turbot/gcp_compliance

Query: compute_firewall_rule_logging_enabled

Usage

powerpipe query gcp_compliance.query.compute_firewall_rule_logging_enabled

Steampipe Tables

SQL

select
self_link as resource,
case
when log_config_enable then 'ok'
else 'alarm'
end as status,
case
when log_config_enable then name || ' logging enabled.'
else name || ' logging disabled.'
end as reason
, location as location, project as project
from
gcp_compute_firewall;

Controls

The query is being used by the following controls: