ConstraintViolationResponse

ConstraintViolationResponse
ConstraintViolationResponse
JSON Example
{
    "violationId": "string",
    "vimId": "string",
    "vimName": "string",
    "policyName": "string",
    "message": "string",
    "resourceName": "string",
    "tcaResourceId": "string",
    "resourceKind": "string",
    "resourceGroup": "string",
    "resourceVersion": "string",
    "resourceNamespace": "string",
    "enforcementAction": "string",
    "reportedTime": "string",
    "isActive": false,
    "opaViolationType": "string",
    "tcaResourceType": "string"
}
string
violationId
Required

Unique Identifier of constraint Violation

string
vimId
Required

The subject VIM identifier.

string
vimName
Optional

The name of the k8s based Vim

string
policyName
Required

The name of policy violated i.e constraint name

string
message
Optional

The detailed violation message

string
resourceName
Required

The name of the resource which has violation

string
tcaResourceId
Optional

The TCA ID of the resource which has violation

string
resourceKind
Required

The kind of the resource which has violation

string
resourceGroup
Optional

The Group of the resource which has violation

string
resourceVersion
Optional

The ApiVersion of the resource which has violation

string
resourceNamespace
Required

The namespace of the resource which has violation

string
enforcementAction
Required

The supported enforcementActions are [deny, dryrun, warn]

string As date-time As date-time
reportedTime
Required

The report time of the violation

boolean
isActive
Optional

The violation status Active/inActive

string
opaViolationType
Optional

The violation Type ADMISSION_TIME/AUDIT_TIME

string
tcaResourceType
Optional

The TCA resource type CNF/GITOPS/OTHERS