Table: alicloud_vpc_ssl_vpn_client_cert
An SSL VPN client certificate is a digital certificate that is used by a SSL VPN client to authenticate and securely connect to an SSL VPN.
Examples
Basic info
Determine the status of your VPN client certificates in your network. This is useful for ensuring security compliance and identifying any inactive or expired certificates.
select name, ssl_vpn_client_cert_id, statusfrom alicloud_vpc_ssl_vpn_client_cert;
select name, ssl_vpn_client_cert_id, statusfrom alicloud_vpc_ssl_vpn_client_cert;
List of expired certificates
Identify instances where SSL VPN client certificates have expired in your AliCloud VPC environment. This query is useful for maintaining security standards and for timely renewal of certificates.
select name, ssl_vpn_client_cert_id, statusfrom alicloud_vpc_ssl_vpn_client_certwhere status = 'expired';
select name, ssl_vpn_client_cert_id, statusfrom alicloud_vpc_ssl_vpn_client_certwhere status = 'expired';
List of certificates that will expire in one week
Identify instances where SSL VPN client certificates are nearing their expiration date. This is useful for ensuring timely renewal and maintaining uninterrupted VPN service.
select name, ssl_vpn_client_cert_id, statusfrom alicloud_vpc_ssl_vpn_client_certwhere status = 'expiring-soon';
select name, ssl_vpn_client_cert_id, statusfrom alicloud_vpc_ssl_vpn_client_certwhere status = 'expiring-soon';
Certificate count by SSL server
Determine the number of certificates associated with each SSL server to monitor your network's security. This can help in managing certificate distribution and identifying servers with unusually high or low certificate counts.
select ssl_vpn_server_id, count (ssl_vpn_client_cert_id) as certificate_countfrom alicloud_vpc_ssl_vpn_client_certgroup by ssl_vpn_server_id;
select ssl_vpn_server_id, count (ssl_vpn_client_cert_id) as certificate_countfrom alicloud_vpc_ssl_vpn_client_certgroup by ssl_vpn_server_id;
Schema for alicloud_vpc_ssl_vpn_client_cert
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The Alicloud Account ID in which the resource is located. |
akas | jsonb | Array of globally unique identifier strings (also known as) for the resource. | |
ca_cert | text | The CA certificate. | |
client_cert | text | The client certificate. | |
client_config | text | The client configuration. | |
client_key | text | The client key. | |
create_time | timestamp with time zone | The time when the SSL client certificate was created. | |
end_time | timestamp with time zone | The time when the SSL client certificate expires. | |
name | text | The name of the SSL client certificate. | |
region | text | The Alicloud region in which the resource is located. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
ssl_vpn_client_cert_id | text | = | The ID of the SSL client certificate. |
ssl_vpn_server_id | text | The ID of the SSL-VPN server. | |
status | text | The status of the client certificate. | |
title | text | Title of the resource. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- alicloud
You can pass the configuration to the command with the --config
argument:
steampipe_export_alicloud --config '<your_config>' alicloud_vpc_ssl_vpn_client_cert