All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azure.mssql.kotlin.ManagedInstanceSecurityAlertPolicyArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 6.14.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.azure.mssql.kotlin

import com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.Boolean
import kotlin.Int
import kotlin.String
import kotlin.Suppress
import kotlin.collections.List
import kotlin.jvm.JvmName

/**
 * Manages a Security Alert Policy for an MS SQL Managed Instance.
 * ## Example Usage
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as azure from "@pulumi/azure";
 * const example = new azure.core.ResourceGroup("example", {
 *     name: "database-rg",
 *     location: "West Europe",
 * });
 * const exampleNetworkSecurityGroup = new azure.network.NetworkSecurityGroup("example", {
 *     name: "mi-security-group",
 *     location: example.location,
 *     resourceGroupName: example.name,
 * });
 * const allowManagementInbound = new azure.network.NetworkSecurityRule("allow_management_inbound", {
 *     name: "allow_management_inbound",
 *     priority: 106,
 *     direction: "Inbound",
 *     access: "Allow",
 *     protocol: "Tcp",
 *     sourcePortRange: "*",
 *     destinationPortRanges: [
 *         "9000",
 *         "9003",
 *         "1438",
 *         "1440",
 *         "1452",
 *     ],
 *     sourceAddressPrefix: "*",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const allowMisubnetInbound = new azure.network.NetworkSecurityRule("allow_misubnet_inbound", {
 *     name: "allow_misubnet_inbound",
 *     priority: 200,
 *     direction: "Inbound",
 *     access: "Allow",
 *     protocol: "*",
 *     sourcePortRange: "*",
 *     destinationPortRange: "*",
 *     sourceAddressPrefix: "10.0.0.0/24",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const allowHealthProbeInbound = new azure.network.NetworkSecurityRule("allow_health_probe_inbound", {
 *     name: "allow_health_probe_inbound",
 *     priority: 300,
 *     direction: "Inbound",
 *     access: "Allow",
 *     protocol: "*",
 *     sourcePortRange: "*",
 *     destinationPortRange: "*",
 *     sourceAddressPrefix: "AzureLoadBalancer",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const allowTdsInbound = new azure.network.NetworkSecurityRule("allow_tds_inbound", {
 *     name: "allow_tds_inbound",
 *     priority: 1000,
 *     direction: "Inbound",
 *     access: "Allow",
 *     protocol: "Tcp",
 *     sourcePortRange: "*",
 *     destinationPortRange: "1433",
 *     sourceAddressPrefix: "VirtualNetwork",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const denyAllInbound = new azure.network.NetworkSecurityRule("deny_all_inbound", {
 *     name: "deny_all_inbound",
 *     priority: 4096,
 *     direction: "Inbound",
 *     access: "Deny",
 *     protocol: "*",
 *     sourcePortRange: "*",
 *     destinationPortRange: "*",
 *     sourceAddressPrefix: "*",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const allowManagementOutbound = new azure.network.NetworkSecurityRule("allow_management_outbound", {
 *     name: "allow_management_outbound",
 *     priority: 102,
 *     direction: "Outbound",
 *     access: "Allow",
 *     protocol: "Tcp",
 *     sourcePortRange: "*",
 *     destinationPortRanges: [
 *         "80",
 *         "443",
 *         "12000",
 *     ],
 *     sourceAddressPrefix: "*",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const allowMisubnetOutbound = new azure.network.NetworkSecurityRule("allow_misubnet_outbound", {
 *     name: "allow_misubnet_outbound",
 *     priority: 200,
 *     direction: "Outbound",
 *     access: "Allow",
 *     protocol: "*",
 *     sourcePortRange: "*",
 *     destinationPortRange: "*",
 *     sourceAddressPrefix: "10.0.0.0/24",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const denyAllOutbound = new azure.network.NetworkSecurityRule("deny_all_outbound", {
 *     name: "deny_all_outbound",
 *     priority: 4096,
 *     direction: "Outbound",
 *     access: "Deny",
 *     protocol: "*",
 *     sourcePortRange: "*",
 *     destinationPortRange: "*",
 *     sourceAddressPrefix: "*",
 *     destinationAddressPrefix: "*",
 *     resourceGroupName: example.name,
 *     networkSecurityGroupName: exampleNetworkSecurityGroup.name,
 * });
 * const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
 *     name: "vnet-mi",
 *     resourceGroupName: example.name,
 *     addressSpaces: ["10.0.0.0/16"],
 *     location: example.location,
 * });
 * const exampleSubnet = new azure.network.Subnet("example", {
 *     name: "subnet-mi",
 *     resourceGroupName: example.name,
 *     virtualNetworkName: exampleVirtualNetwork.name,
 *     addressPrefixes: ["10.0.0.0/24"],
 *     delegations: [{
 *         name: "managedinstancedelegation",
 *         serviceDelegation: {
 *             name: "Microsoft.Sql/managedInstances",
 *             actions: [
 *                 "Microsoft.Network/virtualNetworks/subnets/join/action",
 *                 "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
 *                 "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action",
 *             ],
 *         },
 *     }],
 * });
 * const exampleSubnetNetworkSecurityGroupAssociation = new azure.network.SubnetNetworkSecurityGroupAssociation("example", {
 *     subnetId: exampleSubnet.id,
 *     networkSecurityGroupId: exampleNetworkSecurityGroup.id,
 * });
 * const exampleRouteTable = new azure.network.RouteTable("example", {
 *     name: "routetable-mi",
 *     location: example.location,
 *     resourceGroupName: example.name,
 *     disableBgpRoutePropagation: false,
 * });
 * const exampleSubnetRouteTableAssociation = new azure.network.SubnetRouteTableAssociation("example", {
 *     subnetId: exampleSubnet.id,
 *     routeTableId: exampleRouteTable.id,
 * });
 * const exampleManagedInstance = new azure.mssql.ManagedInstance("example", {
 *     name: "managedsqlinstance",
 *     resourceGroupName: example.name,
 *     location: example.location,
 *     licenseType: "BasePrice",
 *     skuName: "GP_Gen5",
 *     storageSizeInGb: 32,
 *     subnetId: exampleSubnet.id,
 *     vcores: 4,
 *     administratorLogin: "mradministrator",
 *     administratorLoginPassword: "thisIsDog11",
 * });
 * const exampleManagedInstanceSecurityAlertPolicy = new azure.mssql.ManagedInstanceSecurityAlertPolicy("example", {
 *     resourceGroupName: example.name,
 *     managedInstanceName: exampleManagedInstance.name,
 *     enabled: true,
 *     storageEndpoint: exampleAzurermStorageAccount.primaryBlobEndpoint,
 *     storageAccountAccessKey: exampleAzurermStorageAccount.primaryAccessKey,
 *     disabledAlerts: [
 *         "Sql_Injection",
 *         "Data_Exfiltration",
 *     ],
 *     retentionDays: 20,
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_azure as azure
 * example = azure.core.ResourceGroup("example",
 *     name="database-rg",
 *     location="West Europe")
 * example_network_security_group = azure.network.NetworkSecurityGroup("example",
 *     name="mi-security-group",
 *     location=example.location,
 *     resource_group_name=example.name)
