<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RQL query for resources outside the authorized regions in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/477523#M481</link>
    <description>&lt;P&gt;Hello Prisma Cloud users,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm sharing with you some research I did this morning that you may find interesting. We want to detect and prevent when a resource is created in an unauthorized region.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;config from cloud.resource where cloud.type = 'azure' AND cloud.region NOT IN ( 'Azure France Central' , 'Azure France South' , 'Azure Germany Central' , 'Azure Germany Northeast' , 'Azure Germany North' , 'Azure Germany West Central' )&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can specify your cloud types, your cloud regions and you can add all variables you want.&lt;/P&gt;
&lt;P&gt;For example I can use api.name if I want to check a specific type of resources.&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class=""&gt;api.name &lt;/SPAN&gt;&lt;SPAN class=""&gt;=&lt;/SPAN&gt; &lt;SPAN class=""&gt;'azure-kubernetes-cluster' # If want want to test my AKS clusters&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a good journey&amp;nbsp;in the world of RQL queries&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Prisma Cloud" id="Prisma_Cloud"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Apr 2022 15:36:00 GMT</pubDate>
    <dc:creator>JJoly</dc:creator>
    <dc:date>2022-04-20T15:36:00Z</dc:date>
    <item>
      <title>RQL query for resources outside the authorized regions</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/477523#M481</link>
      <description>&lt;P&gt;Hello Prisma Cloud users,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm sharing with you some research I did this morning that you may find interesting. We want to detect and prevent when a resource is created in an unauthorized region.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;config from cloud.resource where cloud.type = 'azure' AND cloud.region NOT IN ( 'Azure France Central' , 'Azure France South' , 'Azure Germany Central' , 'Azure Germany Northeast' , 'Azure Germany North' , 'Azure Germany West Central' )&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can specify your cloud types, your cloud regions and you can add all variables you want.&lt;/P&gt;
&lt;P&gt;For example I can use api.name if I want to check a specific type of resources.&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class=""&gt;api.name &lt;/SPAN&gt;&lt;SPAN class=""&gt;=&lt;/SPAN&gt; &lt;SPAN class=""&gt;'azure-kubernetes-cluster' # If want want to test my AKS clusters&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a good journey&amp;nbsp;in the world of RQL queries&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Prisma Cloud" id="Prisma_Cloud"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 15:36:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/477523#M481</guid>
      <dc:creator>JJoly</dc:creator>
      <dc:date>2022-04-20T15:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: RQL query for resources outside the authorized regions</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/509662#M536</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This can be accomplished via targeting specific regions using the alert rule. The filters such as cloud.region and cloud.account are meant to be used in the investigate portion of Prisma, but are not respected if turned into a policy. This is due to how targeting is handled via the alert rule. With this in mind, you can create a query to look at an api, then target regions outside of the ones normally used by the team. You can find more details here - &lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-alerts/create-an-alert-rule" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-alerts/create-an-alert-rule&lt;/A&gt; &lt;/SPAN&gt;&lt;A class="waffle-rich-text-link" title="Create a Custom Policy" href="https://docs.prismacloud.io/en/enterprise-edition/content-collections/governance/create-a-policy" target="_blank" rel="noopener"&gt;Create a Custom Policy&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 21:03:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/509662#M536</guid>
      <dc:creator>RPrasadi</dc:creator>
      <dc:date>2024-10-31T21:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: RQL query for resources outside the authorized regions</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/559142#M1049</link>
      <description>&lt;P&gt;Is there any way to do this without grouping by api.name? Only filtering by cloud.type and cloud.region. When I try to save policy I've got this error "Insufficient Query for Policy Creation" I need to identify al resources outside the authorized regions, not by one api.name&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 10:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/rql-query-for-resources-outside-the-authorized-regions/m-p/559142#M1049</guid>
      <dc:creator>APinzon</dc:creator>
      <dc:date>2023-09-22T10:14:56Z</dc:date>
    </item>
  </channel>
</rss>

