steampipe plugin install fastly

Table: fastly_acl_entry - Query Fastly Access Control List Entries using SQL

Fastly Access Control List Entries are individual rules within an Access Control List (ACL) in Fastly, a cloud computing services provider. These entries determine what traffic is allowed or denied based on the IP address or the subnet. Fastly Access Control List Entries offer granular control over the traffic to your services, enhancing security by blocking or allowing specific IP addresses or subnets.

Table Usage Guide

The fastly_acl_entry table provides insights into individual rules within an Access Control List (ACL) in Fastly. As a security engineer, you can explore details about each ACL entry through this table, including IP addresses, subnet details, and the actions associated with them. Use this table to analyze and manage traffic to your services by blocking or allowing specific IP addresses or subnets.

Examples

Basic info

Explore which access control list (ACL) entries have been negated to understand potential vulnerabilities in your network security. This information can be crucial in identifying areas that require immediate attention or improvement.

select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry;
select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry;

List entries created in the last 30 days

Discover the most recent entries to understand your system's activity over the past month. This allows you to stay updated on changes and identify any unusual patterns or anomalies.

select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry
where
created_at >= now() - interval '30 days';
select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry
where
created_at >= datetime('now', '-30 days');

List entries that are not deleted

Uncover the details of active access control list (ACL) entries in your Fastly configuration to maintain the security and access management of your network resources. This query is useful in monitoring the overall health of your ACLs by identifying entries that are currently in effect.

select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry
where
deleted_at is null;
select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry
where
deleted_at is null;

List entries that are negated

Discover the segments that have been negated to understand the impact on your Fastly Access Control List (ACL). This can help pinpoint specific areas requiring attention or modification to enhance your security measures.

select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry
where
negated;
select
id,
acl_id,
ip,
negated,
service_id,
created_at
from
fastly_acl_entry
where
negated = 1;

List entries of a particular ACL

Analyze the settings to understand the specific entries within a particular Access Control List (ACL), allowing you to assess the configuration for better security management.

select
e.id,
acl_id,
ip,
negated,
e.service_id,
e.created_at
from
fastly_acl_entry as e,
fastly_acl as a
where
e.acl_id = a.id
and name = 'acl_entry';
select
e.id,
acl_id,
ip,
negated,
e.service_id,
e.created_at
from
fastly_acl_entry as e,
fastly_acl as a
where
e.acl_id = a.id
and a.name = 'acl_entry';

Schema for fastly_acl_entry

NameTypeOperatorsDescription
_ctxjsonbSteampipe context in JSON form.
acl_idtext=Alphanumeric string identifying a ACL.
commenttextA freeform descriptive note.
created_attimestamp with time zoneTimestamp (UTC) of when the ACL was created.
deleted_attimestamp with time zoneTimestamp (UTC) of when the ACL was deleted.
idtext=The ID of the ACL entry.
ipinetAn IP address.
negatedbooleanWhether to negate the match. Useful primarily when creating individual exceptions to larger subnets.
service_idtext=, !=, ~~, ~~*, !~~, !~~*Alphanumeric string identifying the service.
sp_connection_nametext=, !=, ~~, ~~*, !~~, !~~*Steampipe connection name.
sp_ctxjsonbSteampipe context in JSON form.
subnetbigintSubnet associated with the ACL entry.
titletextTitle of the resource.
updated_attimestamp with time zoneTimestamp (UTC) of when the ACL was updated.

Export

This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.

You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh script:

/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- fastly

You can pass the configuration to the command with the --config argument:

steampipe_export_fastly --config '<your_config>' fastly_acl_entry