 * allow_management_inbound = azure.network.NetworkSecurityRule("allow_management_inbound",
 *     name="allow_management_inbound",
 *     priority=106,
 *     direction="Inbound",
 *     access="Allow",
 *     protocol="Tcp",
 *     source_port_range="*",
 *     destination_port_ranges=[
 *         "9000",
 *         "9003",
 *         "1438",
 *         "1440",
 *         "1452",
 *     ],
 *     source_address_prefix="*",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * allow_misubnet_inbound = azure.network.NetworkSecurityRule("allow_misubnet_inbound",
 *     name="allow_misubnet_inbound",
 *     priority=200,
 *     direction="Inbound",
 *     access="Allow",
 *     protocol="*",
 *     source_port_range="*",
 *     destination_port_range="*",
 *     source_address_prefix="10.0.0.0/24",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * allow_health_probe_inbound = azure.network.NetworkSecurityRule("allow_health_probe_inbound",
 *     name="allow_health_probe_inbound",
 *     priority=300,
 *     direction="Inbound",
 *     access="Allow",
 *     protocol="*",
 *     source_port_range="*",
 *     destination_port_range="*",
 *     source_address_prefix="AzureLoadBalancer",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * allow_tds_inbound = azure.network.NetworkSecurityRule("allow_tds_inbound",
 *     name="allow_tds_inbound",
 *     priority=1000,
 *     direction="Inbound",
 *     access="Allow",
 *     protocol="Tcp",
 *     source_port_range="*",
 *     destination_port_range="1433",
 *     source_address_prefix="VirtualNetwork",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * deny_all_inbound = azure.network.NetworkSecurityRule("deny_all_inbound",
 *     name="deny_all_inbound",
 *     priority=4096,
 *     direction="Inbound",
 *     access="Deny",
 *     protocol="*",
 *     source_port_range="*",
 *     destination_port_range="*",
 *     source_address_prefix="*",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * allow_management_outbound = azure.network.NetworkSecurityRule("allow_management_outbound",
 *     name="allow_management_outbound",
 *     priority=102,
 *     direction="Outbound",
 *     access="Allow",
 *     protocol="Tcp",
 *     source_port_range="*",
 *     destination_port_ranges=[
 *         "80",
 *         "443",
 *         "12000",
 *     ],
 *     source_address_prefix="*",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * allow_misubnet_outbound = azure.network.NetworkSecurityRule("allow_misubnet_outbound",
 *     name="allow_misubnet_outbound",
 *     priority=200,
 *     direction="Outbound",
 *     access="Allow",
 *     protocol="*",
 *     source_port_range="*",
 *     destination_port_range="*",
 *     source_address_prefix="10.0.0.0/24",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * deny_all_outbound = azure.network.NetworkSecurityRule("deny_all_outbound",
 *     name="deny_all_outbound",
 *     priority=4096,
 *     direction="Outbound",
 *     access="Deny",
 *     protocol="*",
 *     source_port_range="*",
 *     destination_port_range="*",
 *     source_address_prefix="*",
 *     destination_address_prefix="*",
 *     resource_group_name=example.name,
 *     network_security_group_name=example_network_security_group.name)
 * example_virtual_network = azure.network.VirtualNetwork("example",
 *     name="vnet-mi",
 *     resource_group_name=example.name,
 *     address_spaces=["10.0.0.0/16"],
 *     location=example.location)
 * example_subnet = azure.network.Subnet("example",
 *     name="subnet-mi",
 *     resource_group_name=example.name,
 *     virtual_network_name=example_virtual_network.name,
 *     address_prefixes=["10.0.0.0/24"],
 *     delegations=[azure.network.SubnetDelegationArgs(
 *         name="managedinstancedelegation",
 *         service_delegation=azure.network.SubnetDelegationServiceDelegationArgs(
 *             name="Microsoft.Sql/managedInstances",
 *             actions=[
 *                 "Microsoft.Network/virtualNetworks/subnets/join/action",
 *                 "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
 *                 "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action",
 *             ],
 *         ),
 *     )])
 * example_subnet_network_security_group_association = azure.network.SubnetNetworkSecurityGroupAssociation("example",
 *     subnet_id=example_subnet.id,
 *     network_security_group_id=example_network_security_group.id)
 * example_route_table = azure.network.RouteTable("example",
 *     name="routetable-mi",
 *     location=example.location,
 *     resource_group_name=example.name,
 *     disable_bgp_route_propagation=False)
 * example_subnet_route_table_association = azure.network.SubnetRouteTableAssociation("example",
 *     subnet_id=example_subnet.id,
 *     route_table_id=example_route_table.id)
 * example_managed_instance = azure.mssql.ManagedInstance("example",
 *     name="managedsqlinstance",
 *     resource_group_name=example.name,
 *     location=example.location,
 *     license_type="BasePrice",
 *     sku_name="GP_Gen5",
 *     storage_size_in_gb=32,
 *     subnet_id=example_subnet.id,
 *     vcores=4,
 *     administrator_login="mradministrator",
 *     administrator_login_password="thisIsDog11")
 * example_managed_instance_security_alert_policy = azure.mssql.ManagedInstanceSecurityAlertPolicy("example",
 *     resource_group_name=example.name,
 *     managed_instance_name=example_managed_instance.name,
 *     enabled=True,
 *     storage_endpoint=example_azurerm_storage_account["primaryBlobEndpoint"],
 *     storage_account_access_key=example_azurerm_storage_account["primaryAccessKey"],
 *     disabled_alerts=[
 *         "Sql_Injection",
 *         "Data_Exfiltration",
 *     ],
 *     retention_days=20)
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Azure = Pulumi.Azure;
 * return await Deployment.RunAsync(() =>
 * {
 *     var example = new Azure.Core.ResourceGroup("example", new()
 *     {
 *         Name = "database-rg",
 *         Location = "West Europe",
 *     });
 *     var exampleNetworkSecurityGroup = new Azure.Network.NetworkSecurityGroup("example", new()
 *     {
 *         Name = "mi-security-group",
 *         Location = example.Location,
 *         ResourceGroupName = example.Name,
 *     });
 *     var allowManagementInbound = new Azure.Network.NetworkSecurityRule("allow_management_inbound", new()
 *     {
 *         Name = "allow_management_inbound",
 *         Priority = 106,
 *         Direction = "Inbound",
 *         Access = "Allow",
 *         Protocol = "Tcp",
 *         SourcePortRange = "*",
 *         DestinationPortRanges = new[]
 *         {
 *             "9000",
 *             "9003",
 *             "1438",
 *             "1440",
 *             "1452",
 *         },
 *         SourceAddressPrefix = "*",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var allowMisubnetInbound = new Azure.Network.NetworkSecurityRule("allow_misubnet_inbound", new()
 *     {
 *         Name = "allow_misubnet_inbound",
 *         Priority = 200,
 *         Direction = "Inbound",
 *         Access = "Allow",
 *         Protocol = "*",
 *         SourcePortRange = "*",
 *         DestinationPortRange = "*",
 *         SourceAddressPrefix = "10.0.0.0/24",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var allowHealthProbeInbound = new Azure.Network.NetworkSecurityRule("allow_health_probe_inbound", new()
 *     {
 *         Name = "allow_health_probe_inbound",
 *         Priority = 300,
 *         Direction = "Inbound",
 *         Access = "Allow",
 *         Protocol = "*",
 *         SourcePortRange = "*",
 *         DestinationPortRange = "*",
 *         SourceAddressPrefix = "AzureLoadBalancer",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var allowTdsInbound = new Azure.Network.NetworkSecurityRule("allow_tds_inbound", new()
 *     {
 *         Name = "allow_tds_inbound",
 *         Priority = 1000,
 *         Direction = "Inbound",
 *         Access = "Allow",
 *         Protocol = "Tcp",
 *         SourcePortRange = "*",
 *         DestinationPortRange = "1433",
 *         SourceAddressPrefix = "VirtualNetwork",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var denyAllInbound = new Azure.Network.NetworkSecurityRule("deny_all_inbound", new()
 *     {
 *         Name = "deny_all_inbound",
 *         Priority = 4096,
 *         Direction = "Inbound",
 *         Access = "Deny",
 *         Protocol = "*",
 *         SourcePortRange = "*",
 *         DestinationPortRange = "*",
 *         SourceAddressPrefix = "*",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var allowManagementOutbound = new Azure.Network.NetworkSecurityRule("allow_management_outbound", new()
 *     {
 *         Name = "allow_management_outbound",
 *         Priority = 102,
 *         Direction = "Outbound",
 *         Access = "Allow",
 *         Protocol = "Tcp",
 *         SourcePortRange = "*",
 *         DestinationPortRanges = new[]
 *         {
 *             "80",
 *             "443",
 *             "12000",
 *         },
 *         SourceAddressPrefix = "*",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var allowMisubnetOutbound = new Azure.Network.NetworkSecurityRule("allow_misubnet_outbound", new()
 *     {
 *         Name = "allow_misubnet_outbound",
 *         Priority = 200,
 *         Direction = "Outbound",
 *         Access = "Allow",
 *         Protocol = "*",
 *         SourcePortRange = "*",
 *         DestinationPortRange = "*",
 *         SourceAddressPrefix = "10.0.0.0/24",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var denyAllOutbound = new Azure.Network.NetworkSecurityRule("deny_all_outbound", new()
 *     {
 *         Name = "deny_all_outbound",
 *         Priority = 4096,
 *         Direction = "Outbound",
 *         Access = "Deny",
 *         Protocol = "*",
 *         SourcePortRange = "*",
 *         DestinationPortRange = "*",
 *         SourceAddressPrefix = "*",
 *         DestinationAddressPrefix = "*",
 *         ResourceGroupName = example.Name,
 *         NetworkSecurityGroupName = exampleNetworkSecurityGroup.Name,
 *     });
 *     var exampleVirtualNetwork = new Azure.Network.VirtualNetwork("example", new()
 *     {
 *         Name = "vnet-mi",
 *         ResourceGroupName = example.Name,
 *         AddressSpaces = new[]
 *         {
 *             "10.0.0.0/16",
 *         },
 *         Location = example.Location,
 *     });
 *     var exampleSubnet = new Azure.Network.Subnet("example", new()
 *     {
 *         Name = "subnet-mi",
 *         ResourceGroupName = example.Name,
 *         VirtualNetworkName = exampleVirtualNetwork.Name,
 *         AddressPrefixes = new[]
 *         {
 *             "10.0.0.0/24",
 *         },
 *         Delegations = new[]
 *         {
 *             new Azure.Network.Inputs.SubnetDelegationArgs
 *             {
 *                 Name = "managedinstancedelegation",
 *                 ServiceDelegation = new Azure.Network.Inputs.SubnetDelegationServiceDelegationArgs
 *                 {
 *                     Name = "Microsoft.Sql/managedInstances",
 *                     Actions = new[]
 *                     {
 *                         "Microsoft.Network/virtualNetworks/subnets/join/action",
 *                         "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
 *                         "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action",
 *                     },
 *                 },
 *             },
 *         },
 *     });
 *     var exampleSubnetNetworkSecurityGroupAssociation = new Azure.Network.SubnetNetworkSecurityGroupAssociation("example", new()
 *     {
 *         SubnetId = exampleSubnet.Id,
 *         NetworkSecurityGroupId = exampleNetworkSecurityGroup.Id,
 *     });
 *     var exampleRouteTable = new Azure.Network.RouteTable("example", new()
 *     {
 *         Name = "routetable-mi",
 *         Location = example.Location,
 *         ResourceGroupName = example.Name,
 *         DisableBgpRoutePropagation = false,
 *     });
 *     var exampleSubnetRouteTableAssociation = new Azure.Network.SubnetRouteTableAssociation("example", new()
 *     {
 *         SubnetId = exampleSubnet.Id,
 *         RouteTableId = exampleRouteTable.Id,
 *     });
 *     var exampleManagedInstance = new Azure.MSSql.ManagedInstance("example", new()
 *     {
 *         Name = "managedsqlinstance",
 *         ResourceGroupName = example.Name,
 *         Location = example.Location,
 *         LicenseType = "BasePrice",
 *         SkuName = "GP_Gen5",
 *         StorageSizeInGb = 32,
 *         SubnetId = exampleSubnet.Id,
 *         Vcores = 4,
 *         AdministratorLogin = "mradministrator",
 *         AdministratorLoginPassword = "thisIsDog11",
 *     });
 *     var exampleManagedInstanceSecurityAlertPolicy = new Azure.MSSql.ManagedInstanceSecurityAlertPolicy("example", new()
 *     {
 *         ResourceGroupName = example.Name,
 *         ManagedInstanceName = exampleManagedInstance.Name,
 *         Enabled = true,
 *         StorageEndpoint = exampleAzurermStorageAccount.PrimaryBlobEndpoint,
 *         StorageAccountAccessKey = exampleAzurermStorageAccount.PrimaryAccessKey,
 *         DisabledAlerts = new[]
 *         {
 *             "Sql_Injection",
 *             "Data_Exfiltration",
 *         },
 *         RetentionDays = 20,
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
 * 	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/mssql"
 * 	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/network"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
 * 			Name:     pulumi.String("database-rg"),
 * 			Location: pulumi.String("West Europe"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleNetworkSecurityGroup, err := network.NewNetworkSecurityGroup(ctx, "example", &network.NetworkSecurityGroupArgs{
 * 			Name:              pulumi.String("mi-security-group"),
 * 			Location:          example.Location,
 * 			ResourceGroupName: example.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "allow_management_inbound", &network.NetworkSecurityRuleArgs{
 * 			Name:            pulumi.String("allow_management_inbound"),
 * 			Priority:        pulumi.Int(106),
 * 			Direction:       pulumi.String("Inbound"),
 * 			Access:          pulumi.String("Allow"),
