com.pulumi.azure.mssql.kotlin.ManagedInstanceSecurityAlertPolicyArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-azure-kotlin Show documentation
Show all versions of pulumi-azure-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.azure.mssql.kotlin
import com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.Boolean
import kotlin.Int
import kotlin.String
import kotlin.Suppress
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
* Manages a Security Alert Policy for an MS SQL Managed Instance.
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as azure from "@pulumi/azure";
* const example = new azure.core.ResourceGroup("example", {
* name: "database-rg",
* location: "West Europe",
* });
* const exampleNetworkSecurityGroup = new azure.network.NetworkSecurityGroup("example", {
* name: "mi-security-group",
* location: example.location,
* resourceGroupName: example.name,
* });
* const allowManagementInbound = new azure.network.NetworkSecurityRule("allow_management_inbound", {
* name: "allow_management_inbound",
* priority: 106,
* direction: "Inbound",
* access: "Allow",
* protocol: "Tcp",
* sourcePortRange: "*",
* destinationPortRanges: [
* "9000",
* "9003",
* "1438",
* "1440",
* "1452",
* ],
* sourceAddressPrefix: "*",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const allowMisubnetInbound = new azure.network.NetworkSecurityRule("allow_misubnet_inbound", {
* name: "allow_misubnet_inbound",
* priority: 200,
* direction: "Inbound",
* access: "Allow",
* protocol: "*",
* sourcePortRange: "*",
* destinationPortRange: "*",
* sourceAddressPrefix: "10.0.0.0/24",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const allowHealthProbeInbound = new azure.network.NetworkSecurityRule("allow_health_probe_inbound", {
* name: "allow_health_probe_inbound",
* priority: 300,
* direction: "Inbound",
* access: "Allow",
* protocol: "*",
* sourcePortRange: "*",
* destinationPortRange: "*",
* sourceAddressPrefix: "AzureLoadBalancer",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const allowTdsInbound = new azure.network.NetworkSecurityRule("allow_tds_inbound", {
* name: "allow_tds_inbound",
* priority: 1000,
* direction: "Inbound",
* access: "Allow",
* protocol: "Tcp",
* sourcePortRange: "*",
* destinationPortRange: "1433",
* sourceAddressPrefix: "VirtualNetwork",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const denyAllInbound = new azure.network.NetworkSecurityRule("deny_all_inbound", {
* name: "deny_all_inbound",
* priority: 4096,
* direction: "Inbound",
* access: "Deny",
* protocol: "*",
* sourcePortRange: "*",
* destinationPortRange: "*",
* sourceAddressPrefix: "*",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const allowManagementOutbound = new azure.network.NetworkSecurityRule("allow_management_outbound", {
* name: "allow_management_outbound",
* priority: 102,
* direction: "Outbound",
* access: "Allow",
* protocol: "Tcp",
* sourcePortRange: "*",
* destinationPortRanges: [
* "80",
* "443",
* "12000",
* ],
* sourceAddressPrefix: "*",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const allowMisubnetOutbound = new azure.network.NetworkSecurityRule("allow_misubnet_outbound", {
* name: "allow_misubnet_outbound",
* priority: 200,
* direction: "Outbound",
* access: "Allow",
* protocol: "*",
* sourcePortRange: "*",
* destinationPortRange: "*",
* sourceAddressPrefix: "10.0.0.0/24",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const denyAllOutbound = new azure.network.NetworkSecurityRule("deny_all_outbound", {
* name: "deny_all_outbound",
* priority: 4096,
* direction: "Outbound",
* access: "Deny",
* protocol: "*",
* sourcePortRange: "*",
* destinationPortRange: "*",
* sourceAddressPrefix: "*",
* destinationAddressPrefix: "*",
* resourceGroupName: example.name,
* networkSecurityGroupName: exampleNetworkSecurityGroup.name,
* });
* const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
* name: "vnet-mi",
* resourceGroupName: example.name,
* addressSpaces: ["10.0.0.0/16"],
* location: example.location,
* });
* const exampleSubnet = new azure.network.Subnet("example", {
* name: "subnet-mi",
* resourceGroupName: example.name,
* virtualNetworkName: exampleVirtualNetwork.name,
* addressPrefixes: ["10.0.0.0/24"],
* delegations: [{
* name: "managedinstancedelegation",
* serviceDelegation: {
* name: "Microsoft.Sql/managedInstances",
* actions: [
* "Microsoft.Network/virtualNetworks/subnets/join/action",
* "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
* "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action",
* ],
* },
* }],
* });
* const exampleSubnetNetworkSecurityGroupAssociation = new azure.network.SubnetNetworkSecurityGroupAssociation("example", {
* subnetId: exampleSubnet.id,
* networkSecurityGroupId: exampleNetworkSecurityGroup.id,
* });
* const exampleRouteTable = new azure.network.RouteTable("example", {
* name: "routetable-mi",
* location: example.location,
* resourceGroupName: example.name,
* disableBgpRoutePropagation: false,
* });
* const exampleSubnetRouteTableAssociation = new azure.network.SubnetRouteTableAssociation("example", {
* subnetId: exampleSubnet.id,
* routeTableId: exampleRouteTable.id,
* });
