            "name": "Google AlloyDB",
            "type": "gcp-alloydb",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "gcp-alloydb-database"
            ],
            "integration_config": {
                "auth_type": "<Auth Type>",
                "gcp_project_id": "<Project ID>",
                "gcp_region": "<Location>",
                "gcp_alloydb_cluster": "<Cluster ID>",
                "gcp_instance_id": "<Primary Instance ID>",
                "port": "<Port>",
                "dbname": "<Database Name>",
                "sslmode": "<SSL Mode>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "project": "project_template_value",
        	    "secret_id": "gcp_secret_id_template_value"
      	    }
        }
    }
    mongodb-atlas-integration.json
    {
        "mongodb-atlas-integration": {
            "name": "MongoDB Atlas",
            "type": "mongodb-atlas",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "mongodb-atlas-cluster"
            ],
            "integration_config": {
                "project_id": "<Project Id>",
                "cluster_name": "<Cluster Name>",
                "connection_type": "<Connection Type>",
                "private_endpoint_id": "<Private Endpoint Id>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    gcp-cloud-sql-postgresql-integration.tf
    resource "apono_resource_integration" "gcp-cloud-sql-postgresql-integration" {
      name                     = "Google Cloud SQL - PostgreSQL"
      type                     = "gcp-cloud-sql-postgresql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-cloud-sql-postgresql-instance"]
      integration_config = {
        auth_type = "<Auth Type>"
        gcp_project_id = "<Project ID>"
        gcp_region = "<Region>"
        gcp_instance_id = "<Instance ID>"
        gcp_instance_id_user_override = "<Instance ID User Override>"
        dbname = "<Database Name>"
        sslmode = "<SSL Mode>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        gcp = {
          project    = "project_template_value"
          secret_id  = "gcp_secret_id_template_value"
        }
    }
    gcp-cloud-sql-postgresql-integration.json
    {
        "gcp-cloud-sql-postgresql-integration": {
            "name": "Google Cloud SQL - PostgreSQL",
            "type": "gcp-cloud-sql-postgresql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "gcp-cloud-sql-postgresql-instance"
            ],
            "integration_config": {
                "auth_type": "<Auth Type>",
                "gcp_project_id": "<Project ID>",
                "gcp_region": "<Region>",
                "gcp_instance_id": "<Instance ID>",
                "gcp_instance_id_user_override": "<Instance ID User Override>",
                "dbname": "<Database Name>",
                "sslmode": "<SSL Mode>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "project": "project_template_value",
        	    "secret_id": "gcp_secret_id_template_value"
      	    }
        }
    }
    aws-rds-postgresql-integration.json
    {
        "aws-rds-postgresql-integration": {
            "name": "AWS RDS PostgreSQL",
            "type": "aws-rds-postgresql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "aws-rds-postgresql-instance"
            ],
            "integration_config": {
                "auth_type": "<Auth Type>",
                "aws_region": "<Region>",
                "aws_instance_id": "<Instance ID>",
                "dbname": "<Database Name>",
                "sslmode": "<SSL Mode>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "enable_audit": "<Enable Audit>",
            },
    	"secret_store_config": {
        	    "region": "aws_region_template_value",
        	    "secret_id": "aws_secret_id_template_value"
      	    }
        }
    }
    rdp-integration.json
    {
        "rdp-integration": {
            "name": "RDP",
            "type": "rdp",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "rdp-server"
            ],
            "integration_config": {
                "host": "<Host>",
                "port": "<WinRM Port>",
                "rdp_port": "<RDP Port>",
                "ssl": "<Use SSL connection>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    windows-domain-controller-integration.json
    {
        "windows-domain-controller-integration": {
            "name": "Windows Domain Controller",
            "type": "windows-domain-controller",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "windows-domain-controller-server"
            ],
            "integration_config": {
                "host": "<Host>",
                "port": "<WinRM Port>",
                "rdp_port": "<RDP Port>",
                "ssl": "<Use SSL connection>",
                "email_selector_field_name_override": "<User Email Attribute Name>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    jumpcloud-integration.json
    {
        "jumpcloud-integration": {
            "name": "JumpCloud",
            "type": "jumpcloud",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "jumpcloud-group"
            ],
            "integration_config": {
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    vertica-integration.json
    {
        "vertica-integration": {
            "name": "Vertica Database",
            "type": "vertica",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "vertica-role"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "dbname": "<Database Name>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    aws-organization-s3-folder
  • aws-organization-iam-group

  • aws-organization-iam-role

  • aws-organization-customer-managed-iam-policy

  • aws-organization-account-iam-managed-policy

  • aws-organization-systems-manager-parameter-store

  • aws-organization-systems-manager-parameter-store-param

  • aws-organization-ec2-loadbalancer

  • aws-organization-ec2-instance

  • aws-organization-ec2-service

  • aws-organization-eks-cluster-v2

  • aws-organization-eks-namespace

  • aws-organization-ecr

  • aws-organization-ecr-repository

  • aws-organization-ecs-cluster

  • aws-organization-sagemaker-notebook

  • aws-organization-lambda-function

  • aws-organization-secrets-manager-secret

  • aws-organization-sqs-queue

  • aws-organization-sns-topic

  • aws-organization-dynamodb-table

  • aws-organization-cloudformation-stack

  • aws-organization-cloudformation-stackset

  • aws-organization-kms-key

  • aws-organization-emr-cluster

  • aws-organization-acm-certificate

  • aws-organization-ses

  • aws-organization-cognito

  • aws-organization-elasticache

  • aws-organization-route53

  • aws-organization-route53-hostedzone

  • aws-organization-permission-boundary

  • (Required | String) AWS SSO Region
    • Default value: us-east-1

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_resource_explorer_region (Optional | String) AWS Resource Explorer Region

    • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_sso_portal (Required | String) SSO Portal

  • management_account_role_arn (Optional | String) Management Account Role ARN

  • filter_not_organizational_unit_ids (Optional | String) Exclude Organizational Unit IDs

  • user_assuming_role_arns (Optional | String) Assumable Roles

  • session_duration_hours (Optional | String) Session Duration (in Hours)

    • Possible values: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12

  • filter_not_account_ids (Optional | String) Exclude Account IDs

  • enable_audit (Optional | String) Enable Audit

    • Default value: false

    • Possible values: true, false

  • name = "Amazon Organization"
    type = "aws-organization"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-organization-account"]
    metadata = {
    region = "<Region>"
    aws_sso_region = "<AWS SSO Region>"
    aws_resource_explorer_region = "<AWS Resource Explorer Region>"
    aws_sso_portal = "<SSO Portal>"
    management_account_role_arn = "<Management Account Role ARN>"
    filter_not_organizational_unit_ids = "<Exclude Organizational Unit IDs>"
    user_assuming_role_arns = "<Assumable Roles>"
    session_duration_hours = "<Session Duration (in Hours)>"
    filter_not_account_ids = "<Exclude Account IDs>"
    enable_audit = "<Enable Audit>"
    }
    }
    name = "Amazon Organization"
    type = "aws-organization"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-organization-account"]
    integration_config = {
    region = "<Region>"
    aws_sso_region = "<AWS SSO Region>"
    aws_resource_explorer_region = "<AWS Resource Explorer Region>"
    aws_sso_portal = "<SSO Portal>"
    management_account_role_arn = "<Management Account Role ARN>"
    filter_not_organizational_unit_ids = "<Exclude Organizational Unit IDs>"
    user_assuming_role_arns = "<Assumable Roles>"
    session_duration_hours = "<Session Duration (in Hours)>"
    filter_not_account_ids = "<Exclude Account IDs>"
    enable_audit = "<Enable Audit>"
    }
    }
    azure-management-group-resource-group
  • azure-management-group-resource-group-storage-account

  • azure-management-group-web-site

  • azure-management-group-container-instance

  • azure-management-group-vm

  • azure-management-group-galleries

  • azure-management-group-vm-scale-set

  • azure-management-group-container-registry

  • azure-management-group-static-web-app

  • azure-management-group-service-bus-namespace

  • azure-management-group-event-grid-domain

  • azure-management-group-event-grid-topic

  • azure-management-group-event-grid-namespace

  • azure-management-group-event-hub-namespace

  • azure-management-group-machine-learning-workspace

  • azure-management-group-machine-learning-registry

  • azure-management-group-virtual-desktop-host-pool

  • azure-management-group-virtual-desktop-workspace

  • azure-management-group-data-factory

  • azure-management-group-automation-account

  • azure-management-group-synapse-workspace

  • azure-management-group-function

  • azure-management-group-logic-app

  • azure-management-group-cosmos-db-account

  • azure-management-group-sql-server

  • azure-management-group-managed-instance

  • azure-management-group-key-vault

  • azure-management-group-kubernetes-cluster

  • Default value: false

  • Possible values: true, false

  • cloud_type (Optional | String) Cloud Type

    • Default value: azure

    • Possible values: azure, azure-gov

  • name = "Azure Management Group"
    type = "azure-management-group"
    connector_id = "apono-connector-id"
    connected_resource_types = ["azure-management-group"]
    metadata = {
    management_group_id = "<Azure Management Group Id>"
    directory = "<Azure Primary Domain>"
    disable_locks = "<Disable Locks>"
    cloud_type = "<Cloud Type>"
    }
    }
    name = "Azure Management Group"
    type = "azure-management-group"
    connector_id = "apono-connector-id"
    connected_resource_types = ["azure-management-group"]
    integration_config = {
    management_group_id = "<Azure Management Group Id>"
    directory = "<Azure Primary Domain>"
    disable_locks = "<Disable Locks>"
    cloud_type = "<Cloud Type>"
    }
    }
    user (Required | String) User
  • groups (Optional | String) User Groups

  • shell (Optional | String) User's Login Shell

  • user_key_name (Optional | String) User Key Name

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "Azure VM SSH"
    type = "azure-vm-ssh"
    connector_id = "apono-connector-id"
    connected_resource_types = ["azure-vm-ssh-server"]
    metadata = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Azure VM SSH"
    type = "azure-vm-ssh"
    connector_id = "apono-connector-id"
    connected_resource_types = ["azure-vm-ssh-server"]
    integration_config = {
    region = "<Region>"
    user = "<User>"
    groups = "<User Groups>"
    shell = "<User&#39;s Login Shell>"
    user_key_name = "<User Key Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    gcp-alloydb-role

    gcp_region (Required | String) Location

  • gcp_alloydb_cluster (Required | String) Cluster ID

  • gcp_instance_id (Required | String) Primary Instance ID

  • port (Required | String) Port

    • Default value: 5432

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "Google AlloyDB"
    type = "gcp-alloydb"
    connector_id = "apono-connector-id"
    connected_resource_types = ["gcp-alloydb-database"]
    metadata = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Location>"
    gcp_alloydb_cluster = "<Cluster ID>"
    gcp_instance_id = "<Primary Instance ID>"
    port = "<Port>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    gcp_secret = {
    project = "project_template_value"
    secret_id = "gcp_secret_id_template_value"
    }
    }
    mongodb-atlas-collection
  • mongodb-atlas-custom-role

  • Default value: Standard

  • Possible values: Standard, Private, PrivateEndpoint

  • private_endpoint_id (Optional | String) Private Endpoint Id

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "MongoDB Atlas"
    type = "mongodb-atlas"
    connector_id = "apono-connector-id"
    connected_resource_types = ["mongodb-atlas-cluster"]
    metadata = {
    project_id = "<Project Id>"
    cluster_name = "<Cluster Name>"
    connection_type = "<Connection Type>"
    private_endpoint_id = "<Private Endpoint Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "MongoDB Atlas"
    type = "mongodb-atlas"
    connector_id = "apono-connector-id"
    connected_resource_types = ["mongodb-atlas-cluster"]
    integration_config = {
    project_id = "<Project Id>"
    cluster_name = "<Cluster Name>"
    connection_type = "<Connection Type>"
    private_endpoint_id = "<Private Endpoint Id>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    gcp-cloud-sql-postgresql-table
  • gcp-cloud-sql-postgresql-role

  • gcp_region (Required | String) Region

  • gcp_instance_id (Required | String) Instance ID

  • gcp_instance_id_user_override (Optional | String) Instance ID User Override

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "Google Cloud SQL - PostgreSQL"
    type = "gcp-cloud-sql-postgresql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["gcp-cloud-sql-postgresql-instance"]
    metadata = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    gcp_secret = {
    project = "project_template_value"
    secret_id = "gcp_secret_id_template_value"
    }
    }
    aws-rds-postgresql-table
  • aws-rds-postgresql-role

  • Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1

  • aws_instance_id (Required | String) Instance ID

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Default value: require

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • enable_audit (Optional | String) Enable Audit

    • Default value: false

    • Possible values: true, false

  • name = "AWS RDS PostgreSQL"
    type = "aws-rds-postgresql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-rds-postgresql-instance"]
    metadata = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    name = "AWS RDS PostgreSQL"
    type = "aws-rds-postgresql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["aws-rds-postgresql-instance"]
    integration_config = {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
    }
    secret_store_config = {
    aws = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
  • rdp_port (Optional | String) RDP Port

    • Default value: 3389

  • ssl (Required | String) Use SSL connection

    • Default value: false

    • Possible values: false, true

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "RDP"
    type = "rdp"
    connector_id = "apono-connector-id"
    connected_resource_types = ["rdp-server"]
    metadata = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "RDP"
    type = "rdp"
    connector_id = "apono-connector-id"
    connected_resource_types = ["rdp-server"]
    integration_config = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
  • rdp_port (Optional | String) RDP Port

    • Default value: 3389

  • ssl (Required | String) Use SSL connection

    • Default value: false

    • Possible values: false, true

  • email_selector_field_name_override (Optional | String) User Email Attribute Name

    • Default value: UserPrincipalName

  • name = "Windows Domain Controller"
    type = "windows-domain-controller"
    connector_id = "apono-connector-id"
    connected_resource_types = ["windows-domain-controller-server"]
    metadata = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    email_selector_field_name_override = "<User Email Attribute Name>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Windows Domain Controller"
    type = "windows-domain-controller"
    connector_id = "apono-connector-id"
    connected_resource_types = ["windows-domain-controller-server"]
    integration_config = {
    host = "<Host>"
    port = "<WinRM Port>"
    rdp_port = "<RDP Port>"
    ssl = "<Use SSL connection>"
    email_selector_field_name_override = "<User Email Attribute Name>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "JumpCloud"
    type = "jumpcloud"
    connector_id = "apono-connector-id"
    connected_resource_types = ["jumpcloud-group"]
    metadata = {
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "JumpCloud"
    type = "jumpcloud"
    connector_id = "apono-connector-id"
    connected_resource_types = ["jumpcloud-group"]
    integration_config = {
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
  • dbname (Required | String) Database Name

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "Vertica Database"
    type = "vertica"
    connector_id = "apono-connector-id"
    connected_resource_types = ["vertica-role"]
    metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Vertica Database"
    type = "vertica"
    connector_id = "apono-connector-id"
    connected_resource_types = ["vertica-role"]
    integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    dbname = "<Database Name>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    hashtag
    Schema

    • type gcp-project

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • gcp-project

    • gcp-project-cloud-spanner-table

    • gcp-project-cloud-storage-bucket

    • gcp-project-secret-manager-secret

    • gcp-project-bigquery-dataset

    • gcp-project-bigquery-table

    • gcp-project-function

    • gcp-project-compute-instance

    • gcp-project-cloud-run-service

    • gcp-project-cloud-run-job

    • gcp-project-artifact-registry-repository

    • gcp-project-pubsub-topic

    • gcp-project-pubsub-subscription

    hashtag
    Integration Config


    • project_id (Required | String) Project ID

    gcp-project-integration.tf
    resource "apono_integration" "gcp-project-integration" {
      name                     = "Google Project"
      type                     = "gcp-project"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-project"]
      metadata = {
        project_id = "<Project ID>"
      }
    }
    gcp-project-integration.tf
    resource "apono_resource_integration" "gcp-project-integration" {
      name                     = "Google Project"
      type                     = "gcp-project"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["gcp-project"]
      integration_config = {
        project_id = "<Project ID>"
      }
    }
    gcp-project-integration.json
    {
        "gcp-project-integration": {
            "name": "Google Project",
            "type": "gcp-project",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "gcp-project"
            ],
            "integration_config": {
                "project_id": "<Project ID>",
            }
        }
    }
    hashtag
    Schema

    • type mssql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • mssql-server-role

    • mssql-database

    • mssql-table

    • mssql-view

    • mssql-function

    • mssql-procedure

    • mssql-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 1433

    • dbname (Required | String) Database Name

      • Default value: master

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    mssql-integration.tf
    resource "apono_integration" "mssql-integration" {
      name                     = "Microsoft SQL Server"
      type                     = "mssql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mssql-server-role"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        dbname = "<Database Name>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    mssql-integration.tf
    resource "apono_resource_integration" "mssql-integration" {
      name                     = "Microsoft SQL Server"
      type                     = "mssql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["mssql-server-role"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        dbname = "<Database Name>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type elasticsearch

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • elasticsearch-role

    • elasticsearch-index

    • elasticsearch-cluster

    hashtag
    Integration Config


    • url (Required | String) Url

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    elasticsearch-integration.tf
    resource "apono_integration" "elasticsearch-integration" {
      name                     = "Elasticsearch"
      type                     = "elasticsearch"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["elasticsearch-role"]
      metadata = {
        url = "<Url>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    elasticsearch-integration.tf
    resource "apono_resource_integration" "elasticsearch-integration" {
      name                     = "Elasticsearch"
      type                     = "elasticsearch"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["elasticsearch-role"]
      integration_config = {
        url = "<Url>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type ssh

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • ssh-server

    hashtag
    Integration Config


    • servers (Required | String) Servers

    • groups (Optional | String) User Groups

    • shell (Optional | String) User's Login Shell

    • user_key_name (Optional | String) User Key Name

    • enable_session_audit (Optional | String) Audit sessions

      • Default value: false

      • Possible values: true, false

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    ssh-integration.tf
    resource "apono_integration" "ssh-integration" {
      name                     = "SSH"
      type                     = "ssh"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["ssh-server"]
      metadata = {
        servers = "<Servers>"
        groups = "<User Groups>"
        shell = "<User&#39;s Login Shell>"
        user_key_name = "<User Key Name>"
        enable_session_audit = "<Audit sessions>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    ssh-integration.tf
    resource "apono_resource_integration" "ssh-integration" {
      name                     = "SSH"
      type                     = "ssh"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["ssh-server"]
      integration_config = {
        servers = "<Servers>"
        groups = "<User Groups>"
        shell = "<User&#39;s Login Shell>"
        user_key_name = "<User Key Name>"
        enable_session_audit = "<Audit sessions>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type k8s-roles

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • k8s-cluster

    • k8s-namespace

    • k8s-secret

    • k8s-configmap

    • k8s-deployment

    • k8s-statefulset

    • k8s-ingress

    • k8s-cronjob

    • k8s-job

    • k8s-daemonset

    hashtag
    Integration Config


    • cluster_name (Required | String) kubeconfig Cluster Name

    • kubeconfig_api_server_url (Required | String) kubeconfig Server URL

    • server_url (Optional | String) Server URL

    • certificate_authority (Optional | String) Certificate Authority

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    k8s-roles-integration.tf
    resource "apono_integration" "k8s-roles-integration" {
      name                     = "Kubernetes"
      type                     = "k8s-roles"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["k8s-cluster"]
      metadata = {
        cluster_name = "<kubeconfig Cluster Name>"
        kubeconfig_api_server_url = "<kubeconfig Server URL>"
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    k8s-roles-integration.tf
    resource "apono_resource_integration" "k8s-roles-integration" {
      name                     = "Kubernetes"
      type                     = "k8s-roles"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["k8s-cluster"]
      integration_config = {
        cluster_name = "<kubeconfig Cluster Name>"
        kubeconfig_api_server_url = "<kubeconfig Server URL>"
        server_url = "<Server URL>"
        certificate_authority = "<Certificate Authority>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type postgresql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • postgresql-instance

    • postgresql-database

    • postgresql-table

    • postgresql-role

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 5432

    • dbname (Required | String) Database Name

      • Default value: postgres

    • sslmode (Required | String) SSL Mode

      • Default value: disable

      • Possible values: disable, allow, prefer, require, verify-ca, verify-full

    • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

    • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

    • hostname_user_override (Optional | String) Hostname User Override

    • username_transform_override (Optional | String) Username Transform

    postgresql-integration.tf
    resource "apono_integration" "postgresql-integration" {
      name                     = "PostgreSQL"
      type                     = "postgresql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["postgresql-instance"]
      metadata = {
        hostname = "<Hostname>"
        port = "<Port>"
        dbname = "<Database Name>"
        sslmode = "<SSL Mode>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        hostname_user_override = "<Hostname User Override>"
        username_transform_override = "<Username Transform>"
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    postgresql-integration.tf
    resource "apono_resource_integration" "postgresql-integration" {
      name                     = "PostgreSQL"
      type                     = "postgresql"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["postgresql-instance"]
      integration_config = {
        hostname = "<Hostname>"
        port = "<Port>"
        dbname = "<Database Name>"
        sslmode = "<SSL Mode>"
        credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
        credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
        hostname_user_override = "<Hostname User Override>"
        username_transform_override = "<Username Transform>"
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    hashtag
    Schema

    • type onepassword

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • onepassword-secret

    hashtag
    Integration Config


    onepassword-integration.tf
    resource "apono_integration" "onepassword-integration" {
      name                     = "1Password"
      type                     = "onepassword"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["onepassword-secret"]
      metadata = {
      }
      kubernetes_secret = {
        name      = "name_template_value"
        namespace = "namespace_template_value"
      }
    }
    onepassword-integration.tf
    resource "apono_resource_integration" "onepassword-integration" {
      name                     = "1Password"
      type                     = "onepassword"
      connector_id             = "apono-connector-id"
      connected_resource_types = ["onepassword-secret"]
      integration_config = {
      }
      secret_store_config = {
        kubernetes = {
          name      = "name_template_value"
          namespace = "namespace_template_value"
        }
    }
    mssql-integration.json
    {
        "mssql-integration": {
            "name": "Microsoft SQL Server",
            "type": "mssql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "mssql-server-role"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "dbname": "<Database Name>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    elasticsearch-integration.json
    {
        "elasticsearch-integration": {
            "name": "Elasticsearch",
            "type": "elasticsearch",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "elasticsearch-role"
            ],
            "integration_config": {
                "url": "<Url>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    ssh-integration.json
    {
        "ssh-integration": {
            "name": "SSH",
            "type": "ssh",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "ssh-server"
            ],
            "integration_config": {
                "servers": "<Servers>",
                "groups": "<User Groups>",
                "shell": "<User&#39;s Login Shell>",
                "user_key_name": "<User Key Name>",
                "enable_session_audit": "<Audit sessions>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    k8s-roles-integration.json
    {
        "k8s-roles-integration": {
            "name": "Kubernetes",
            "type": "k8s-roles",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "k8s-cluster"
            ],
            "integration_config": {
                "cluster_name": "<kubeconfig Cluster Name>",
                "kubeconfig_api_server_url": "<kubeconfig Server URL>",
                "server_url": "<Server URL>",
                "certificate_authority": "<Certificate Authority>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    postgresql-integration.json
    {
        "postgresql-integration": {
            "name": "PostgreSQL",
            "type": "postgresql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "postgresql-instance"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
                "dbname": "<Database Name>",
                "sslmode": "<SSL Mode>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
                "hostname_user_override": "<Hostname User Override>",
                "username_transform_override": "<Username Transform>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    onepassword-integration.json
    {
        "onepassword-integration": {
            "name": "1Password",
            "type": "onepassword",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "onepassword-secret"
            ],
            "integration_config": {
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }

    Google Cloud SQL - MySQL

    An open-source relational database management system.

    hashtag
    Example Usage


    gcp-cloud-sql-mysql-integration.tf
    resource "apono_integration" "gcp-cloud-sql-mysql-integration" {
    
    gcp-cloud-sql-mysql-integration.tf
    resource "apono_resource_integration" "gcp-cloud-sql-mysql-integration" {
    

    hashtag
    Schema


    • type gcp-cloud-sql-mysql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • gcp-cloud-sql-mysql-instance

    • gcp-cloud-sql-mysql-database

    hashtag
    Integration Config


    • auth_type (Required | String) Auth Type

      • Possible values: gcp-iam-auth, user-password

    • gcp_project_id (Required | String) Project ID

    Azure MySQL

    Azure Database for MySQL is a relational database service powered by the MySQL community edition. It&#39;s a fully managed database as a service offering that can handle mission-critical workloads wit

    hashtag
    Example Usage


    azure-mysql-integration.tf
    resource "apono_integration" "azure-mysql-integration" {
    
    azure-mysql-integration.tf
    resource "apono_resource_integration" "azure-mysql-integration" {
    

    hashtag
    Schema


    • type azure-mysql

    • connected_resource_types List of resource types to sync.

    chevron-rightAvailable resource types you can usehashtag
    • azure-mysql-instance

    • azure-mysql-database

    hashtag
    Integration Config


    • hostname (Required | String) Hostname

    • port (Required | String) Port

      • Default value: 3306

    gcp-cloud-sql-mysql-integration.json
    {
        "gcp-cloud-sql-mysql-integration": {
            "name": "Google Cloud SQL - MySQL",
            "type": "gcp-cloud-sql-mysql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "gcp-cloud-sql-mysql-instance"
            ],
            "integration_config": {
                "auth_type": "<Auth Type>",
                "gcp_project_id": "<Project ID>",
                "gcp_region": "<Region>",
                "gcp_instance_id": "<Instance ID>",
                "gcp_instance_id_user_override": "<Instance ID User Override>",
                "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
                "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            },
    	"secret_store_config": {
        	    "project": "project_template_value",
        	    "secret_id": "gcp_secret_id_template_value"
      	    }
        }
    }
    azure-mysql-integration.json
    {
        "azure-mysql-integration": {
            "name": "Azure MySQL",
            "type": "azure-mysql",
            "connector_id": "apono-connector-id",
            "connected_resource_types": [
                "azure-mysql-instance"
            ],
            "integration_config": {
                "hostname": "<Hostname>",
                "port": "<Port>",
            },
    	"secret_store_config": {
        	    "name": "name_template_value",
        	    "namespace": "namespace_template_value"
      	    }
        }
    }
    gcp-cloud-sql-mysql-table
  • gcp-cloud-sql-mysql-role

  • gcp_region (Required | String) Region

  • gcp_instance_id (Required | String) Instance ID

  • gcp_instance_id_user_override (Optional | String) Instance ID User Override

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • name = "Google Cloud SQL - MySQL"
    type = "gcp-cloud-sql-mysql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["gcp-cloud-sql-mysql-instance"]
    metadata = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    gcp_secret = {
    project = "project_template_value"
    secret_id = "gcp_secret_id_template_value"
    }
    }
    name = "Google Cloud SQL - MySQL"
    type = "gcp-cloud-sql-mysql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["gcp-cloud-sql-mysql-instance"]
    integration_config = {
    auth_type = "<Auth Type>"
    gcp_project_id = "<Project ID>"
    gcp_region = "<Region>"
    gcp_instance_id = "<Instance ID>"
    gcp_instance_id_user_override = "<Instance ID User Override>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    }
    secret_store_config = {
    gcp = {
    project = "project_template_value"
    secret_id = "gcp_secret_id_template_value"
    }
    }
    azure-mysql-table
  • azure-mysql-role

  • name = "Azure MySQL"
    type = "azure-mysql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["azure-mysql-instance"]
    metadata = {
    hostname = "<Hostname>"
    port = "<Port>"
    }
    kubernetes_secret = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }
    name = "Azure MySQL"
    type = "azure-mysql"
    connector_id = "apono-connector-id"
    connected_resource_types = ["azure-mysql-instance"]
    integration_config = {
    hostname = "<Hostname>"
    port = "<Port>"
    }
    secret_store_config = {
    kubernetes = {
    name = "name_template_value"
    namespace = "namespace_template_value"
    }
    }