 * 			Protocol:        pulumi.String("Tcp"),
 * 			SourcePortRange: pulumi.String("*"),
 * 			DestinationPortRanges: pulumi.StringArray{
 * 				pulumi.String("9000"),
 * 				pulumi.String("9003"),
 * 				pulumi.String("1438"),
 * 				pulumi.String("1440"),
 * 				pulumi.String("1452"),
 * 			},
 * 			SourceAddressPrefix:      pulumi.String("*"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "allow_misubnet_inbound", &network.NetworkSecurityRuleArgs{
 * 			Name:                     pulumi.String("allow_misubnet_inbound"),
 * 			Priority:                 pulumi.Int(200),
 * 			Direction:                pulumi.String("Inbound"),
 * 			Access:                   pulumi.String("Allow"),
 * 			Protocol:                 pulumi.String("*"),
 * 			SourcePortRange:          pulumi.String("*"),
 * 			DestinationPortRange:     pulumi.String("*"),
 * 			SourceAddressPrefix:      pulumi.String("10.0.0.0/24"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "allow_health_probe_inbound", &network.NetworkSecurityRuleArgs{
 * 			Name:                     pulumi.String("allow_health_probe_inbound"),
 * 			Priority:                 pulumi.Int(300),
 * 			Direction:                pulumi.String("Inbound"),
 * 			Access:                   pulumi.String("Allow"),
 * 			Protocol:                 pulumi.String("*"),
 * 			SourcePortRange:          pulumi.String("*"),
 * 			DestinationPortRange:     pulumi.String("*"),
 * 			SourceAddressPrefix:      pulumi.String("AzureLoadBalancer"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "allow_tds_inbound", &network.NetworkSecurityRuleArgs{
 * 			Name:                     pulumi.String("allow_tds_inbound"),
 * 			Priority:                 pulumi.Int(1000),
 * 			Direction:                pulumi.String("Inbound"),
 * 			Access:                   pulumi.String("Allow"),
 * 			Protocol:                 pulumi.String("Tcp"),
 * 			SourcePortRange:          pulumi.String("*"),
 * 			DestinationPortRange:     pulumi.String("1433"),
 * 			SourceAddressPrefix:      pulumi.String("VirtualNetwork"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "deny_all_inbound", &network.NetworkSecurityRuleArgs{
 * 			Name:                     pulumi.String("deny_all_inbound"),
 * 			Priority:                 pulumi.Int(4096),
 * 			Direction:                pulumi.String("Inbound"),
 * 			Access:                   pulumi.String("Deny"),
 * 			Protocol:                 pulumi.String("*"),
 * 			SourcePortRange:          pulumi.String("*"),
 * 			DestinationPortRange:     pulumi.String("*"),
 * 			SourceAddressPrefix:      pulumi.String("*"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "allow_management_outbound", &network.NetworkSecurityRuleArgs{
 * 			Name:            pulumi.String("allow_management_outbound"),
 * 			Priority:        pulumi.Int(102),
 * 			Direction:       pulumi.String("Outbound"),
 * 			Access:          pulumi.String("Allow"),
 * 			Protocol:        pulumi.String("Tcp"),
 * 			SourcePortRange: pulumi.String("*"),
 * 			DestinationPortRanges: pulumi.StringArray{
 * 				pulumi.String("80"),
 * 				pulumi.String("443"),
 * 				pulumi.String("12000"),
 * 			},
 * 			SourceAddressPrefix:      pulumi.String("*"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "allow_misubnet_outbound", &network.NetworkSecurityRuleArgs{
 * 			Name:                     pulumi.String("allow_misubnet_outbound"),
 * 			Priority:                 pulumi.Int(200),
 * 			Direction:                pulumi.String("Outbound"),
 * 			Access:                   pulumi.String("Allow"),
 * 			Protocol:                 pulumi.String("*"),
 * 			SourcePortRange:          pulumi.String("*"),
 * 			DestinationPortRange:     pulumi.String("*"),
 * 			SourceAddressPrefix:      pulumi.String("10.0.0.0/24"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewNetworkSecurityRule(ctx, "deny_all_outbound", &network.NetworkSecurityRuleArgs{
 * 			Name:                     pulumi.String("deny_all_outbound"),
 * 			Priority:                 pulumi.Int(4096),
 * 			Direction:                pulumi.String("Outbound"),
 * 			Access:                   pulumi.String("Deny"),
 * 			Protocol:                 pulumi.String("*"),
 * 			SourcePortRange:          pulumi.String("*"),
 * 			DestinationPortRange:     pulumi.String("*"),
 * 			SourceAddressPrefix:      pulumi.String("*"),
 * 			DestinationAddressPrefix: pulumi.String("*"),
 * 			ResourceGroupName:        example.Name,
 * 			NetworkSecurityGroupName: exampleNetworkSecurityGroup.Name,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleVirtualNetwork, err := network.NewVirtualNetwork(ctx, "example", &network.VirtualNetworkArgs{
 * 			Name:              pulumi.String("vnet-mi"),
 * 			ResourceGroupName: example.Name,
 * 			AddressSpaces: pulumi.StringArray{
 * 				pulumi.String("10.0.0.0/16"),
 * 			},
 * 			Location: example.Location,
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleSubnet, err := network.NewSubnet(ctx, "example", &network.SubnetArgs{
 * 			Name:               pulumi.String("subnet-mi"),
 * 			ResourceGroupName:  example.Name,
 * 			VirtualNetworkName: exampleVirtualNetwork.Name,
 * 			AddressPrefixes: pulumi.StringArray{
 * 				pulumi.String("10.0.0.0/24"),
 * 			},
 * 			Delegations: network.SubnetDelegationArray{
 * 				&network.SubnetDelegationArgs{
 * 					Name: pulumi.String("managedinstancedelegation"),
 * 					ServiceDelegation: &network.SubnetDelegationServiceDelegationArgs{
 * 						Name: pulumi.String("Microsoft.Sql/managedInstances"),
 * 						Actions: pulumi.StringArray{
 * 							pulumi.String("Microsoft.Network/virtualNetworks/subnets/join/action"),
 * 							pulumi.String("Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action"),
 * 							pulumi.String("Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action"),
 * 						},
 * 					},
 * 				},
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewSubnetNetworkSecurityGroupAssociation(ctx, "example", &network.SubnetNetworkSecurityGroupAssociationArgs{
 * 			SubnetId:               exampleSubnet.ID(),
 * 			NetworkSecurityGroupId: exampleNetworkSecurityGroup.ID(),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleRouteTable, err := network.NewRouteTable(ctx, "example", &network.RouteTableArgs{
 * 			Name:                       pulumi.String("routetable-mi"),
 * 			Location:                   example.Location,
 * 			ResourceGroupName:          example.Name,
 * 			DisableBgpRoutePropagation: pulumi.Bool(false),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = network.NewSubnetRouteTableAssociation(ctx, "example", &network.SubnetRouteTableAssociationArgs{
 * 			SubnetId:     exampleSubnet.ID(),
 * 			RouteTableId: exampleRouteTable.ID(),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		exampleManagedInstance, err := mssql.NewManagedInstance(ctx, "example", &mssql.ManagedInstanceArgs{
 * 			Name:                       pulumi.String("managedsqlinstance"),
 * 			ResourceGroupName:          example.Name,
 * 			Location:                   example.Location,
 * 			LicenseType:                pulumi.String("BasePrice"),
 * 			SkuName:                    pulumi.String("GP_Gen5"),
 * 			StorageSizeInGb:            pulumi.Int(32),
 * 			SubnetId:                   exampleSubnet.ID(),
 * 			Vcores:                     pulumi.Int(4),
 * 			AdministratorLogin:         pulumi.String("mradministrator"),
 * 			AdministratorLoginPassword: pulumi.String("thisIsDog11"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = mssql.NewManagedInstanceSecurityAlertPolicy(ctx, "example", &mssql.ManagedInstanceSecurityAlertPolicyArgs{
 * 			ResourceGroupName:       example.Name,
 * 			ManagedInstanceName:     exampleManagedInstance.Name,
 * 			Enabled:                 pulumi.Bool(true),
 * 			StorageEndpoint:         pulumi.Any(exampleAzurermStorageAccount.PrimaryBlobEndpoint),
 * 			StorageAccountAccessKey: pulumi.Any(exampleAzurermStorageAccount.PrimaryAccessKey),
 * 			DisabledAlerts: pulumi.StringArray{
 * 				pulumi.String("Sql_Injection"),
 * 				pulumi.String("Data_Exfiltration"),
 * 			},
 * 			RetentionDays: pulumi.Int(20),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.azure.core.ResourceGroup;
 * import com.pulumi.azure.core.ResourceGroupArgs;
 * import com.pulumi.azure.network.NetworkSecurityGroup;
 * import com.pulumi.azure.network.NetworkSecurityGroupArgs;
 * import com.pulumi.azure.network.NetworkSecurityRule;
 * import com.pulumi.azure.network.NetworkSecurityRuleArgs;
 * import com.pulumi.azure.network.VirtualNetwork;
 * import com.pulumi.azure.network.VirtualNetworkArgs;
 * import com.pulumi.azure.network.Subnet;
 * import com.pulumi.azure.network.SubnetArgs;
 * import com.pulumi.azure.network.inputs.SubnetDelegationArgs;
 * import com.pulumi.azure.network.inputs.SubnetDelegationServiceDelegationArgs;
 * import com.pulumi.azure.network.SubnetNetworkSecurityGroupAssociation;
 * import com.pulumi.azure.network.SubnetNetworkSecurityGroupAssociationArgs;
 * import com.pulumi.azure.network.RouteTable;
 * import com.pulumi.azure.network.RouteTableArgs;
 * import com.pulumi.azure.network.SubnetRouteTableAssociation;
 * import com.pulumi.azure.network.SubnetRouteTableAssociationArgs;
 * import com.pulumi.azure.mssql.ManagedInstance;
 * import com.pulumi.azure.mssql.ManagedInstanceArgs;
 * import com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicy;
 * import com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var example = new ResourceGroup("example", ResourceGroupArgs.builder()
 *             .name("database-rg")
 *             .location("West Europe")
 *             .build());
 *         var exampleNetworkSecurityGroup = new NetworkSecurityGroup("exampleNetworkSecurityGroup", NetworkSecurityGroupArgs.builder()
 *             .name("mi-security-group")
 *             .location(example.location())
 *             .resourceGroupName(example.name())
 *             .build());
 *         var allowManagementInbound = new NetworkSecurityRule("allowManagementInbound", NetworkSecurityRuleArgs.builder()
 *             .name("allow_management_inbound")
 *             .priority(106)
 *             .direction("Inbound")
 *             .access("Allow")
 *             .protocol("Tcp")
 *             .sourcePortRange("*")
 *             .destinationPortRanges(
 *                 "9000",
 *                 "9003",
 *                 "1438",
 *                 "1440",
 *                 "1452")
 *             .sourceAddressPrefix("*")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var allowMisubnetInbound = new NetworkSecurityRule("allowMisubnetInbound", NetworkSecurityRuleArgs.builder()
 *             .name("allow_misubnet_inbound")
 *             .priority(200)
 *             .direction("Inbound")
 *             .access("Allow")
 *             .protocol("*")
 *             .sourcePortRange("*")
 *             .destinationPortRange("*")
 *             .sourceAddressPrefix("10.0.0.0/24")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var allowHealthProbeInbound = new NetworkSecurityRule("allowHealthProbeInbound", NetworkSecurityRuleArgs.builder()
 *             .name("allow_health_probe_inbound")
 *             .priority(300)
 *             .direction("Inbound")
 *             .access("Allow")
 *             .protocol("*")
 *             .sourcePortRange("*")
 *             .destinationPortRange("*")
 *             .sourceAddressPrefix("AzureLoadBalancer")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var allowTdsInbound = new NetworkSecurityRule("allowTdsInbound", NetworkSecurityRuleArgs.builder()
 *             .name("allow_tds_inbound")
 *             .priority(1000)
 *             .direction("Inbound")
 *             .access("Allow")
 *             .protocol("Tcp")
 *             .sourcePortRange("*")
 *             .destinationPortRange("1433")
 *             .sourceAddressPrefix("VirtualNetwork")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var denyAllInbound = new NetworkSecurityRule("denyAllInbound", NetworkSecurityRuleArgs.builder()
 *             .name("deny_all_inbound")
 *             .priority(4096)
 *             .direction("Inbound")
 *             .access("Deny")
 *             .protocol("*")
 *             .sourcePortRange("*")
 *             .destinationPortRange("*")
 *             .sourceAddressPrefix("*")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var allowManagementOutbound = new NetworkSecurityRule("allowManagementOutbound", NetworkSecurityRuleArgs.builder()
 *             .name("allow_management_outbound")
 *             .priority(102)
 *             .direction("Outbound")
 *             .access("Allow")
 *             .protocol("Tcp")
 *             .sourcePortRange("*")
 *             .destinationPortRanges(
 *                 "80",
 *                 "443",
 *                 "12000")
 *             .sourceAddressPrefix("*")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var allowMisubnetOutbound = new NetworkSecurityRule("allowMisubnetOutbound", NetworkSecurityRuleArgs.builder()
 *             .name("allow_misubnet_outbound")
 *             .priority(200)
 *             .direction("Outbound")
 *             .access("Allow")
 *             .protocol("*")
 *             .sourcePortRange("*")
 *             .destinationPortRange("*")
 *             .sourceAddressPrefix("10.0.0.0/24")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var denyAllOutbound = new NetworkSecurityRule("denyAllOutbound", NetworkSecurityRuleArgs.builder()
 *             .name("deny_all_outbound")
 *             .priority(4096)
 *             .direction("Outbound")
 *             .access("Deny")
 *             .protocol("*")
 *             .sourcePortRange("*")
 *             .destinationPortRange("*")
 *             .sourceAddressPrefix("*")
 *             .destinationAddressPrefix("*")
 *             .resourceGroupName(example.name())
 *             .networkSecurityGroupName(exampleNetworkSecurityGroup.name())
 *             .build());
 *         var exampleVirtualNetwork = new VirtualNetwork("exampleVirtualNetwork", VirtualNetworkArgs.builder()
 *             .name("vnet-mi")
 *             .resourceGroupName(example.name())
 *             .addressSpaces("10.0.0.0/16")
 *             .location(example.location())
 *             .build());
 *         var exampleSubnet = new Subnet("exampleSubnet", SubnetArgs.builder()
 *             .name("subnet-mi")
 *             .resourceGroupName(example.name())
 *             .virtualNetworkName(exampleVirtualNetwork.name())
 *             .addressPrefixes("10.0.0.0/24")
 *             .delegations(SubnetDelegationArgs.builder()
 *                 .name("managedinstancedelegation")
 *                 .serviceDelegation(SubnetDelegationServiceDelegationArgs.builder()
 *                     .name("Microsoft.Sql/managedInstances")
 *                     .actions(
 *                         "Microsoft.Network/virtualNetworks/subnets/join/action",
 *                         "Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action",
 *                         "Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action")
 *                     .build())
 *                 .build())
 *             .build());
 *         var exampleSubnetNetworkSecurityGroupAssociation = new SubnetNetworkSecurityGroupAssociation("exampleSubnetNetworkSecurityGroupAssociation", SubnetNetworkSecurityGroupAssociationArgs.builder()
 *             .subnetId(exampleSubnet.id())
 *             .networkSecurityGroupId(exampleNetworkSecurityGroup.id())
 *             .build());
 *         var exampleRouteTable = new RouteTable("exampleRouteTable", RouteTableArgs.builder()
 *             .name("routetable-mi")
 *             .location(example.location())
 *             .resourceGroupName(example.name())
 *             .disableBgpRoutePropagation(false)
 *             .build());
 *         var exampleSubnetRouteTableAssociation = new SubnetRouteTableAssociation("exampleSubnetRouteTableAssociation", SubnetRouteTableAssociationArgs.builder()
 *             .subnetId(exampleSubnet.id())
 *             .routeTableId(exampleRouteTable.id())
 *             .build());
 *         var exampleManagedInstance = new ManagedInstance("exampleManagedInstance", ManagedInstanceArgs.builder()
 *             .name("managedsqlinstance")
 *             .resourceGroupName(example.name())
 *             .location(example.location())
 *             .licenseType("BasePrice")
 *             .skuName("GP_Gen5")
 *             .storageSizeInGb(32)
 *             .subnetId(exampleSubnet.id())
 *             .vcores(4)
 *             .administratorLogin("mradministrator")
 *             .administratorLoginPassword("thisIsDog11")
 *             .build());
 *         var exampleManagedInstanceSecurityAlertPolicy = new ManagedInstanceSecurityAlertPolicy("exampleManagedInstanceSecurityAlertPolicy", ManagedInstanceSecurityAlertPolicyArgs.builder()
 *             .resourceGroupName(example.name())
 *             .managedInstanceName(exampleManagedInstance.name())
 *             .enabled(true)
 *             .storageEndpoint(exampleAzurermStorageAccount.primaryBlobEndpoint())
 *             .storageAccountAccessKey(exampleAzurermStorageAccount.primaryAccessKey())
 *             .disabledAlerts(
 *                 "Sql_Injection",
 *                 "Data_Exfiltration")
 *             .retentionDays(20)
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   example:
 *     type: azure:core:ResourceGroup
 *     properties:
 *       name: database-rg
 *       location: West Europe
 *   exampleNetworkSecurityGroup:
 *     type: azure:network:NetworkSecurityGroup
 *     name: example
 *     properties:
 *       name: mi-security-group
 *       location: ${example.location}
 *       resourceGroupName: ${example.name}
 *   allowManagementInbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: allow_management_inbound
 *     properties:
 *       name: allow_management_inbound
 *       priority: 106
 *       direction: Inbound
 *       access: Allow
 *       protocol: Tcp
 *       sourcePortRange: '*'
 *       destinationPortRanges:
 *         - '9000'
 *         - '9003'
 *         - '1438'
 *         - '1440'
 *         - '1452'
 *       sourceAddressPrefix: '*'
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   allowMisubnetInbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: allow_misubnet_inbound
 *     properties:
 *       name: allow_misubnet_inbound
 *       priority: 200
 *       direction: Inbound
 *       access: Allow
 *       protocol: '*'
 *       sourcePortRange: '*'
 *       destinationPortRange: '*'
 *       sourceAddressPrefix: 10.0.0.0/24
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   allowHealthProbeInbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: allow_health_probe_inbound
 *     properties:
 *       name: allow_health_probe_inbound
 *       priority: 300
 *       direction: Inbound
 *       access: Allow
 *       protocol: '*'
 *       sourcePortRange: '*'
 *       destinationPortRange: '*'
 *       sourceAddressPrefix: AzureLoadBalancer
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   allowTdsInbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: allow_tds_inbound
 *     properties:
 *       name: allow_tds_inbound
 *       priority: 1000
 *       direction: Inbound
 *       access: Allow
 *       protocol: Tcp
 *       sourcePortRange: '*'
 *       destinationPortRange: '1433'
 *       sourceAddressPrefix: VirtualNetwork
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   denyAllInbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: deny_all_inbound
 *     properties:
 *       name: deny_all_inbound
 *       priority: 4096
 *       direction: Inbound
 *       access: Deny
 *       protocol: '*'
 *       sourcePortRange: '*'
 *       destinationPortRange: '*'
 *       sourceAddressPrefix: '*'
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   allowManagementOutbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: allow_management_outbound
 *     properties:
 *       name: allow_management_outbound
 *       priority: 102
 *       direction: Outbound
 *       access: Allow
 *       protocol: Tcp
 *       sourcePortRange: '*'
 *       destinationPortRanges:
 *         - '80'
 *         - '443'
 *         - '12000'
 *       sourceAddressPrefix: '*'
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   allowMisubnetOutbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: allow_misubnet_outbound
 *     properties:
 *       name: allow_misubnet_outbound
 *       priority: 200
 *       direction: Outbound
 *       access: Allow
 *       protocol: '*'
 *       sourcePortRange: '*'
 *       destinationPortRange: '*'
 *       sourceAddressPrefix: 10.0.0.0/24
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   denyAllOutbound:
 *     type: azure:network:NetworkSecurityRule
 *     name: deny_all_outbound
 *     properties:
 *       name: deny_all_outbound
 *       priority: 4096
 *       direction: Outbound
 *       access: Deny
 *       protocol: '*'
 *       sourcePortRange: '*'
 *       destinationPortRange: '*'
 *       sourceAddressPrefix: '*'
 *       destinationAddressPrefix: '*'
 *       resourceGroupName: ${example.name}
 *       networkSecurityGroupName: ${exampleNetworkSecurityGroup.name}
 *   exampleVirtualNetwork:
 *     type: azure:network:VirtualNetwork
 *     name: example
 *     properties:
 *       name: vnet-mi
 *       resourceGroupName: ${example.name}
 *       addressSpaces:
 *         - 10.0.0.0/16
 *       location: ${example.location}
 *   exampleSubnet:
 *     type: azure:network:Subnet
 *     name: example
 *     properties:
 *       name: subnet-mi
 *       resourceGroupName: ${example.name}
 *       virtualNetworkName: ${exampleVirtualNetwork.name}
 *       addressPrefixes:
 *         - 10.0.0.0/24
 *       delegations:
 *         - name: managedinstancedelegation
 *           serviceDelegation:
 *             name: Microsoft.Sql/managedInstances
 *             actions:
 *               - Microsoft.Network/virtualNetworks/subnets/join/action
 *               - Microsoft.Network/virtualNetworks/subnets/prepareNetworkPolicies/action
 *               - Microsoft.Network/virtualNetworks/subnets/unprepareNetworkPolicies/action
 *   exampleSubnetNetworkSecurityGroupAssociation:
 *     type: azure:network:SubnetNetworkSecurityGroupAssociation
 *     name: example
 *     properties:
 *       subnetId: ${exampleSubnet.id}
 *       networkSecurityGroupId: ${exampleNetworkSecurityGroup.id}
 *   exampleRouteTable:
 *     type: azure:network:RouteTable
 *     name: example
 *     properties:
 *       name: routetable-mi
 *       location: ${example.location}
 *       resourceGroupName: ${example.name}
 *       disableBgpRoutePropagation: false
 *   exampleSubnetRouteTableAssociation:
 *     type: azure:network:SubnetRouteTableAssociation
 *     name: example
 *     properties:
 *       subnetId: ${exampleSubnet.id}
 *       routeTableId: ${exampleRouteTable.id}
 *   exampleManagedInstance:
 *     type: azure:mssql:ManagedInstance
 *     name: example
 *     properties:
 *       name: managedsqlinstance
 *       resourceGroupName: ${example.name}
 *       location: ${example.location}
 *       licenseType: BasePrice
 *       skuName: GP_Gen5
 *       storageSizeInGb: 32
 *       subnetId: ${exampleSubnet.id}
 *       vcores: 4
 *       administratorLogin: mradministrator
 *       administratorLoginPassword: thisIsDog11
 *   exampleManagedInstanceSecurityAlertPolicy:
 *     type: azure:mssql:ManagedInstanceSecurityAlertPolicy
 *     name: example
 *     properties:
 *       resourceGroupName: ${example.name}
 *       managedInstanceName: ${exampleManagedInstance.name}
 *       enabled: true
 *       storageEndpoint: ${exampleAzurermStorageAccount.primaryBlobEndpoint}
 *       storageAccountAccessKey: ${exampleAzurermStorageAccount.primaryAccessKey}
 *       disabledAlerts:
 *         - Sql_Injection
 *         - Data_Exfiltration
 *       retentionDays: 20
 * ```
 * 
 * ## Import
 * MS SQL Managed Instance Security Alert Policy can be imported using the `resource id`, e.g.
 * ```sh
 * $ pulumi import azure:mssql/managedInstanceSecurityAlertPolicy:ManagedInstanceSecurityAlertPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acceptanceTestResourceGroup1/providers/Microsoft.Sql/managedInstances/instance1/securityAlertPolicies/Default
 * ```
 * @property disabledAlerts Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
 * @property emailAccountAdminsEnabled Boolean flag which specifies if the alert is sent to the account administrators or not. Defaults to `false`.
 * @property emailAddresses Specifies an array of email addresses to which the alert is sent.
 * @property enabled Specifies the state of the Security Alert Policy, whether it is enabled or disabled. Possible values are `true`, `false`.
 * @property managedInstanceName Specifies the name of the MS SQL Managed Instance. Changing this forces a new resource to be created.
 * @property resourceGroupName The name of the resource group that contains the MS SQL Managed Instance. Changing this forces a new resource to be created.
 * @property retentionDays Specifies the number of days to keep in the Threat Detection audit logs. Defaults to `0`.
 * @property storageAccountAccessKey Specifies the identifier key of the Threat Detection audit storage account. This is mandatory when you use `storage_endpoint` to specify a storage account blob endpoint.
 * > **NOTE:**  Please note that storage accounts configured with `shared_access_key_enabled = false` cannot be used to configure `azure.mssql.ManagedInstanceSecurityAlertPolicy` with `storage_endpoint` for now.
 * @property storageEndpoint Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.
 */
public data class ManagedInstanceSecurityAlertPolicyArgs(
    public val disabledAlerts: Output>? = null,
    public val emailAccountAdminsEnabled: Output? = null,
    public val emailAddresses: Output>? = null,
    public val enabled: Output? = null,
    public val managedInstanceName: Output? = null,
    public val resourceGroupName: Output? = null,
    public val retentionDays: Output? = null,
    public val storageAccountAccessKey: Output? = null,
    public val storageEndpoint: Output? = null,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs =
        com.pulumi.azure.mssql.ManagedInstanceSecurityAlertPolicyArgs.builder()
            .disabledAlerts(disabledAlerts?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
            .emailAccountAdminsEnabled(emailAccountAdminsEnabled?.applyValue({ args0 -> args0 }))
            .emailAddresses(emailAddresses?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
            .enabled(enabled?.applyValue({ args0 -> args0 }))
            .managedInstanceName(managedInstanceName?.applyValue({ args0 -> args0 }))
            .resourceGroupName(resourceGroupName?.applyValue({ args0 -> args0 }))
            .retentionDays(retentionDays?.applyValue({ args0 -> args0 }))
            .storageAccountAccessKey(storageAccountAccessKey?.applyValue({ args0 -> args0 }))
            .storageEndpoint(storageEndpoint?.applyValue({ args0 -> args0 })).build()
}

/**
 * Builder for [ManagedInstanceSecurityAlertPolicyArgs].
 */
@PulumiTagMarker
public class ManagedInstanceSecurityAlertPolicyArgsBuilder internal constructor() {
    private var disabledAlerts: Output>? = null

    private var emailAccountAdminsEnabled: Output? = null

    private var emailAddresses: Output>? = null

    private var enabled: Output? = null

    private var managedInstanceName: Output? = null

    private var resourceGroupName: Output? = null

    private var retentionDays: Output? = null

    private var storageAccountAccessKey: Output? = null

    private var storageEndpoint: Output? = null

    /**
     * @param value Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
     */
    @JvmName("lvoouksjxuqedcae")
    public suspend fun disabledAlerts(`value`: Output>) {
        this.disabledAlerts = value
    }

    @JvmName("ncnyencbeyadynll")
    public suspend fun disabledAlerts(vararg values: Output) {
        this.disabledAlerts = Output.all(values.asList())
    }

    /**
     * @param values Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
     */
    @JvmName("kithdxxsjigykpmi")
    public suspend fun disabledAlerts(values: List>) {
        this.disabledAlerts = Output.all(values)
    }

    /**
     * @param value Boolean flag which specifies if the alert is sent to the account administrators or not. Defaults to `false`.
     */
    @JvmName("vmuqbwryvmtpbqtx")
    public suspend fun emailAccountAdminsEnabled(`value`: Output) {
        this.emailAccountAdminsEnabled = value
    }

    /**
     * @param value Specifies an array of email addresses to which the alert is sent.
     */
    @JvmName("hhpaepmcnermqxxo")
    public suspend fun emailAddresses(`value`: Output>) {
        this.emailAddresses = value
    }

    @JvmName("tokheicgoqabyonw")
    public suspend fun emailAddresses(vararg values: Output) {
        this.emailAddresses = Output.all(values.asList())
    }

    /**
     * @param values Specifies an array of email addresses to which the alert is sent.
     */
    @JvmName("vvfgsbpaxdrmfoqe")
    public suspend fun emailAddresses(values: List>) {
        this.emailAddresses = Output.all(values)
    }

    /**
     * @param value Specifies the state of the Security Alert Policy, whether it is enabled or disabled. Possible values are `true`, `false`.
     */
    @JvmName("uedfxpkvffrsppur")
    public suspend fun enabled(`value`: Output) {
        this.enabled = value
    }

    /**
     * @param value Specifies the name of the MS SQL Managed Instance. Changing this forces a new resource to be created.
     */
    @JvmName("krcxpeqcfvxqkatb")
    public suspend fun managedInstanceName(`value`: Output) {
        this.managedInstanceName = value
    }

    /**
     * @param value The name of the resource group that contains the MS SQL Managed Instance. Changing this forces a new resource to be created.
     */
    @JvmName("tlqrvsaimulnxvlw")
    public suspend fun resourceGroupName(`value`: Output) {
        this.resourceGroupName = value
    }

    /**
     * @param value Specifies the number of days to keep in the Threat Detection audit logs. Defaults to `0`.
     */
    @JvmName("voupjubwkvrfadow")
    public suspend fun retentionDays(`value`: Output) {
        this.retentionDays = value
    }

    /**
     * @param value Specifies the identifier key of the Threat Detection audit storage account. This is mandatory when you use `storage_endpoint` to specify a storage account blob endpoint.
     * > **NOTE:**  Please note that storage accounts configured with `shared_access_key_enabled = false` cannot be used to configure `azure.mssql.ManagedInstanceSecurityAlertPolicy` with `storage_endpoint` for now.
     */
    @JvmName("ejqepvbuipvhbejg")
    public suspend fun storageAccountAccessKey(`value`: Output) {
        this.storageAccountAccessKey = value
    }

    /**
     * @param value Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.
     */
    @JvmName("lnvelkoqvtkmsjse")
    public suspend fun storageEndpoint(`value`: Output) {
        this.storageEndpoint = value
    }

    /**
     * @param value Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
     */
    @JvmName("gawpewnfwraaexug")
    public suspend fun disabledAlerts(`value`: List?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.disabledAlerts = mapped
    }

    /**
     * @param values Specifies an array of alerts that are disabled. Possible values are `Sql_Injection`, `Sql_Injection_Vulnerability`, `Access_Anomaly`, `Data_Exfiltration`, `Unsafe_Action` and `Brute_Force`.
     */
    @JvmName("oddupbvbxsptnbhy")
    public suspend fun disabledAlerts(vararg values: String) {
        val toBeMapped = values.toList()
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.disabledAlerts = mapped
    }

    /**
     * @param value Boolean flag which specifies if the alert is sent to the account administrators or not. Defaults to `false`.
     */
    @JvmName("lsckjxxurgqthipc")
    public suspend fun emailAccountAdminsEnabled(`value`: Boolean?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.emailAccountAdminsEnabled = mapped
    }

    /**
     * @param value Specifies an array of email addresses to which the alert is sent.
     */
    @JvmName("drmkrhdnbslnrnnb")
    public suspend fun emailAddresses(`value`: List?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.emailAddresses = mapped
    }

    /**
     * @param values Specifies an array of email addresses to which the alert is sent.
     */
    @JvmName("tpshranvcysovtow")
    public suspend fun emailAddresses(vararg values: String) {
        val toBeMapped = values.toList()
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.emailAddresses = mapped
    }

    /**
     * @param value Specifies the state of the Security Alert Policy, whether it is enabled or disabled. Possible values are `true`, `false`.
     */
    @JvmName("oxhkdbgyniljhykm")
    public suspend fun enabled(`value`: Boolean?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.enabled = mapped
    }

    /**
     * @param value Specifies the name of the MS SQL Managed Instance. Changing this forces a new resource to be created.
     */
    @JvmName("dlgtfvofovrtdxmq")
    public suspend fun managedInstanceName(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.managedInstanceName = mapped
    }

    /**
     * @param value The name of the resource group that contains the MS SQL Managed Instance. Changing this forces a new resource to be created.
     */
    @JvmName("xxifewdnsibehmhg")
    public suspend fun resourceGroupName(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.resourceGroupName = mapped
    }

    /**
     * @param value Specifies the number of days to keep in the Threat Detection audit logs. Defaults to `0`.
     */
    @JvmName("lujqeasttukbjrhw")
    public suspend fun retentionDays(`value`: Int?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.retentionDays = mapped
    }

    /**
     * @param value Specifies the identifier key of the Threat Detection audit storage account. This is mandatory when you use `storage_endpoint` to specify a storage account blob endpoint.
     * > **NOTE:**  Please note that storage accounts configured with `shared_access_key_enabled = false` cannot be used to configure `azure.mssql.ManagedInstanceSecurityAlertPolicy` with `storage_endpoint` for now.
     */
    @JvmName("tmqjruacobtcunpi")
    public suspend fun storageAccountAccessKey(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.storageAccountAccessKey = mapped
    }

    /**
     * @param value Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.
     */
    @JvmName("fabhrbudpcrnfmyn")
    public suspend fun storageEndpoint(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.storageEndpoint = mapped
    }

    internal fun build(): ManagedInstanceSecurityAlertPolicyArgs =
        ManagedInstanceSecurityAlertPolicyArgs(
            disabledAlerts = disabledAlerts,
            emailAccountAdminsEnabled = emailAccountAdminsEnabled,
            emailAddresses = emailAddresses,
            enabled = enabled,
            managedInstanceName = managedInstanceName,
            resourceGroupName = resourceGroupName,
            retentionDays = retentionDays,
            storageAccountAccessKey = storageAccountAccessKey,
            storageEndpoint = storageEndpoint,
        )
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy