Skip to main content

tls_inspection_configurations

Creates, updates, deletes or gets a tls_inspection_configuration resource or lists tls_inspection_configurations in a region

Overview

Nametls_inspection_configurations
TypeResource
DescriptionResource type definition for AWS::NetworkFirewall::TLSInspectionConfiguration
Idawscc.networkfirewall.tls_inspection_configurations

Fields

NameDatatypeDescription
tls_inspection_configuration_namestring
tls_inspection_configuration_arnstringA resource ARN.
tls_inspection_configurationobjectResource type definition for AWS::NetworkFirewall::TLSInspectionConfiguration
tls_inspection_configuration_idstring
descriptionstring
tagsarray
regionstringAWS region.

For more information, see AWS::NetworkFirewall::TLSInspectionConfiguration.

Methods

NameResourceAccessible byRequired Params
create_resourcetls_inspection_configurationsINSERTTLSInspectionConfigurationName, TLSInspectionConfiguration, region
delete_resourcetls_inspection_configurationsDELETEIdentifier, region
update_resourcetls_inspection_configurationsUPDATEIdentifier, PatchDocument, region
list_resourcestls_inspection_configurations_list_onlySELECTregion
get_resourcetls_inspection_configurationsSELECTIdentifier, region

SELECT examples

Gets all properties from an individual tls_inspection_configuration.

SELECT
region,
tls_inspection_configuration_name,
tls_inspection_configuration_arn,
tls_inspection_configuration,
tls_inspection_configuration_id,
description,
tags
FROM awscc.networkfirewall.tls_inspection_configurations
WHERE
region = '{{ region }}' AND
Identifier = '{{ tls_inspection_configuration_arn }}';

INSERT example

Use the following StackQL query and manifest file to create a new tls_inspection_configuration resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.networkfirewall.tls_inspection_configurations (
TLSInspectionConfigurationName,
TLSInspectionConfiguration,
region
)
SELECT
'{{ tls_inspection_configuration_name }}',
'{{ tls_inspection_configuration }}',
'{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

UPDATE example

Use the following StackQL query and manifest file to update a tls_inspection_configuration resource, using stack-deploy.

/*+ update */
UPDATE awscc.networkfirewall.tls_inspection_configurations
SET PatchDocument = string('{{ {
"TLSInspectionConfiguration": tls_inspection_configuration,
"Description": description,
"Tags": tags
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ tls_inspection_configuration_arn }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

DELETE example

/*+ delete */
DELETE FROM awscc.networkfirewall.tls_inspection_configurations
WHERE
Identifier = '{{ tls_inspection_configuration_arn }}' AND
region = '{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

Additional Parameters

Mutable resources in the Cloud Control provider support additional optional parameters which can be supplied with INSERT, UPDATE, or DELETE operations. These include:

ParameterDescription
ClientToken
A unique identifier to ensure the idempotency of the resource request.This allows the provider to accurately distinguish between retries and new requests.
A client token is valid for 36 hours once used.
After that, a resource request with the same client token is treated as a new request.
If you do not specify a client token, one is generated for inclusion in the request.
RoleArn
The ARN of the IAM role used to perform this resource operation.The role specified must have the permissions required for this operation.
If you do not specify a role, a temporary session is created using your AWS user credentials.
TypeVersionId
For private resource types, the type version to use in this resource operation.If you do not specify a resource version, the default version is used.

Permissions

To operate on the tls_inspection_configurations resource, the following permissions are required:

iam:CreateServiceLinkedRole,
network-firewall:CreateTLSInspectionConfiguration,
network-firewall:DescribeTLSInspectionConfiguration,
network-firewall:TagResource