turbot/tailpipe-mod-gcp-audit-log-detections

Query: cloud_run_function_deleted

Usage

powerpipe query gcp_audit_log_detections.query.cloud_run_function_deleted

Tailpipe Tables

SQL

select
tp_timestamp as timestamp,
method_name as operation,
resource_name as resource,
authentication_info.principal_email as actor,
tp_source_ip as source_ip,
tp_index as project,
tp_id as source_id,
-- Create new aliases to preserve original row data
operation as operation_src,
resource as resource_src,
*
exclude operation, resource
from
gcp_audit_log
where
method_name ilike 'google.cloud.functions.v%.functionservice.deletefunction'
and severity != 'Error'
order by
timestamp desc;

Detections

The query is being used by the following detections: