com.pulumi.azure.synapse.kotlin.WorkspaceVulnerabilityAssessmentArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-azure-kotlin Show documentation
Show all versions of pulumi-azure-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.azure.synapse.kotlin
import com.pulumi.azure.synapse.WorkspaceVulnerabilityAssessmentArgs.builder
import com.pulumi.azure.synapse.kotlin.inputs.WorkspaceVulnerabilityAssessmentRecurringScansArgs
import com.pulumi.azure.synapse.kotlin.inputs.WorkspaceVulnerabilityAssessmentRecurringScansArgsBuilder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.jvm.JvmName
/**
* Manages the Vulnerability Assessment for a Synapse Workspace.
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as azure from "@pulumi/azure";
* const example = new azure.core.ResourceGroup("example", {
* name: "example-resources",
* location: "West Europe",
* });
* const exampleAccount = new azure.storage.Account("example", {
* name: "examplestorageacc",
* resourceGroupName: example.name,
* location: example.location,
* accountTier: "Standard",
* accountReplicationType: "LRS",
* accountKind: "StorageV2",
* isHnsEnabled: true,
* });
* const exampleContainer = new azure.storage.Container("example", {
* name: "example",
* storageAccountName: exampleAccount.name,
* });
* const exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem("example", {
* name: "example",
* storageAccountId: exampleAccount.id,
* });
* const exampleWorkspace = new azure.synapse.Workspace("example", {
* name: "example",
* resourceGroupName: example.name,
* location: example.location,
* storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,
* sqlAdministratorLogin: "sqladminuser",
* sqlAdministratorLoginPassword: "H@Sh1CoR3!",
* aadAdmin: {
* login: "AzureAD Admin",
* objectId: "00000000-0000-0000-0000-000000000000",
* tenantId: "00000000-0000-0000-0000-000000000000",
* },
* identity: {
* type: "SystemAssigned",
* },
* tags: {
* Env: "production",
* },
* });
* const auditLogs = new azure.storage.Account("audit_logs", {
* name: "examplesa",
* resourceGroupName: example.name,
* location: example.location,
* accountTier: "Standard",
* accountReplicationType: "LRS",
* });
* const exampleWorkspaceSecurityAlertPolicy = new azure.synapse.WorkspaceSecurityAlertPolicy("example", {
* synapseWorkspaceId: exampleWorkspace.id,
* policyState: "Enabled",
* storageEndpoint: auditLogs.primaryBlobEndpoint,
* storageAccountAccessKey: auditLogs.primaryAccessKey,
* disabledAlerts: [
* "Sql_Injection",
* "Data_Exfiltration",
* ],
* retentionDays: 20,
* });
* const exampleWorkspaceVulnerabilityAssessment = new azure.synapse.WorkspaceVulnerabilityAssessment("example", {
* workspaceSecurityAlertPolicyId: exampleWorkspaceSecurityAlertPolicy.id,
* storageContainerPath: pulumi.interpolate`${exampleAccount.primaryBlobEndpoint}${exampleContainer.name}/`,
* storageAccountAccessKey: exampleAccount.primaryAccessKey,
* recurringScans: {
* enabled: true,
* emailSubscriptionAdminsEnabled: true,
* emails: [
* "[email protected]",
* "[email protected]",
* ],
* },
* });
* ```
* ```python
* import pulumi
* import pulumi_azure as azure
* example = azure.core.ResourceGroup("example",
* name="example-resources",
* location="West Europe")
* example_account = azure.storage.Account("example",
* name="examplestorageacc",
* resource_group_name=example.name,
* location=example.location,
* account_tier="Standard",
* account_replication_type="LRS",
* account_kind="StorageV2",
* is_hns_enabled=True)
* example_container = azure.storage.Container("example",
* name="example",
* storage_account_name=example_account.name)
* example_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem("example",
* name="example",
* storage_account_id=example_account.id)
* example_workspace = azure.synapse.Workspace("example",
* name="example",
* resource_group_name=example.name,
* location=example.location,
* storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,
* sql_administrator_login="sqladminuser",
* sql_administrator_login_password="H@Sh1CoR3!",
* aad_admin=azure.synapse.WorkspaceAadAdminArgs(
* login="AzureAD Admin",
* object_id="00000000-0000-0000-0000-000000000000",
* tenant_id="00000000-0000-0000-0000-000000000000",
* ),
* identity=azure.synapse.WorkspaceIdentityArgs(
* type="SystemAssigned",
* ),
* tags={
* "Env": "production",
* })
* audit_logs = azure.storage.Account("audit_logs",
* name="examplesa",
* resource_group_name=example.name,
* location=example.location,
* account_tier="Standard",
* account_replication_type="LRS")
* example_workspace_security_alert_policy = azure.synapse.WorkspaceSecurityAlertPolicy("example",
* synapse_workspace_id=example_workspace.id,
* policy_state="Enabled",
* storage_endpoint=audit_logs.primary_blob_endpoint,
* storage_account_access_key=audit_logs.primary_access_key,
* disabled_alerts=[
* "Sql_Injection",
* "Data_Exfiltration",
* ],
* retention_days=20)
* example_workspace_vulnerability_assessment = azure.synapse.WorkspaceVulnerabilityAssessment("example",
* workspace_security_alert_policy_id=example_workspace_security_alert_policy.id,
* storage_container_path=pulumi.Output.all(example_account.primary_blob_endpoint, example_container.name).apply(lambda primary_blob_endpoint, name: f"{primary_blob_endpoint}{name}/"),
* storage_account_access_key=example_account.primary_access_key,
* recurring_scans=azure.synapse.WorkspaceVulnerabilityAssessmentRecurringScansArgs(
* enabled=True,
* email_subscription_admins_enabled=True,
* emails=[
* "[email protected]",
* "[email protected]",
* ],
* ))
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Azure = Pulumi.Azure;
* return await Deployment.RunAsync(() =>
* {
* var example = new Azure.Core.ResourceGroup("example", new()
* {
* Name = "example-resources",
* Location = "West Europe",
* });
* var exampleAccount = new Azure.Storage.Account("example", new()
* {
* Name = "examplestorageacc",
* ResourceGroupName = example.Name,
* Location = example.Location,
* AccountTier = "Standard",
* AccountReplicationType = "LRS",
* AccountKind = "StorageV2",
* IsHnsEnabled = true,
* });
* var exampleContainer = new Azure.Storage.Container("example", new()
* {
* Name = "example",
* StorageAccountName = exampleAccount.Name,
* });
* var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem("example", new()
* {
* Name = "example",
* StorageAccountId = exampleAccount.Id,
* });
* var exampleWorkspace = new Azure.Synapse.Workspace("example", new()
* {
* Name = "example",
* ResourceGroupName = example.Name,
* Location = example.Location,
* StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,
* SqlAdministratorLogin = "sqladminuser",
* SqlAdministratorLoginPassword = "H@Sh1CoR3!",
* AadAdmin = new Azure.Synapse.Inputs.WorkspaceAadAdminArgs
* {
* Login = "AzureAD Admin",
* ObjectId = "00000000-0000-0000-0000-000000000000",
* TenantId = "00000000-0000-0000-0000-000000000000",
* },
* Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs
* {
* Type = "SystemAssigned",
* },
* Tags =
* {
* { "Env", "production" },
* },
* });
* var auditLogs = new Azure.Storage.Account("audit_logs", new()
* {
* Name = "examplesa",
* ResourceGroupName = example.Name,
* Location = example.Location,
* AccountTier = "Standard",
* AccountReplicationType = "LRS",
* });
* var exampleWorkspaceSecurityAlertPolicy = new Azure.Synapse.WorkspaceSecurityAlertPolicy("example", new()
* {
* SynapseWorkspaceId = exampleWorkspace.Id,
* PolicyState = "Enabled",
* StorageEndpoint = auditLogs.PrimaryBlobEndpoint,
* StorageAccountAccessKey = auditLogs.PrimaryAccessKey,
* DisabledAlerts = new[]
* {
* "Sql_Injection",
* "Data_Exfiltration",
* },
* RetentionDays = 20,
* });
* var exampleWorkspaceVulnerabilityAssessment = new Azure.Synapse.WorkspaceVulnerabilityAssessment("example", new()
* {
* WorkspaceSecurityAlertPolicyId = exampleWorkspaceSecurityAlertPolicy.Id,
* StorageContainerPath = Output.Tuple(exampleAccount.PrimaryBlobEndpoint, exampleContainer.Name).Apply(values =>
* {
* var primaryBlobEndpoint = values.Item1;
* var name = values.Item2;
* return $"{primaryBlobEndpoint}{name}/";
* }),
* StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,
* RecurringScans = new Azure.Synapse.Inputs.WorkspaceVulnerabilityAssessmentRecurringScansArgs
* {
* Enabled = true,
* EmailSubscriptionAdminsEnabled = true,
* Emails = new[]
* {
* "[email protected]",
* "[email protected]",
* },
* },
* });
* });
* ```
* ```go
* package main
* import (
* "fmt"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/storage"
