Aqua Resource and Unit Counts
Aqua considers the following cloud resources as a Secured Resource when calculating the consumption of Units. Each Secured Resource consumes 5 Units per year.
- Amazon Web Services (AWS)
- Microsoft Azure
- Google Compute Platform (GCP)
- Oracle Cloud Infrastructure (OCI)
Amazon Web Services (AWS)
- EC2 Instance
- Lambda Function
- S3 Bucket
- ELB/ALB/NLB Load Balancer
- ECR Repository
- EKS Cluster
- EMR Cluster
- ECS Task Definition
- RDS Database Instance
- DynamoDB Table
- Redshift Cluster
- Elasticache Cluster
- Kinesis Stream
- CloudFront Distribution
- API Gateway API
- Sagemaker Notebook
- SNS Topic
- SQS Queue
- Athena Workgroup
- EFS Filesystem
- Firehose Delivery Stream
- Transfer Server
Microsoft Azure
- Storage Accounts
- Blob Containers
- Tables
- Queues
- Compute Virtual Machines
- Compute Disks
- Compute Availability Sets
- Compute Virtual Machine Scale Sets
- Network Virtual Networks
- Network Security Groups
- Network Watchers
- Network Load Balancers
- SQL Servers
- MySQL Servers
- Postgres Servers
- Web Sites
- CDN Profiles
- Authorization Policy Assignments
- Authorization Policy Definitions
- Authorization Role Definitions
- Authorization Locks
- Security Contacts
- Security Auto Provisioning Settings
- Security Pricings
- Key Vaults
- Container Registries
- Container Service Managed Clusters
- Insights Activity Log Alerts
- Insights Log Profiles
- Insights Autoscale Settings
- Insights Diagnostics Settings
Google Compute Platform (GCP)
- Cloud Load Balancers
- Autoscale Instance Groups
- Compute Instances
- Disks
- Key Rings
- Crypto Keys
- Managed DNS Zones
- IAM Policies
- IAM Users
- Service Account Users
- Kubernetes Clusters
- Alert Policies
- Log Sinks
- SQL Instances
- Storage Buckets
- VPC Networks
- Firewalls
Oracle Cloud Infrastructure (OCI)
- Block Storage Policies
- Block Storage Volumes
- Block Storage Volume Backups
- Autoscaling Instance Pools
- Autoscaling Instances
- Compute Instances
- Boot Volumes
- Databases
- File Storage Services
- File Systems
- Groups
- Users
- Identity Policies
- VCNs
- Security Lists
- Load Balancers
- Network Security Groups
- WAFs
- Object Store Buckets
Did you find it helpful? Yes No
Send feedbackSorry we couldn't be helpful. Help us improve this article with your feedback.