* const exampleManagedInstance = new azure.mssql.ManagedInstance("example", {
* name: "managedsqlinstance",
* resourceGroupName: example.name,
* location: example.location,
* licenseType: "BasePrice",
* skuName: "GP_Gen5",
* storageSizeInGb: 32,
* subnetId: exampleSubnet.id,
* vcores: 4,
* administratorLogin: "mradministrator",
* administratorLoginPassword: "thisIsDog11",
* });
* const exampleManagedInstanceSecurityAlertPolicy = new azure.mssql.ManagedInstanceSecurityAlertPolicy("example", {
* resourceGroupName: example.name,
* managedInstanceName: exampleManagedInstance.name,
* enabled: true,
* storageEndpoint: exampleAzurermStorageAccount.primaryBlobEndpoint,
* storageAccountAccessKey: exampleAzurermStorageAccount.primaryAccessKey,
* disabledAlerts: [
* "Sql_Injection",
* "Data_Exfiltration",
* ],
* retentionDays: 20,
* });
* ```
* ```python
* import pulumi
* import pulumi_azure as azure
* example = azure.core.ResourceGroup("example",
* name="database-rg",
* location="West Europe")
* example_network_security_group = azure.network.NetworkSecurityGroup("example",
* name="mi-security-group",
* location=example.location,
* resource_group_name=example.name)
* allow_management_inbound = azure.network.NetworkSecurityRule("allow_management_inbound",
* name="allow_management_inbound",
* priority=106,
* direction="Inbound",
* access="Allow",
* protocol="Tcp",
* source_port_range="*",
* destination_port_ranges=[
* "9000",
* "9003",
* "1438",
* "1440",
* "1452",
* ],
* source_address_prefix="*",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* allow_misubnet_inbound = azure.network.NetworkSecurityRule("allow_misubnet_inbound",
* name="allow_misubnet_inbound",
* priority=200,
* direction="Inbound",
* access="Allow",
* protocol="*",
* source_port_range="*",
* destination_port_range="*",
* source_address_prefix="10.0.0.0/24",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* allow_health_probe_inbound = azure.network.NetworkSecurityRule("allow_health_probe_inbound",
* name="allow_health_probe_inbound",
* priority=300,
* direction="Inbound",
* access="Allow",
* protocol="*",
* source_port_range="*",
* destination_port_range="*",
* source_address_prefix="AzureLoadBalancer",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* allow_tds_inbound = azure.network.NetworkSecurityRule("allow_tds_inbound",
* name="allow_tds_inbound",
* priority=1000,
* direction="Inbound",
* access="Allow",
* protocol="Tcp",
* source_port_range="*",
* destination_port_range="1433",
* source_address_prefix="VirtualNetwork",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* deny_all_inbound = azure.network.NetworkSecurityRule("deny_all_inbound",
* name="deny_all_inbound",
* priority=4096,
* direction="Inbound",
* access="Deny",
* protocol="*",
* source_port_range="*",
* destination_port_range="*",
* source_address_prefix="*",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* allow_management_outbound = azure.network.NetworkSecurityRule("allow_management_outbound",
* name="allow_management_outbound",
* priority=102,
* direction="Outbound",
* access="Allow",
* protocol="Tcp",
* source_port_range="*",
* destination_port_ranges=[
* "80",
* "443",
* "12000",
* ],
* source_address_prefix="*",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* allow_misubnet_outbound = azure.network.NetworkSecurityRule("allow_misubnet_outbound",
* name="allow_misubnet_outbound",
* priority=200,
* direction="Outbound",
* access="Allow",
* protocol="*",
* source_port_range="*",
* destination_port_range="*",
* source_address_prefix="10.0.0.0/24",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* deny_all_outbound = azure.network.NetworkSecurityRule("deny_all_outbound",
* name="deny_all_outbound",
* priority=4096,
* direction="Outbound",
* access="Deny",
* protocol="*",
* source_port_range="*",
* destination_port_range="*",
* source_address_prefix="*",
* destination_address_prefix="*",
* resource_group_name=example.name,
* network_security_group_name=example_network_security_group.name)
* example_virtual_network = azure.network.VirtualNetwork("example",
* name="vnet-mi",
* resource_group_name=example.name,
* address_spaces=["10.0.0.0/16"],
* location=example.location)
* example_subnet = azure.network.Subnet("example",
* name="subnet-mi",
* resource_group_name=example.name,
* virtual_network_name=example_virtual_network.name,
* address_prefixes=["10.0.0.0/24"],
* delegations=[azure.network.SubnetDelegationArgs(
* name="managedinstancedelegation",
* service_delegation=azure.network.SubnetDelegationServiceDelegationArgs(
* name="Microsoft.Sql/managedInstances",
* actions=[
* "Microsoft.Network/virtualNetworks/subnets/join/action",
* "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
* "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action",
* ],
* ),
* )])
* example_subnet_network_security_group_association = azure.network.SubnetNetworkSecurityGroupAssociation("example",
* subnet_id=example_subnet.id,
* network_security_group_id=example_network_security_group.id)
* example_route_table = azure.network.RouteTable("example",
* name="routetable-mi",
* location=example.location,
* resource_group_name=example.name,
* disable_bgp_route_propagation=False)
* example_subnet_route_table_association = azure.network.SubnetRouteTableAssociation("example",
* subnet_id=example_subnet.id,
* route_table_id=example_route_table.id)
* example_managed_instance = azure.mssql.ManagedInstance("example",
* name="managedsqlinstance",
* resource_group_name=example.name,
* location=example.location,
* license_type="BasePrice",
* sku_name="GP_Gen5",
* storage_size_in_gb=32,
* subnet_id=example_subnet.id,
* vcores=4,
* administrator_login="mradministrator",
* administrator_login_password="thisIsDog11")
* example_managed_instance_security_alert_policy = azure.mssql.ManagedInstanceSecurityAlertPolicy("example",
* resource_group_name=example.name,
* managed_instance_name=example_managed_instance.name,
* enabled=True,
* storage_endpoint=example_azurerm_storage_account["primaryBlobEndpoint"],
* storage_account_access_key=example_azurerm_storage_account["primaryAccessKey"],
* disabled_alerts=[
* "Sql_Injection",
* "Data_Exfiltration",
* ],
* retention_days=20)
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Azure = Pulumi.Azure;
* return await Deployment.RunAsync(() =>
* {
* var example = new Azure.Core.ResourceGroup("example", new()
* {
* Name = "database-rg",
* Location = "West Europe",
* });
* var exampleNetworkSecurityGroup = new Azure.Network.NetworkSecurityGroup("example", new()
* {
* Name = "mi-security-group",
* Location = example.Location,
* ResourceGroupName = example.Name,
* });
* var allowManagementInbound = new Azure.Network.NetworkSecurityRule("allow_management_inbound", new()
* {
* Name = "allow_management_inbound",
* Priority = 106,
* Direction = "Inbound",
* Access = "Allow",
* Protocol = "Tcp",
* SourcePortRange = "*",
* DestinationPortRanges = new[]
* {
* "9000",
* "9003",
* "1438",
* "1440",
* "1452",
* },
* SourceAddressPrefix = "*",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var allowMisubnetInbound = new Azure.Network.NetworkSecurityRule("allow_misubnet_inbound", new()
* {
* Name = "allow_misubnet_inbound",
* Priority = 200,
* Direction = "Inbound",
* Access = "Allow",
* Protocol = "*",
* SourcePortRange = "*",
* DestinationPortRange = "*",
* SourceAddressPrefix = "10.0.0.0/24",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var allowHealthProbeInbound = new Azure.Network.NetworkSecurityRule("allow_health_probe_inbound", new()
* {
* Name = "allow_health_probe_inbound",
* Priority = 300,
* Direction = "Inbound",
* Access = "Allow",
* Protocol = "*",
* SourcePortRange = "*",
* DestinationPortRange = "*",
* SourceAddressPrefix = "AzureLoadBalancer",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var allowTdsInbound = new Azure.Network.NetworkSecurityRule("allow_tds_inbound", new()
* {
* Name = "allow_tds_inbound",
* Priority = 1000,
* Direction = "Inbound",
* Access = "Allow",
* Protocol = "Tcp",
* SourcePortRange = "*",
* DestinationPortRange = "1433",
* SourceAddressPrefix = "VirtualNetwork",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var denyAllInbound = new Azure.Network.NetworkSecurityRule("deny_all_inbound", new()
* {
* Name = "deny_all_inbound",
* Priority = 4096,
* Direction = "Inbound",
* Access = "Deny",
* Protocol = "*",
* SourcePortRange = "*",
* DestinationPortRange = "*",
* SourceAddressPrefix = "*",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var allowManagementOutbound = new Azure.Network.NetworkSecurityRule("allow_management_outbound", new()
* {
* Name = "allow_management_outbound",
* Priority = 102,
* Direction = "Outbound",
* Access = "Allow",
* Protocol = "Tcp",
* SourcePortRange = "*",
* DestinationPortRanges = new[]
* {
* "80",
* "443",
* "12000",
* },
* SourceAddressPrefix = "*",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var allowMisubnetOutbound = new Azure.Network.NetworkSecurityRule("allow_misubnet_outbound", new()
* {
* Name = "allow_misubnet_outbound",
* Priority = 200,
* Direction = "Outbound",
* Access = "Allow",
* Protocol = "*",
* SourcePortRange = "*",
* DestinationPortRange = "*",
* SourceAddressPrefix = "10.0.0.0/24",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var denyAllOutbound = new Azure.Network.NetworkSecurityRule("deny_all_outbound", new()
* {
* Name = "deny_all_outbound",
* Priority = 4096,
* Direction = "Outbound",
* Access = "Deny",
* Protocol = "*",
* SourcePortRange = "*",
* DestinationPortRange = "*",
* SourceAddressPrefix = "*",
* DestinationAddressPrefix = "*",
* ResourceGroupName = example.Name,
* NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
* });
* var exampleVirtualNetwork = new Azure.Network.VirtualNetwork("example", new()
* {
* Name = "vnet-mi",
* ResourceGroupName = example.Name,
* AddressSpaces = new[]
* {
* "10.0.0.0/16",
* },
* Location = example.Location,
* });
* var exampleSubnet = new Azure.Network.Subnet("example", new()
* {
* Name = "subnet-mi",
* ResourceGroupName = example.Name,
* VirtualNetworkName = exampleVirtualNetwork.Name,
* AddressPrefixes = new[]
* {
* "10.0.0.0/24",
* },
* Delegations = new[]
* {
* new Azure.Network.Inputs.SubnetDelegationArgs
* {
* Name = "managedinstancedelegation",
* ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs
* {
* Name = "Microsoft.Sql/managedInstances",
* Actions = new[]
* {
* "Microsoft.Network/virtualNetworks/subnets/join/action",
* "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
* "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action",
* },
* },
* },
* },
* });
* var exampleSubnetNetworkSecurityGroupAssociation = new Azure.Network.SubnetNetworkSecurityGroupAssociation("example", new()
* {
* SubnetId = exampleSubnet.Id,
* NetworkSecurityGroupId = exampleNetworkSecurityGroup.Id,
* });
* var exampleRouteTable = new Azure.Network.RouteTable("example", new()
* {
* Name = "routetable-mi",
* Location = example.Location,
* ResourceGroupName = example.Name,
* DisableBgpRoutePropagation = false,
* });
* var exampleSubnetRouteTableAssociation = new Azure.Network.SubnetRouteTableAssociation("example", new()
* {
* SubnetId = exampleSubnet.Id,
* RouteTableId = exampleRouteTable.Id,
* });
* var exampleManagedInstance = new Azure.MSSql.ManagedInstance("example", new()
* {
* Name = "managedsqlinstance",
* ResourceGroupName = example.Name,
* Location = example.Location,
* LicenseType = "BasePrice",
* SkuName = "GP_Gen5",
* StorageSizeInGb = 32,
* SubnetId = exampleSubnet.Id,
* Vcores = 4,
* AdministratorLogin = "mradministrator",
* AdministratorLoginPassword = "thisIsDog11",
* });
* var exampleManagedInstanceSecurityAlertPolicy = new Azure.MSSql.ManagedInstanceSecurityAlertPolicy("example", new()
* {
* ResourceGroupName = example.Name,
* ManagedInstanceName = exampleManagedInstance.Name,
* Enabled = true,
* StorageEndpoint = exampleAzurermStorageAccount.PrimaryBlobEndpoint,
* StorageAccountAccessKey = exampleAzurermStorageAccount.PrimaryAccessKey,
* DisabledAlerts = new[]
* {
* "Sql_Injection",
* "Data_Exfiltration",
* },
* RetentionDays = 20,
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/mssql"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/network"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
* Name: pulumi.String("database-rg"),
* Location: pulumi.String("West Europe"),
* })
* if err != nil {
* return err
* }
* exampleNetworkSecurityGroup, err := network.NewNetworkSecurityGroup(ctx, "example", &network.NetworkSecurityGroupArgs{
* Name: pulumi.String("mi-security-group"),
* Location: example.Location,
* ResourceGroupName: example.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "allow_management_inbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("allow_management_inbound"),
* Priority: pulumi.Int(106),
* Direction: pulumi.String("Inbound"),
* Access: pulumi.String("Allow"),
* Protocol: pulumi.String("Tcp"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRanges: pulumi.StringArray{
* pulumi.String("9000"),
* pulumi.String("9003"),
* pulumi.String("1438"),
* pulumi.String("1440"),
* pulumi.String("1452"),
* },
* SourceAddressPrefix: pulumi.String("*"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "allow_misubnet_inbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("allow_misubnet_inbound"),
* Priority: pulumi.Int(200),
* Direction: pulumi.String("Inbound"),
* Access: pulumi.String("Allow"),
* Protocol: pulumi.String("*"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRange: pulumi.String("*"),
* SourceAddressPrefix: pulumi.String("10.0.0.0/24"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "allow_health_probe_inbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("allow_health_probe_inbound"),
* Priority: pulumi.Int(300),
* Direction: pulumi.String("Inbound"),
* Access: pulumi.String("Allow"),
* Protocol: pulumi.String("*"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRange: pulumi.String("*"),
* SourceAddressPrefix: pulumi.String("AzureLoadBalancer"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "allow_tds_inbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("allow_tds_inbound"),
* Priority: pulumi.Int(1000),
* Direction: pulumi.String("Inbound"),
* Access: pulumi.String("Allow"),
* Protocol: pulumi.String("Tcp"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRange: pulumi.String("1433"),
* SourceAddressPrefix: pulumi.String("VirtualNetwork"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "deny_all_inbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("deny_all_inbound"),
* Priority: pulumi.Int(4096),
* Direction: pulumi.String("Inbound"),
* Access: pulumi.String("Deny"),
* Protocol: pulumi.String("*"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRange: pulumi.String("*"),
* SourceAddressPrefix: pulumi.String("*"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "allow_management_outbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("allow_management_outbound"),
* Priority: pulumi.Int(102),
* Direction: pulumi.String("Outbound"),
* Access: pulumi.String("Allow"),
* Protocol: pulumi.String("Tcp"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRanges: pulumi.StringArray{
* pulumi.String("80"),
* pulumi.String("443"),
* pulumi.String("12000"),
* },
* SourceAddressPrefix: pulumi.String("*"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "allow_misubnet_outbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("allow_misubnet_outbound"),
* Priority: pulumi.Int(200),
* Direction: pulumi.String("Outbound"),
* Access: pulumi.String("Allow"),
* Protocol: pulumi.String("*"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRange: pulumi.String("*"),
* SourceAddressPrefix: pulumi.String("10.0.0.0/24"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* _, err = network.NewNetworkSecurityRule(ctx, "deny_all_outbound", &network.NetworkSecurityRuleArgs{
* Name: pulumi.String("deny_all_outbound"),
* Priority: pulumi.Int(4096),
* Direction: pulumi.String("Outbound"),
* Access: pulumi.String("Deny"),
* Protocol: pulumi.String("*"),
* SourcePortRange: pulumi.String("*"),
* DestinationPortRange: pulumi.String("*"),
* SourceAddressPrefix: pulumi.String("*"),
* DestinationAddressPrefix: pulumi.String("*"),
* ResourceGroupName: example.Name,
* NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
* })
* if err != nil {
* return err
* }
* exampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, "example", &network.VirtualNetworkArgs{
* Name: pulumi.String("vnet-mi"),
* ResourceGroupName: example.Name,
* AddressSpaces: pulumi.StringArray{
* pulumi.String("10.0.0.0/16"),
* },
* Location: example.Location,
* })
* if err != nil {
* return err
* }
* exampleSubnet, err := network.NewSubnet(ctx, "example", &network.SubnetArgs{
* Name: pulumi.String("subnet-mi"),
* ResourceGroupName: example.Name,
* VirtualNetworkName: exampleVirtualNetwork.Name,
* AddressPrefixes: pulumi.StringArray{
* pulumi.String("10.0.0.0/24"),
* },
* Delegations: network.SubnetDelegationArray{
* &network.SubnetDelegationArgs{
* Name: pulumi.String("managedinstancedelegation"),
* ServiceDelegation: &network.SubnetDelegationServiceDelegationArgs{
* Name: pulumi.String("Microsoft.Sql/managedInstances"),
* Actions: pulumi.StringArray{
* pulumi.String("Microsoft.Network/virtualNetworks/subnets/join/action"),
* pulumi.String("Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action"),
* pulumi.String("Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action"),
* },
* },
* },
* },
* })
* if err != nil {
* return err
* }
* _, err = network.NewSubnetNetworkSecurityGroupAssociation(ctx, "example", &network.SubnetNetworkSecurityGroupAssociationArgs{
* SubnetId: exampleSubnet.ID(),
* NetworkSecurityGroupId: exampleNetworkSecurityGroup.ID(),
* })
* if err != nil {
* return err
* }
* exampleRouteTable, err := network.NewRouteTable(ctx, "example", &network.RouteTableArgs{
* Name: pulumi.String("routetable-mi"),
* Location: example.Location,
* ResourceGroupName: example.Name,
* DisableBgpRoutePropagation: pulumi.Bool(false),
* })
* if err != nil {
* return err
* }
* _, err = network.NewSubnetRouteTableAssociation(ctx, "example", &network.SubnetRouteTableAssociationArgs{
* SubnetId: exampleSubnet.ID(),
* RouteTableId: exampleRouteTable.ID(),
* })
* if err != nil {
* return err
* }
* exampleManagedInstance, err := mssql.NewManagedInstance(ctx, "example", &mssql.ManagedInstanceArgs{
* Name: pulumi.String("managedsqlinstance"),
* ResourceGroupName: example.Name,
* Location: example.Location,
* LicenseType: pulumi.String("BasePrice"),
* SkuName: pulumi.String("GP_Gen5"),
* StorageSizeInGb: pulumi.Int(32),
* SubnetId: exampleSubnet.ID(),
* Vcores: pulumi.Int(4),
* AdministratorLogin: pulumi.String("mradministrator"),
* AdministratorLoginPassword: pulumi.String("thisIsDog11"),
* })
* if err != nil {
* return err
* }
* _, err = mssql.NewManagedInstanceSecurityAlertPolicy(ctx, "example", &mssql.ManagedInstanceSecurityAlertPolicyArgs{
* ResourceGroupName: example.Name,
* ManagedInstanceName: exampleManagedInstance.Name,
* Enabled: pulumi.Bool(true),
* StorageEndpoint: pulumi.Any(exampleAzurermStorageAccount.PrimaryBlobEndpoint),
* StorageAccountAccessKey: pulumi.Any(exampleAzurermStorageAccount.PrimaryAccessKey),
* DisabledAlerts: pulumi.StringArray{
* pulumi.String("Sql_Injection"),
* pulumi.String("Data_Exfiltration"),
* },
* RetentionDays: pulumi.Int(20),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azure.core.ResourceGroup;
* import com.pulumi.azure.core.ResourceGroupArgs;
* import com.pulumi.azure.network.NetworkSecurityGroup;
* import com.pulumi.azure.network.NetworkSecurityGroupArgs;
* import com.pulumi.azure.network.NetworkSecurityRule;
* import com.pulumi.azure.network.NetworkSecurityRuleArgs;
* import com.pulumi.azure.network.VirtualNetwork;
* import com.pulumi.azure.network.VirtualNetworkArgs;
* import com.pulumi.azure.network.Subnet;
* import com.pulumi.azure.network.SubnetArgs;
* import com.pulumi.azure.network.inputs.SubnetDelegationArgs;
* import com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;
* import com.pulumi.azure.network.SubnetNetworkSecurityGroupAssociation;
* import com.pulumi.azure.network.SubnetNetworkSecurityGroupAssociationArgs;
* import com.pulumi.azure.network.RouteTable;
* import com.pulumi.azure.network.RouteTableArgs;
* import com.pulumi.azure.network.SubnetRouteTableAssociation;
* import com.pulumi.azure.network.SubnetRouteTableAssociationArgs;
* import com.pulumi.azure.mssql.ManagedInstance;
* import com.pulumi.azure.mssql.ManagedInstanceArgs;
* import com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicy;
* import com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var example = new ResourceGroup("example", ResourceGroupArgs.builder()
* .name("database-rg")
* .location("West Europe")
* .build());
* var exampleNetworkSecurityGroup = new NetworkSecurityGroup("exampleNetworkSecurityGroup", NetworkSecurityGroupArgs.builder()
* .name("mi-security-group")
* .location(example.location())
* .resourceGroupName(example.name())
* .build());
* var allowManagementInbound = new NetworkSecurityRule("allowManagementInbound", NetworkSecurityRuleArgs.builder()
* .name("allow_management_inbound")
* .priority(106)
* .direction("Inbound")
* .access("Allow")
* .protocol("Tcp")
* .sourcePortRange("*")
* .destinationPortRanges(
* "9000",
* "9003",
* "1438",
* "1440",
* "1452")
* .sourceAddressPrefix("*")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var allowMisubnetInbound = new NetworkSecurityRule("allowMisubnetInbound", NetworkSecurityRuleArgs.builder()
* .name("allow_misubnet_inbound")
* .priority(200)
* .direction("Inbound")
* .access("Allow")
* .protocol("*")
* .sourcePortRange("*")
* .destinationPortRange("*")
* .sourceAddressPrefix("10.0.0.0/24")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var allowHealthProbeInbound = new NetworkSecurityRule("allowHealthProbeInbound", NetworkSecurityRuleArgs.builder()
* .name("allow_health_probe_inbound")
* .priority(300)
* .direction("Inbound")
* .access("Allow")
* .protocol("*")
* .sourcePortRange("*")
* .destinationPortRange("*")
* .sourceAddressPrefix("AzureLoadBalancer")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var allowTdsInbound = new NetworkSecurityRule("allowTdsInbound", NetworkSecurityRuleArgs.builder()
* .name("allow_tds_inbound")
* .priority(1000)
* .direction("Inbound")
* .access("Allow")
* .protocol("Tcp")
* .sourcePortRange("*")
* .destinationPortRange("1433")
* .sourceAddressPrefix("VirtualNetwork")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var denyAllInbound = new NetworkSecurityRule("denyAllInbound", NetworkSecurityRuleArgs.builder()
* .name("deny_all_inbound")
* .priority(4096)
* .direction("Inbound")
* .access("Deny")
* .protocol("*")
* .sourcePortRange("*")
* .destinationPortRange("*")
* .sourceAddressPrefix("*")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var allowManagementOutbound = new NetworkSecurityRule("allowManagementOutbound", NetworkSecurityRuleArgs.builder()
* .name("allow_management_outbound")
* .priority(102)
* .direction("Outbound")
* .access("Allow")
* .protocol("Tcp")
* .sourcePortRange("*")
* .destinationPortRanges(
* "80",
* "443",
* "12000")
* .sourceAddressPrefix("*")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var allowMisubnetOutbound = new NetworkSecurityRule("allowMisubnetOutbound", NetworkSecurityRuleArgs.builder()
* .name("allow_misubnet_outbound")
* .priority(200)
* .direction("Outbound")
* .access("Allow")
* .protocol("*")
* .sourcePortRange("*")
* .destinationPortRange("*")
* .sourceAddressPrefix("10.0.0.0/24")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var denyAllOutbound = new NetworkSecurityRule("denyAllOutbound", NetworkSecurityRuleArgs.builder()
* .name("deny_all_outbound")
* .priority(4096)
* .direction("Outbound")
* .access("Deny")
* .protocol("*")
* .sourcePortRange("*")
* .destinationPortRange("*")
* .sourceAddressPrefix("*")
* .destinationAddressPrefix("*")
* .resourceGroupName(example.name())
* .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
* .build());
* var exampleVirtualNetwork = new VirtualNetwork("exampleVirtualNetwork", VirtualNetworkArgs.builder()
* .name("vnet-mi")
* .resourceGroupName(example.name())
* .addressSpaces("10.0.0.0/16")
* .location(example.location())
* .build());
* var exampleSubnet = new Subnet("exampleSubnet", SubnetArgs.builder()
* .name("subnet-mi")
* .resourceGroupName(example.name())
* .virtualNetworkName(exampleVirtualNetwork.name())
* .addressPrefixes("10.0.0.0/24")
* .delegations(SubnetDelegationArgs.builder()
* .name("managedinstancedelegation")
* .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()
* .name("Microsoft.Sql/managedInstances")
* .actions(
* "Microsoft.Network/virtualNetworks/subnets/join/action",
* "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
* "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action")
* .build())
* .build())
* .build());
* var exampleSubnetNetworkSecurityGroupAssociation = new SubnetNetworkSecurityGroupAssociation("exampleSubnetNetworkSecurityGroupAssociation", SubnetNetworkSecurityGroupAssociationArgs.builder()
* .subnetId(exampleSubnet.id())
* .networkSecurityGroupId(exampleNetworkSecurityGroup.id())
* .build());
* var exampleRouteTable = new RouteTable("exampleRouteTable", RouteTableArgs.builder()
* .name("routetable-mi")
* .location(example.location())
* .resourceGroupName(example.name())
* .disableBgpRoutePropagation(false)
* .build());
* var exampleSubnetRouteTableAssociation = new SubnetRouteTableAssociation("exampleSubnetRouteTableAssociation", SubnetRouteTableAssociationArgs.builder()
* .subnetId(exampleSubnet.id())
* .routeTableId(exampleRouteTable.id())
* .build());
* var exampleManagedInstance = new ManagedInstance("exampleManagedInstance", ManagedInstanceArgs.builder()
* .name("managedsqlinstance")
* .resourceGroupName(example.name())
* .location(example.location())
* .licenseType("BasePrice")
* .skuName("GP_Gen5")
* .storageSizeInGb(32)
* .subnetId(exampleSubnet.id())
* .vcores(4)
* .administratorLogin("mradministrator")
* .administratorLoginPassword("thisIsDog11")
* .build());
* var exampleManagedInstanceSecurityAlertPolicy = new ManagedInstanceSecurityAlertPolicy("exampleManagedInstanceSecurityAlertPolicy", ManagedInstanceSecurityAlertPolicyArgs.builder()
* .resourceGroupName(example.name())
* .managedInstanceName(exampleManagedInstance.name())
* .enabled(true)
* .storageEndpoint(exampleAzurermStorageAccount.primaryBlobEndpoint())
* .storageAccountAccessKey(exampleAzurermStorageAccount.primaryAccessKey())
* .disabledAlerts(
* "Sql_Injection",
* "Data_Exfiltration")
* .retentionDays(20)
* .build());
* }
* }
* ```
* ```yaml
* resources:
* example:
* type: azure:core:ResourceGroup
* properties:
* name: database-rg
* location: West Europe
* exampleNetworkSecurityGroup:
* type: azure:network:NetworkSecurityGroup
* name: example
* properties:
* name: mi-security-group
* location: ${example.location}
* resourceGroupName: ${example.name}
* allowManagementInbound:
* type: azure:network:NetworkSecurityRule
* name: allow_management_inbound
* properties:
* name: allow_management_inbound
* priority: 106
* direction: Inbound
* access: Allow
* protocol: Tcp
* sourcePortRange: '*'
* destinationPortRanges:
* - '9000'
* - '9003'
* - '1438'
* - '1440'
* - '1452'
* sourceAddressPrefix: '*'
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* allowMisubnetInbound:
* type: azure:network:NetworkSecurityRule
* name: allow_misubnet_inbound
* properties:
* name: allow_misubnet_inbound
* priority: 200
* direction: Inbound
* access: Allow
* protocol: '*'
* sourcePortRange: '*'
* destinationPortRange: '*'
* sourceAddressPrefix: 10.0.0.0/24
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* allowHealthProbeInbound:
* type: azure:network:NetworkSecurityRule
* name: allow_health_probe_inbound
* properties:
* name: allow_health_probe_inbound
* priority: 300
* direction: Inbound
* access: Allow
* protocol: '*'
* sourcePortRange: '*'
* destinationPortRange: '*'
* sourceAddressPrefix: AzureLoadBalancer
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* allowTdsInbound:
* type: azure:network:NetworkSecurityRule
* name: allow_tds_inbound
* properties:
* name: allow_tds_inbound
* priority: 1000
* direction: Inbound
* access: Allow
* protocol: Tcp
* sourcePortRange: '*'
* destinationPortRange: '1433'
* sourceAddressPrefix: VirtualNetwork
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* denyAllInbound:
* type: azure:network:NetworkSecurityRule
* name: deny_all_inbound
* properties:
* name: deny_all_inbound
* priority: 4096
* direction: Inbound
* access: Deny
* protocol: '*'
* sourcePortRange: '*'
* destinationPortRange: '*'
* sourceAddressPrefix: '*'
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* allowManagementOutbound:
* type: azure:network:NetworkSecurityRule
* name: allow_management_outbound
* properties:
* name: allow_management_outbound
* priority: 102
* direction: Outbound
* access: Allow
* protocol: Tcp
* sourcePortRange: '*'
* destinationPortRanges:
* - '80'
* - '443'
* - '12000'
* sourceAddressPrefix: '*'
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* allowMisubnetOutbound:
* type: azure:network:NetworkSecurityRule
* name: allow_misubnet_outbound
* properties:
* name: allow_misubnet_outbound
* priority: 200
* direction: Outbound
* access: Allow
* protocol: '*'
* sourcePortRange: '*'
* destinationPortRange: '*'
* sourceAddressPrefix: 10.0.0.0/24
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* denyAllOutbound:
* type: azure:network:NetworkSecurityRule
* name: deny_all_outbound
* properties:
* name: deny_all_outbound
* priority: 4096
* direction: Outbound
* access: Deny
* protocol: '*'
* sourcePortRange: '*'
* destinationPortRange: '*'
* sourceAddressPrefix: '*'
* destinationAddressPrefix: '*'
* resourceGroupName: ${example.name}
* networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
* exampleVirtualNetwork:
* type: azure:network:VirtualNetwork
* name: example
* properties:
* name: vnet-mi
* resourceGroupName: ${example.name}
* addressSpaces:
* - 10.0.0.0/16
* location: ${example.location}
* exampleSubnet:
* type: azure:network:Subnet
* name: example
* properties:
* name: subnet-mi
* resourceGroupName: ${example.name}
* virtualNetworkName: ${exampleVirtualNetwork.name}
* addressPrefixes:
* - 10.0.0.0/24
* delegations:
* - name: managedinstancedelegation
* serviceDelegation:
* name: Microsoft.Sql/managedInstances
* actions:
* - Microsoft.Network/virtualNetworks/subnets/join/action
* - Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action
* - Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action
* exampleSubnetNetworkSecurityGroupAssociation:
* type: azure:network:SubnetNetworkSecurityGroupAssociation
* name: example
* properties:
* subnetId: ${exampleSubnet.id}
* networkSecurityGroupId: ${exampleNetworkSecurityGroup.id}
* exampleRouteTable:
* type: azure:network:RouteTable
* name: example
* properties:
* name: routetable-mi
* location: ${example.location}
* resourceGroupName: ${example.name}
* disableBgpRoutePropagation: false
* exampleSubnetRouteTableAssociation:
* type: azure:network:SubnetRouteTableAssociation
* name: example
* properties:
* subnetId: ${exampleSubnet.id}
* routeTableId: ${exampleRouteTable.id}
* exampleManagedInstance:
* type: azure:mssql:ManagedInstance
* name: example
* properties:
* name: managedsqlinstance
* resourceGroupName: ${example.name}
* location: ${example.location}
* licenseType: BasePrice
* skuName: GP_Gen5
* storageSizeInGb: 32
* subnetId: ${exampleSubnet.id}
* vcores: 4
* administratorLogin: mradministrator
* administratorLoginPassword: thisIsDog11
* exampleManagedInstanceSecurityAlertPolicy:
* type: azure:mssql:ManagedInstanceSecurityAlertPolicy
* name: example
* properties:
* resourceGroupName: ${example.name}
* managedInstanceName: ${exampleManagedInstance.name}
* enabled: true
* storageEndpoint: ${exampleAzurermStorageAccount.primaryBlobEndpoint}
* storageAccountAccessKey: ${exampleAzurermStorageAccount.primaryAccessKey}
* disabledAlerts:
* - Sql_Injection
* - Data_Exfiltration
* retentionDays: 20
* ```
*
* ## Import
* MS SQL Managed Instance Security Alert Policy can be imported using the `resource id`, e.g.
* ```sh
* $ pulumi import azure:mssql/managedInstanceSecurityAlertPolicy:ManagedInstanceSecurityAlertPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acceptanceTestResourceGroup1/providers/Microsoft.Sql/managedInstances/instance1/securityAlertPolicies/Default
* ```
* @property disabledAlerts Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
* @property emailAccountAdminsEnabled Boolean flag which specifies if the alert is sent to the account administrators or not. Defaults to `false`.
* @property emailAddresses Specifies an array of email addresses to which the alert is sent.
* @property enabled Specifies the state of the Security Alert Policy, whether it is enabled or disabled. Possible values are `true`, `false`.
* @property managedInstanceName Specifies the name of the MS SQL Managed Instance. Changing this forces a new resource to be created.
* @property resourceGroupName The name of the resource group that contains the MS SQL Managed Instance. Changing this forces a new resource to be created.
* @property retentionDays Specifies the number of days to keep in the Threat Detection audit logs. Defaults to `0`.
* @property storageAccountAccessKey Specifies the identifier key of the Threat Detection audit storage account. This is mandatory when you use `storage_endpoint` to specify a storage account blob endpoint.
* > **NOTE:** Please note that storage accounts configured with `shared_access_key_enabled = false` cannot be used to configure `azure.mssql.ManagedInstanceSecurityAlertPolicy` with `storage_endpoint` for now.
* @property storageEndpoint Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.
*/
public data class ManagedInstanceSecurityAlertPolicyArgs(
public val disabledAlerts: Output>? = null,
public val emailAccountAdminsEnabled: Output? = null,
public val emailAddresses: Output>? = null,
public val enabled: Output? = null,
public val managedInstanceName: Output? = null,
public val resourceGroupName: Output? = null,
public val retentionDays: Output? = null,
public val storageAccountAccessKey: Output? = null,
public val storageEndpoint: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs =
com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs.builder()
.disabledAlerts(disabledAlerts?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.emailAccountAdminsEnabled(emailAccountAdminsEnabled?.applyValue({ args0 -> args0 }))
.emailAddresses(emailAddresses?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.enabled(enabled?.applyValue({ args0 -> args0 }))
.managedInstanceName(managedInstanceName?.applyValue({ args0 -> args0 }))
.resourceGroupName(resourceGroupName?.applyValue({ args0 -> args0 }))
.retentionDays(retentionDays?.applyValue({ args0 -> args0 }))
.storageAccountAccessKey(storageAccountAccessKey?.applyValue({ args0 -> args0 }))
.storageEndpoint(storageEndpoint?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [ManagedInstanceSecurityAlertPolicyArgs].
*/
@PulumiTagMarker
public class ManagedInstanceSecurityAlertPolicyArgsBuilder internal constructor() {
private var disabledAlerts: Output>? = null
private var emailAccountAdminsEnabled: Output? = null
private var emailAddresses: Output>? = null
private var enabled: Output? = null
private var managedInstanceName: Output? = null
private var resourceGroupName: Output? = null
private var retentionDays: Output? = null
private var storageAccountAccessKey: Output? = null
private var storageEndpoint: Output? = null
/**
* @param value Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
*/
@JvmName("lvoouksjxuqedcae")
public suspend fun disabledAlerts(`value`: Output>) {
this.disabledAlerts = value
}
@JvmName("ncnyencbeyadynll")
public suspend fun disabledAlerts(vararg values: Output) {
this.disabledAlerts = Output.all(values.asList())
}
/**
* @param values Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
*/
@JvmName("kithdxxsjigykpmi")
public suspend fun disabledAlerts(values: List
© 2015 - 2025 Weber Informatics LLC | Privacy Policy