* "github.com/pulumi/pulumi-azure/sdk/v5/go/azure/synapse"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
* Name: pulumi.String("example-resources"),
* Location: pulumi.String("West Europe"),
* })
* if err != nil {
* return err
* }
* exampleAccount, err := storage.NewAccount(ctx, "example", &storage.AccountArgs{
* Name: pulumi.String("examplestorageacc"),
* ResourceGroupName: example.Name,
* Location: example.Location,
* AccountTier: pulumi.String("Standard"),
* AccountReplicationType: pulumi.String("LRS"),
* AccountKind: pulumi.String("StorageV2"),
* IsHnsEnabled: pulumi.Bool(true),
* })
* if err != nil {
* return err
* }
* exampleContainer, err := storage.NewContainer(ctx, "example", &storage.ContainerArgs{
* Name: pulumi.String("example"),
* StorageAccountName: exampleAccount.Name,
* })
* if err != nil {
* return err
* }
* exampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, "example", &storage.DataLakeGen2FilesystemArgs{
* Name: pulumi.String("example"),
* StorageAccountId: exampleAccount.ID(),
* })
* if err != nil {
* return err
* }
* exampleWorkspace, err := synapse.NewWorkspace(ctx, "example", &synapse.WorkspaceArgs{
* Name: pulumi.String("example"),
* ResourceGroupName: example.Name,
* Location: example.Location,
* StorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),
* SqlAdministratorLogin: pulumi.String("sqladminuser"),
* SqlAdministratorLoginPassword: pulumi.String("H@Sh1CoR3!"),
* AadAdmin: &synapse.WorkspaceAadAdminTypeArgs{
* Login: pulumi.String("AzureAD Admin"),
* ObjectId: pulumi.String("00000000-0000-0000-0000-000000000000"),
* TenantId: pulumi.String("00000000-0000-0000-0000-000000000000"),
* },
* Identity: &synapse.WorkspaceIdentityArgs{
* Type: pulumi.String("SystemAssigned"),
* },
* Tags: pulumi.StringMap{
* "Env": pulumi.String("production"),
* },
* })
* if err != nil {
* return err
* }
* auditLogs, err := storage.NewAccount(ctx, "audit_logs", &storage.AccountArgs{
* Name: pulumi.String("examplesa"),
* ResourceGroupName: example.Name,
* Location: example.Location,
* AccountTier: pulumi.String("Standard"),
* AccountReplicationType: pulumi.String("LRS"),
* })
* if err != nil {
* return err
* }
* exampleWorkspaceSecurityAlertPolicy, err := synapse.NewWorkspaceSecurityAlertPolicy(ctx, "example", &synapse.WorkspaceSecurityAlertPolicyArgs{
* SynapseWorkspaceId: exampleWorkspace.ID(),
* PolicyState: pulumi.String("Enabled"),
* StorageEndpoint: auditLogs.PrimaryBlobEndpoint,
* StorageAccountAccessKey: auditLogs.PrimaryAccessKey,
* DisabledAlerts: pulumi.StringArray{
* pulumi.String("Sql_Injection"),
* pulumi.String("Data_Exfiltration"),
* },
* RetentionDays: pulumi.Int(20),
* })
* if err != nil {
* return err
* }
* _, err = synapse.NewWorkspaceVulnerabilityAssessment(ctx, "example", &synapse.WorkspaceVulnerabilityAssessmentArgs{
* WorkspaceSecurityAlertPolicyId: exampleWorkspaceSecurityAlertPolicy.ID(),
* StorageContainerPath: pulumi.All(exampleAccount.PrimaryBlobEndpoint, exampleContainer.Name).ApplyT(func(_args []interface{}) (string, error) {
* primaryBlobEndpoint := _args[0].(string)
* name := _args[1].(string)
* return fmt.Sprintf("%v%v/", primaryBlobEndpoint, name), nil
* }).(pulumi.StringOutput),
* StorageAccountAccessKey: exampleAccount.PrimaryAccessKey,
* RecurringScans: &synapse.WorkspaceVulnerabilityAssessmentRecurringScansArgs{
* Enabled: pulumi.Bool(true),
* EmailSubscriptionAdminsEnabled: pulumi.Bool(true),
* Emails: pulumi.StringArray{
* pulumi.String("[email protected]"),
* pulumi.String("[email protected]"),
* },
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.azure.core.ResourceGroup;
* import com.pulumi.azure.core.ResourceGroupArgs;
* import com.pulumi.azure.storage.Account;
* import com.pulumi.azure.storage.AccountArgs;
* import com.pulumi.azure.storage.Container;
* import com.pulumi.azure.storage.ContainerArgs;
* import com.pulumi.azure.storage.DataLakeGen2Filesystem;
* import com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;
* import com.pulumi.azure.synapse.Workspace;
* import com.pulumi.azure.synapse.WorkspaceArgs;
* import com.pulumi.azure.synapse.inputs.WorkspaceAadAdminArgs;
* import com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;
* import com.pulumi.azure.synapse.WorkspaceSecurityAlertPolicy;
* import com.pulumi.azure.synapse.WorkspaceSecurityAlertPolicyArgs;
* import com.pulumi.azure.synapse.WorkspaceVulnerabilityAssessment;
* import com.pulumi.azure.synapse.WorkspaceVulnerabilityAssessmentArgs;
* import com.pulumi.azure.synapse.inputs.WorkspaceVulnerabilityAssessmentRecurringScansArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var example = new ResourceGroup("example", ResourceGroupArgs.builder()
* .name("example-resources")
* .location("West Europe")
* .build());
* var exampleAccount = new Account("exampleAccount", AccountArgs.builder()
* .name("examplestorageacc")
* .resourceGroupName(example.name())
* .location(example.location())
* .accountTier("Standard")
* .accountReplicationType("LRS")
* .accountKind("StorageV2")
* .isHnsEnabled("true")
* .build());
* var exampleContainer = new Container("exampleContainer", ContainerArgs.builder()
* .name("example")
* .storageAccountName(exampleAccount.name())
* .build());
* var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem("exampleDataLakeGen2Filesystem", DataLakeGen2FilesystemArgs.builder()
* .name("example")
* .storageAccountId(exampleAccount.id())
* .build());
* var exampleWorkspace = new Workspace("exampleWorkspace", WorkspaceArgs.builder()
* .name("example")
* .resourceGroupName(example.name())
* .location(example.location())
* .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())
* .sqlAdministratorLogin("sqladminuser")
* .sqlAdministratorLoginPassword("H@Sh1CoR3!")
* .aadAdmin(WorkspaceAadAdminArgs.builder()
* .login("AzureAD Admin")
* .objectId("00000000-0000-0000-0000-000000000000")
* .tenantId("00000000-0000-0000-0000-000000000000")
* .build())
* .identity(WorkspaceIdentityArgs.builder()
* .type("SystemAssigned")
* .build())
* .tags(Map.of("Env", "production"))
* .build());
* var auditLogs = new Account("auditLogs", AccountArgs.builder()
* .name("examplesa")
* .resourceGroupName(example.name())
* .location(example.location())
* .accountTier("Standard")
* .accountReplicationType("LRS")
* .build());
* var exampleWorkspaceSecurityAlertPolicy = new WorkspaceSecurityAlertPolicy("exampleWorkspaceSecurityAlertPolicy", WorkspaceSecurityAlertPolicyArgs.builder()
* .synapseWorkspaceId(exampleWorkspace.id())
* .policyState("Enabled")
* .storageEndpoint(auditLogs.primaryBlobEndpoint())
* .storageAccountAccessKey(auditLogs.primaryAccessKey())
* .disabledAlerts(
* "Sql_Injection",
* "Data_Exfiltration")
* .retentionDays(20)
* .build());
* var exampleWorkspaceVulnerabilityAssessment = new WorkspaceVulnerabilityAssessment("exampleWorkspaceVulnerabilityAssessment", WorkspaceVulnerabilityAssessmentArgs.builder()
* .workspaceSecurityAlertPolicyId(exampleWorkspaceSecurityAlertPolicy.id())
* .storageContainerPath(Output.tuple(exampleAccount.primaryBlobEndpoint(), exampleContainer.name()).applyValue(values -> {
* var primaryBlobEndpoint = values.t1;
* var name = values.t2;
* return String.format("%s%s/", primaryBlobEndpoint,name);
* }))
* .storageAccountAccessKey(exampleAccount.primaryAccessKey())
* .recurringScans(WorkspaceVulnerabilityAssessmentRecurringScansArgs.builder()
* .enabled(true)
* .emailSubscriptionAdminsEnabled(true)
* .emails(
* "[email protected]",
* "[email protected]")
* .build())
* .build());
* }
* }
* ```
* ```yaml
* resources:
* example:
* type: azure:core:ResourceGroup
* properties:
* name: example-resources
* location: West Europe
* exampleAccount:
* type: azure:storage:Account
* name: example
* properties:
* name: examplestorageacc
* resourceGroupName: ${example.name}
* location: ${example.location}
* accountTier: Standard
* accountReplicationType: LRS
* accountKind: StorageV2
* isHnsEnabled: 'true'
* exampleContainer:
* type: azure:storage:Container
* name: example
* properties:
* name: example
* storageAccountName: ${exampleAccount.name}
* exampleDataLakeGen2Filesystem:
* type: azure:storage:DataLakeGen2Filesystem
* name: example
* properties:
* name: example
* storageAccountId: ${exampleAccount.id}
* exampleWorkspace:
* type: azure:synapse:Workspace
* name: example
* properties:
* name: example
* resourceGroupName: ${example.name}
* location: ${example.location}
* storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}
* sqlAdministratorLogin: sqladminuser
* sqlAdministratorLoginPassword: H@Sh1CoR3!
* aadAdmin:
* login: AzureAD Admin
* objectId: 00000000-0000-0000-0000-000000000000
* tenantId: 00000000-0000-0000-0000-000000000000
* identity:
* type: SystemAssigned
* tags:
* Env: production
* auditLogs:
* type: azure:storage:Account
* name: audit_logs
* properties:
* name: examplesa
* resourceGroupName: ${example.name}
* location: ${example.location}
* accountTier: Standard
* accountReplicationType: LRS
* exampleWorkspaceSecurityAlertPolicy:
* type: azure:synapse:WorkspaceSecurityAlertPolicy
* name: example
* properties:
* synapseWorkspaceId: ${exampleWorkspace.id}
* policyState: Enabled
* storageEndpoint: ${auditLogs.primaryBlobEndpoint}
* storageAccountAccessKey: ${auditLogs.primaryAccessKey}
* disabledAlerts:
* - Sql_Injection
* - Data_Exfiltration
* retentionDays: 20
* exampleWorkspaceVulnerabilityAssessment:
* type: azure:synapse:WorkspaceVulnerabilityAssessment
* name: example
* properties:
* workspaceSecurityAlertPolicyId: ${exampleWorkspaceSecurityAlertPolicy.id}
* storageContainerPath: ${exampleAccount.primaryBlobEndpoint}${exampleContainer.name}/
* storageAccountAccessKey: ${exampleAccount.primaryAccessKey}
* recurringScans:
* enabled: true
* emailSubscriptionAdminsEnabled: true
* emails:
* - [email protected]
* - [email protected]
* ```
*
* ## Import
* Synapse Workspace Vulnerability Assessment can be imported using the `resource id`, e.g.
* ```sh
* $ pulumi import azure:synapse/workspaceVulnerabilityAssessment:WorkspaceVulnerabilityAssessment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1/vulnerabilityAssessments/default
* ```
* @property recurringScans The recurring scans settings. The `recurring_scans` block supports fields documented below.
* @property storageAccountAccessKey Specifies the identifier key of the storage account for vulnerability assessment scan results. If `storage_container_sas_key` isn't specified, `storage_account_access_key` is required.
* @property storageContainerPath A blob storage container path to hold the scan results (e.g. ).
* @property storageContainerSasKey A shared access signature (SAS Key) that has write access to the blob container specified in `storage_container_path` parameter. If `storage_account_access_key` isn't specified, `storage_container_sas_key` is required.
* @property workspaceSecurityAlertPolicyId The ID of the security alert policy of the Synapse Workspace. Changing this forces a new resource to be created.
*/
public data class WorkspaceVulnerabilityAssessmentArgs(
public val recurringScans: Output? = null,
public val storageAccountAccessKey: Output? = null,
public val storageContainerPath: Output? = null,
public val storageContainerSasKey: Output? = null,
public val workspaceSecurityAlertPolicyId: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.azure.synapse.WorkspaceVulnerabilityAssessmentArgs =
com.pulumi.azure.synapse.WorkspaceVulnerabilityAssessmentArgs.builder()
.recurringScans(recurringScans?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.storageAccountAccessKey(storageAccountAccessKey?.applyValue({ args0 -> args0 }))
.storageContainerPath(storageContainerPath?.applyValue({ args0 -> args0 }))
.storageContainerSasKey(storageContainerSasKey?.applyValue({ args0 -> args0 }))
.workspaceSecurityAlertPolicyId(
workspaceSecurityAlertPolicyId?.applyValue({ args0 ->
args0
}),
).build()
}
/**
* Builder for [WorkspaceVulnerabilityAssessmentArgs].
*/
@PulumiTagMarker
public class WorkspaceVulnerabilityAssessmentArgsBuilder internal constructor() {
private var recurringScans: Output? = null
private var storageAccountAccessKey: Output? = null
private var storageContainerPath: Output? = null
private var storageContainerSasKey: Output? = null
private var workspaceSecurityAlertPolicyId: Output? = null
/**
* @param value The recurring scans settings. The `recurring_scans` block supports fields documented below.
*/
@JvmName("eejilclxwstkspaj")
public suspend
fun recurringScans(`value`: Output) {
this.recurringScans = value
}
/**
* @param value Specifies the identifier key of the storage account for vulnerability assessment scan results. If `storage_container_sas_key` isn't specified, `storage_account_access_key` is required.
*/
@JvmName("eswabjgvfewqmspa")
public suspend fun storageAccountAccessKey(`value`: Output) {
this.storageAccountAccessKey = value
}
/**
* @param value A blob storage container path to hold the scan results (e.g. ).
*/
@JvmName("uvqqtoxqqpbdanqb")
public suspend fun storageContainerPath(`value`: Output) {
this.storageContainerPath = value
}
/**
* @param value A shared access signature (SAS Key) that has write access to the blob container specified in `storage_container_path` parameter. If `storage_account_access_key` isn't specified, `storage_container_sas_key` is required.
*/
@JvmName("ksurcqkcoqvupnfy")
public suspend fun storageContainerSasKey(`value`: Output) {
this.storageContainerSasKey = value
}
/**
* @param value The ID of the security alert policy of the Synapse Workspace. Changing this forces a new resource to be created.
*/
@JvmName("ypekvgykfdwuerkk")
public suspend fun workspaceSecurityAlertPolicyId(`value`: Output) {
this.workspaceSecurityAlertPolicyId = value
}
/**
* @param value The recurring scans settings. The `recurring_scans` block supports fields documented below.
*/
@JvmName("ptnrvivpttbtmeap")
public suspend fun recurringScans(`value`: WorkspaceVulnerabilityAssessmentRecurringScansArgs?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.recurringScans = mapped
}
/**
* @param argument The recurring scans settings. The `recurring_scans` block supports fields documented below.
*/
@JvmName("lescavcdmwngvukl")
public suspend
fun recurringScans(argument: suspend WorkspaceVulnerabilityAssessmentRecurringScansArgsBuilder.() -> Unit) {
val toBeMapped = WorkspaceVulnerabilityAssessmentRecurringScansArgsBuilder().applySuspend {
argument()
}.build()
val mapped = of(toBeMapped)
this.recurringScans = mapped
}
/**
* @param value Specifies the identifier key of the storage account for vulnerability assessment scan results. If `storage_container_sas_key` isn't specified, `storage_account_access_key` is required.
*/
@JvmName("vdmyqufnvtgmgivr")
public suspend fun storageAccountAccessKey(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.storageAccountAccessKey = mapped
}
/**
* @param value A blob storage container path to hold the scan results (e.g. ).
*/
@JvmName("bfstoddpdgbyjhkp")
public suspend fun storageContainerPath(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.storageContainerPath = mapped
}
/**
* @param value A shared access signature (SAS Key) that has write access to the blob container specified in `storage_container_path` parameter. If `storage_account_access_key` isn't specified, `storage_container_sas_key` is required.
*/
@JvmName("nlaxeeubswoxwcer")
public suspend fun storageContainerSasKey(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.storageContainerSasKey = mapped
}
/**
* @param value The ID of the security alert policy of the Synapse Workspace. Changing this forces a new resource to be created.
*/
@JvmName("pyqpqgmoeimyjfyc")
public suspend fun workspaceSecurityAlertPolicyId(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.workspaceSecurityAlertPolicyId = mapped
}
internal fun build(): WorkspaceVulnerabilityAssessmentArgs = WorkspaceVulnerabilityAssessmentArgs(
recurringScans = recurringScans,
storageAccountAccessKey = storageAccountAccessKey,
storageContainerPath = storageContainerPath,
storageContainerSasKey = storageContainerSasKey,
workspaceSecurityAlertPolicyId = workspaceSecurityAlertPolicyId,
)
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy