com.azure.resourcemanager.sql.fluent.models.DatabaseBlobAuditingPolicyInner Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of azure-resourcemanager-sql Show documentation
Show all versions of azure-resourcemanager-sql Show documentation
This package contains Microsoft Azure Sql Management SDK. For documentation on how to use this package, please see https://aka.ms/azsdk/java/mgmt
The newest version!
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License.
// Code generated by Microsoft (R) AutoRest Code Generator.
package com.azure.resourcemanager.sql.fluent.models;
import com.azure.core.annotation.Fluent;
import com.azure.core.management.ProxyResource;
import com.azure.json.JsonReader;
import com.azure.json.JsonToken;
import com.azure.json.JsonWriter;
import com.azure.resourcemanager.sql.models.BlobAuditingPolicyState;
import java.io.IOException;
import java.util.List;
import java.util.UUID;
/**
* A database blob auditing policy.
*/
@Fluent
public final class DatabaseBlobAuditingPolicyInner extends ProxyResource {
/*
* Resource kind.
*/
private String kind;
/*
* Resource properties.
*/
private DatabaseBlobAuditingPolicyProperties innerProperties;
/*
* The type of the resource.
*/
private String type;
/*
* The name of the resource.
*/
private String name;
/*
* Fully qualified resource Id for the resource.
*/
private String id;
/**
* Creates an instance of DatabaseBlobAuditingPolicyInner class.
*/
public DatabaseBlobAuditingPolicyInner() {
}
/**
* Get the kind property: Resource kind.
*
* @return the kind value.
*/
public String kind() {
return this.kind;
}
/**
* Get the innerProperties property: Resource properties.
*
* @return the innerProperties value.
*/
private DatabaseBlobAuditingPolicyProperties innerProperties() {
return this.innerProperties;
}
/**
* Get the type property: The type of the resource.
*
* @return the type value.
*/
@Override
public String type() {
return this.type;
}
/**
* Get the name property: The name of the resource.
*
* @return the name value.
*/
@Override
public String name() {
return this.name;
}
/**
* Get the id property: Fully qualified resource Id for the resource.
*
* @return the id value.
*/
@Override
public String id() {
return this.id;
}
/**
* Get the retentionDays property: Specifies the number of days to keep in the audit logs in the storage account.
*
* @return the retentionDays value.
*/
public Integer retentionDays() {
return this.innerProperties() == null ? null : this.innerProperties().retentionDays();
}
/**
* Set the retentionDays property: Specifies the number of days to keep in the audit logs in the storage account.
*
* @param retentionDays the retentionDays value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withRetentionDays(Integer retentionDays) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withRetentionDays(retentionDays);
return this;
}
/**
* Get the auditActionsAndGroups property: Specifies the Actions-Groups and Actions to audit.
*
* The recommended set of action groups to use is the following combination - this will audit all the queries and
* stored procedures executed against the database, as well as successful and failed logins:
*
* BATCH_COMPLETED_GROUP,
* SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP,
* FAILED_DATABASE_AUTHENTICATION_GROUP.
*
* This above combination is also the set that is configured by default when enabling auditing from the Azure
* portal.
*
* The supported action groups to audit are (note: choose only specific groups that cover your auditing needs. Using
* unnecessary groups could lead to very large quantities of audit records):
*
* APPLICATION_ROLE_CHANGE_PASSWORD_GROUP
* BACKUP_RESTORE_GROUP
* DATABASE_LOGOUT_GROUP
* DATABASE_OBJECT_CHANGE_GROUP
* DATABASE_OBJECT_OWNERSHIP_CHANGE_GROUP
* DATABASE_OBJECT_PERMISSION_CHANGE_GROUP
* DATABASE_OPERATION_GROUP
* DATABASE_PERMISSION_CHANGE_GROUP
* DATABASE_PRINCIPAL_CHANGE_GROUP
* DATABASE_PRINCIPAL_IMPERSONATION_GROUP
* DATABASE_ROLE_MEMBER_CHANGE_GROUP
* FAILED_DATABASE_AUTHENTICATION_GROUP
* SCHEMA_OBJECT_ACCESS_GROUP
* SCHEMA_OBJECT_CHANGE_GROUP
* SCHEMA_OBJECT_OWNERSHIP_CHANGE_GROUP
* SCHEMA_OBJECT_PERMISSION_CHANGE_GROUP
* SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP
* USER_CHANGE_PASSWORD_GROUP
* BATCH_STARTED_GROUP
* BATCH_COMPLETED_GROUP
* DBCC_GROUP
* DATABASE_OWNERSHIP_CHANGE_GROUP
* DATABASE_CHANGE_GROUP
* LEDGER_OPERATION_GROUP
*
* These are groups that cover all sql statements and stored procedures executed against the database, and should
* not be used in combination with other groups as this will result in duplicate audit logs.
*
* For more information, see [Database-Level Audit Action
* Groups](https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions#database-level-audit-action-groups).
*
* For Database auditing policy, specific Actions can also be specified (note that Actions cannot be specified for
* Server auditing policy). The supported actions to audit are:
* SELECT
* UPDATE
* INSERT
* DELETE
* EXECUTE
* RECEIVE
* REFERENCES
*
* The general form for defining an action to be audited is:
* {action} ON {object} BY {principal}
*
* Note that <object> in the above format can refer to an object like a table, view, or stored procedure, or
* an entire database or schema. For the latter cases, the forms DATABASE::{db_name} and SCHEMA::{schema_name} are
* used, respectively.
*
* For example:
* SELECT on dbo.myTable by public
* SELECT on DATABASE::myDatabase by public
* SELECT on SCHEMA::mySchema by public
*
* For more information, see [Database-Level Audit
* Actions](https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions#database-level-audit-actions).
*
* @return the auditActionsAndGroups value.
*/
public List auditActionsAndGroups() {
return this.innerProperties() == null ? null : this.innerProperties().auditActionsAndGroups();
}
/**
* Set the auditActionsAndGroups property: Specifies the Actions-Groups and Actions to audit.
*
* The recommended set of action groups to use is the following combination - this will audit all the queries and
* stored procedures executed against the database, as well as successful and failed logins:
*
* BATCH_COMPLETED_GROUP,
* SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP,
* FAILED_DATABASE_AUTHENTICATION_GROUP.
*
* This above combination is also the set that is configured by default when enabling auditing from the Azure
* portal.
*
* The supported action groups to audit are (note: choose only specific groups that cover your auditing needs. Using
* unnecessary groups could lead to very large quantities of audit records):
*
* APPLICATION_ROLE_CHANGE_PASSWORD_GROUP
* BACKUP_RESTORE_GROUP
* DATABASE_LOGOUT_GROUP
* DATABASE_OBJECT_CHANGE_GROUP
* DATABASE_OBJECT_OWNERSHIP_CHANGE_GROUP
* DATABASE_OBJECT_PERMISSION_CHANGE_GROUP
* DATABASE_OPERATION_GROUP
* DATABASE_PERMISSION_CHANGE_GROUP
* DATABASE_PRINCIPAL_CHANGE_GROUP
* DATABASE_PRINCIPAL_IMPERSONATION_GROUP
* DATABASE_ROLE_MEMBER_CHANGE_GROUP
* FAILED_DATABASE_AUTHENTICATION_GROUP
* SCHEMA_OBJECT_ACCESS_GROUP
* SCHEMA_OBJECT_CHANGE_GROUP
* SCHEMA_OBJECT_OWNERSHIP_CHANGE_GROUP
* SCHEMA_OBJECT_PERMISSION_CHANGE_GROUP
* SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP
* USER_CHANGE_PASSWORD_GROUP
* BATCH_STARTED_GROUP
* BATCH_COMPLETED_GROUP
* DBCC_GROUP
* DATABASE_OWNERSHIP_CHANGE_GROUP
* DATABASE_CHANGE_GROUP
* LEDGER_OPERATION_GROUP
*
* These are groups that cover all sql statements and stored procedures executed against the database, and should
* not be used in combination with other groups as this will result in duplicate audit logs.
*
* For more information, see [Database-Level Audit Action
* Groups](https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions#database-level-audit-action-groups).
*
* For Database auditing policy, specific Actions can also be specified (note that Actions cannot be specified for
* Server auditing policy). The supported actions to audit are:
* SELECT
* UPDATE
* INSERT
* DELETE
* EXECUTE
* RECEIVE
* REFERENCES
*
* The general form for defining an action to be audited is:
* {action} ON {object} BY {principal}
*
* Note that <object> in the above format can refer to an object like a table, view, or stored procedure, or
* an entire database or schema. For the latter cases, the forms DATABASE::{db_name} and SCHEMA::{schema_name} are
* used, respectively.
*
* For example:
* SELECT on dbo.myTable by public
* SELECT on DATABASE::myDatabase by public
* SELECT on SCHEMA::mySchema by public
*
* For more information, see [Database-Level Audit
* Actions](https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions#database-level-audit-actions).
*
* @param auditActionsAndGroups the auditActionsAndGroups value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withAuditActionsAndGroups(List auditActionsAndGroups) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withAuditActionsAndGroups(auditActionsAndGroups);
return this;
}
/**
* Get the isStorageSecondaryKeyInUse property: Specifies whether storageAccountAccessKey value is the storage's
* secondary key.
*
* @return the isStorageSecondaryKeyInUse value.
*/
public Boolean isStorageSecondaryKeyInUse() {
return this.innerProperties() == null ? null : this.innerProperties().isStorageSecondaryKeyInUse();
}
/**
* Set the isStorageSecondaryKeyInUse property: Specifies whether storageAccountAccessKey value is the storage's
* secondary key.
*
* @param isStorageSecondaryKeyInUse the isStorageSecondaryKeyInUse value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withIsStorageSecondaryKeyInUse(Boolean isStorageSecondaryKeyInUse) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withIsStorageSecondaryKeyInUse(isStorageSecondaryKeyInUse);
return this;
}
/**
* Get the isAzureMonitorTargetEnabled property: Specifies whether audit events are sent to Azure Monitor.
* In order to send the events to Azure Monitor, specify 'State' as 'Enabled' and 'IsAzureMonitorTargetEnabled' as
* true.
*
* When using REST API to configure auditing, Diagnostic Settings with 'SQLSecurityAuditEvents' diagnostic logs
* category on the database should be also created.
* Note that for server level audit you should use the 'master' database as {databaseName}.
*
* Diagnostic Settings URI format:
* PUT
* https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/providers/microsoft.insights/diagnosticSettings/{settingsName}?api-version=2017-05-01-preview
*
* For more information, see [Diagnostic Settings REST API](https://go.microsoft.com/fwlink/?linkid=2033207)
* or [Diagnostic Settings PowerShell](https://go.microsoft.com/fwlink/?linkid=2033043).
*
* @return the isAzureMonitorTargetEnabled value.
*/
public Boolean isAzureMonitorTargetEnabled() {
return this.innerProperties() == null ? null : this.innerProperties().isAzureMonitorTargetEnabled();
}
/**
* Set the isAzureMonitorTargetEnabled property: Specifies whether audit events are sent to Azure Monitor.
* In order to send the events to Azure Monitor, specify 'State' as 'Enabled' and 'IsAzureMonitorTargetEnabled' as
* true.
*
* When using REST API to configure auditing, Diagnostic Settings with 'SQLSecurityAuditEvents' diagnostic logs
* category on the database should be also created.
* Note that for server level audit you should use the 'master' database as {databaseName}.
*
* Diagnostic Settings URI format:
* PUT
* https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/providers/microsoft.insights/diagnosticSettings/{settingsName}?api-version=2017-05-01-preview
*
* For more information, see [Diagnostic Settings REST API](https://go.microsoft.com/fwlink/?linkid=2033207)
* or [Diagnostic Settings PowerShell](https://go.microsoft.com/fwlink/?linkid=2033043).
*
* @param isAzureMonitorTargetEnabled the isAzureMonitorTargetEnabled value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withIsAzureMonitorTargetEnabled(Boolean isAzureMonitorTargetEnabled) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withIsAzureMonitorTargetEnabled(isAzureMonitorTargetEnabled);
return this;
}
/**
* Get the queueDelayMs property: Specifies the amount of time in milliseconds that can elapse before audit actions
* are forced to be processed.
* The default minimum value is 1000 (1 second). The maximum is 2,147,483,647.
*
* @return the queueDelayMs value.
*/
public Integer queueDelayMs() {
return this.innerProperties() == null ? null : this.innerProperties().queueDelayMs();
}
/**
* Set the queueDelayMs property: Specifies the amount of time in milliseconds that can elapse before audit actions
* are forced to be processed.
* The default minimum value is 1000 (1 second). The maximum is 2,147,483,647.
*
* @param queueDelayMs the queueDelayMs value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withQueueDelayMs(Integer queueDelayMs) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withQueueDelayMs(queueDelayMs);
return this;
}
/**
* Get the isManagedIdentityInUse property: Specifies whether Managed Identity is used to access blob storage.
*
* @return the isManagedIdentityInUse value.
*/
public Boolean isManagedIdentityInUse() {
return this.innerProperties() == null ? null : this.innerProperties().isManagedIdentityInUse();
}
/**
* Set the isManagedIdentityInUse property: Specifies whether Managed Identity is used to access blob storage.
*
* @param isManagedIdentityInUse the isManagedIdentityInUse value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withIsManagedIdentityInUse(Boolean isManagedIdentityInUse) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withIsManagedIdentityInUse(isManagedIdentityInUse);
return this;
}
/**
* Get the state property: Specifies the state of the audit. If state is Enabled, storageEndpoint or
* isAzureMonitorTargetEnabled are required.
*
* @return the state value.
*/
public BlobAuditingPolicyState state() {
return this.innerProperties() == null ? null : this.innerProperties().state();
}
/**
* Set the state property: Specifies the state of the audit. If state is Enabled, storageEndpoint or
* isAzureMonitorTargetEnabled are required.
*
* @param state the state value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withState(BlobAuditingPolicyState state) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withState(state);
return this;
}
/**
* Get the storageEndpoint property: Specifies the blob storage endpoint (e.g.
* https://MyAccount.blob.core.windows.net). If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled is
* required.
*
* @return the storageEndpoint value.
*/
public String storageEndpoint() {
return this.innerProperties() == null ? null : this.innerProperties().storageEndpoint();
}
/**
* Set the storageEndpoint property: Specifies the blob storage endpoint (e.g.
* https://MyAccount.blob.core.windows.net). If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled is
* required.
*
* @param storageEndpoint the storageEndpoint value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withStorageEndpoint(String storageEndpoint) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withStorageEndpoint(storageEndpoint);
return this;
}
/**
* Get the storageAccountAccessKey property: Specifies the identifier key of the auditing storage account.
* If state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL
* server system-assigned managed identity to access the storage.
* Prerequisites for using managed identity authentication:
* 1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).
* 2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to
* the server identity.
* For more information, see [Auditing to storage using Managed Identity
* authentication](https://go.microsoft.com/fwlink/?linkid=2114355).
*
* @return the storageAccountAccessKey value.
*/
public String storageAccountAccessKey() {
return this.innerProperties() == null ? null : this.innerProperties().storageAccountAccessKey();
}
/**
* Set the storageAccountAccessKey property: Specifies the identifier key of the auditing storage account.
* If state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL
* server system-assigned managed identity to access the storage.
* Prerequisites for using managed identity authentication:
* 1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).
* 2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to
* the server identity.
* For more information, see [Auditing to storage using Managed Identity
* authentication](https://go.microsoft.com/fwlink/?linkid=2114355).
*
* @param storageAccountAccessKey the storageAccountAccessKey value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withStorageAccountAccessKey(String storageAccountAccessKey) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withStorageAccountAccessKey(storageAccountAccessKey);
return this;
}
/**
* Get the storageAccountSubscriptionId property: Specifies the blob storage subscription Id.
*
* @return the storageAccountSubscriptionId value.
*/
public UUID storageAccountSubscriptionId() {
return this.innerProperties() == null ? null : this.innerProperties().storageAccountSubscriptionId();
}
/**
* Set the storageAccountSubscriptionId property: Specifies the blob storage subscription Id.
*
* @param storageAccountSubscriptionId the storageAccountSubscriptionId value to set.
* @return the DatabaseBlobAuditingPolicyInner object itself.
*/
public DatabaseBlobAuditingPolicyInner withStorageAccountSubscriptionId(UUID storageAccountSubscriptionId) {
if (this.innerProperties() == null) {
this.innerProperties = new DatabaseBlobAuditingPolicyProperties();
}
this.innerProperties().withStorageAccountSubscriptionId(storageAccountSubscriptionId);
return this;
}
/**
* Validates the instance.
*
* @throws IllegalArgumentException thrown if the instance is not valid.
*/
public void validate() {
if (innerProperties() != null) {
innerProperties().validate();
}
}
/**
* {@inheritDoc}
*/
@Override
public JsonWriter toJson(JsonWriter jsonWriter) throws IOException {
jsonWriter.writeStartObject();
jsonWriter.writeJsonField("properties", this.innerProperties);
return jsonWriter.writeEndObject();
}
/**
* Reads an instance of DatabaseBlobAuditingPolicyInner from the JsonReader.
*
* @param jsonReader The JsonReader being read.
* @return An instance of DatabaseBlobAuditingPolicyInner if the JsonReader was pointing to an instance of it, or
* null if it was pointing to JSON null.
* @throws IllegalStateException If the deserialized JSON object was missing any required properties.
* @throws IOException If an error occurs while reading the DatabaseBlobAuditingPolicyInner.
*/
public static DatabaseBlobAuditingPolicyInner fromJson(JsonReader jsonReader) throws IOException {
return jsonReader.readObject(reader -> {
DatabaseBlobAuditingPolicyInner deserializedDatabaseBlobAuditingPolicyInner
= new DatabaseBlobAuditingPolicyInner();
while (reader.nextToken() != JsonToken.END_OBJECT) {
String fieldName = reader.getFieldName();
reader.nextToken();
if ("id".equals(fieldName)) {
deserializedDatabaseBlobAuditingPolicyInner.id = reader.getString();
} else if ("name".equals(fieldName)) {
deserializedDatabaseBlobAuditingPolicyInner.name = reader.getString();
} else if ("type".equals(fieldName)) {
deserializedDatabaseBlobAuditingPolicyInner.type = reader.getString();
} else if ("kind".equals(fieldName)) {
deserializedDatabaseBlobAuditingPolicyInner.kind = reader.getString();
} else if ("properties".equals(fieldName)) {
deserializedDatabaseBlobAuditingPolicyInner.innerProperties
= DatabaseBlobAuditingPolicyProperties.fromJson(reader);
} else {
reader.skipChildren();
}
}
return deserializedDatabaseBlobAuditingPolicyInner;
});
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy