steampipe plugin install oci

Table: oci_ai_anomaly_detection_ai_private_endpoint - Query OCI AI Anomaly Detection AI Private Endpoints using SQL

AI Private Endpoint is a feature in Oracle Cloud Infrastructure's AI Anomaly Detection service. It provides a private, secure, and direct connection between your virtual cloud network (VCN) and the AI services, without exposing the data to the public internet. This feature enhances the security of your data by keeping all traffic within the Oracle network.

Table Usage Guide

The oci_ai_anomaly_detection_ai_private_endpoint table provides insights into AI Private Endpoints within Oracle Cloud Infrastructure's AI Anomaly Detection service. As a security analyst or a data engineer, explore endpoint-specific details through this table, including the associated network details, the status of the endpoint, and other metadata. Utilize it to uncover information about endpoints, such as their current status, the network they are associated with, and the time they were created.

Examples

Basic info

Explore which anomaly detection endpoints are currently active in your Oracle Cloud Infrastructure. This can help you understand the state of your AI services and manage resources effectively.

select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint;
select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint;

List the AI private endpoints created in the last 30 days

Explore the recent additions to your AI private endpoints over the past month. This can help in tracking the growth and changes in your AI infrastructure, ensuring you stay updated on the evolution of your system.

select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
time_created >= now() - interval '30' day;
select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
time_created >= datetime('now', '-30 day');

List the AI private endpoints that have attached data assets

Discover the segments that have AI private endpoints associated with data assets. This is useful in understanding which endpoints are actively being used for data processing in anomaly detection, providing insights for resource allocation and security monitoring.

select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
attached_data_assets is not null;
select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
attached_data_assets is not null;

List AI private endpoints which are not active

Discover the segments that consist of inactive AI private endpoints. This can be beneficial in identifying endpoints that may need troubleshooting or updating.

select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
lifecycle_state <> 'ACTIVE';
select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_details,
attached_data_assets,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
lifecycle_state <> 'ACTIVE';

List DNS zones associated to the AI private endpoints

Explore the association of DNS zones with AI private endpoints in your network. This can help in identifying potential anomalies and understanding the lifecycle state of these endpoints.

select
id,
subnet_id,
jsonb_pretty(dns_zones) as dns_zones,
display_name,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
dns_zones is not null;
select
id,
subnet_id,
dns_zones,
display_name,
lifecycle_state as state
from
oci_ai_anomaly_detection_ai_private_endpoint
where
dns_zones is not null;

Schema for oci_ai_anomaly_detection_ai_private_endpoint

NameTypeOperatorsDescription
_ctxjsonbSteampipe context in JSON form.
attached_data_assetsjsonbThe list of dataAssets using the private reverse connection endpoint.
compartment_idtext=The OCID of the compartment in Tenant in which the resource is located.
defined_tagsjsonbDefined tags for this resource. Each key is predefined and scoped to a namespace.
display_nametext=Private Reverse Connection Endpoint display name.
dns_zonesjsonbList of DNS zones to be used by the data assets.
freeform_tagsjsonbSimple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
idtext=Unique identifier that is immutable.
lifecycle_detailstextA message describing the current state in more detail. For example, can be used to provide actionable information for a resource in 'Failed' state.
lifecycle_statetext=The current state of the private endpoint resource.
sp_connection_nametext=, !=, ~~, ~~*, !~~, !~~*Steampipe connection name.
sp_ctxjsonbSteampipe context in JSON form.
subnet_idtextSubnet Identifier.
tagsjsonbA map of tags for the resource.
tenant_idtext=, !=, ~~, ~~*, !~~, !~~*The OCID of the Tenant in which the resource is located.
time_createdtimestamp with time zoneTime that AI Private Endpoint was created.
titletextTitle of the resource.

Export

This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.

You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh script:

/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- oci

You can pass the configuration to the command with the --config argument:

steampipe_export_oci --config '<your_config>' oci_ai_anomaly_detection_ai_private_endpoint