Server Security Alert Policy Args
A server security alert policy. API Version: 2017-12-01.
Example Usage
Update a server's threat detection policy with all parameters
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var serverSecurityAlertPolicy = new AzureNative.DBforPostgreSQL.ServerSecurityAlertPolicy("serverSecurityAlertPolicy", new()
{
DisabledAlerts = new[]
{
"Access_Anomaly",
"Usage_Anomaly",
},
EmailAccountAdmins = true,
EmailAddresses = new[]
{
"testSecurityAlert@microsoft.com",
},
ResourceGroupName = "securityalert-4799",
RetentionDays = 5,
SecurityAlertPolicyName = "Default",
ServerName = "securityalert-6440",
State = AzureNative.DBforPostgreSQL.ServerSecurityAlertPolicyState.Enabled,
StorageAccountAccessKey = "sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==",
StorageEndpoint = "https://mystorage.blob.core.windows.net",
});
});
package main
import (
dbforpostgresql "github.com/pulumi/pulumi-azure-native-sdk/dbforpostgresql"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := dbforpostgresql.NewServerSecurityAlertPolicy(ctx, "serverSecurityAlertPolicy", &dbforpostgresql.ServerSecurityAlertPolicyArgs{
DisabledAlerts: pulumi.StringArray{
pulumi.String("Access_Anomaly"),
pulumi.String("Usage_Anomaly"),
},
EmailAccountAdmins: pulumi.Bool(true),
EmailAddresses: pulumi.StringArray{
pulumi.String("testSecurityAlert@microsoft.com"),
},
ResourceGroupName: pulumi.String("securityalert-4799"),
RetentionDays: pulumi.Int(5),
SecurityAlertPolicyName: pulumi.String("Default"),
ServerName: pulumi.String("securityalert-6440"),
State: dbforpostgresql.ServerSecurityAlertPolicyStateEnabled,
StorageAccountAccessKey: pulumi.String("sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD=="),
StorageEndpoint: pulumi.String("https://mystorage.blob.core.windows.net"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.dbforpostgresql.ServerSecurityAlertPolicy;
import com.pulumi.azurenative.dbforpostgresql.ServerSecurityAlertPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var serverSecurityAlertPolicy = new ServerSecurityAlertPolicy("serverSecurityAlertPolicy", ServerSecurityAlertPolicyArgs.builder()
.disabledAlerts(
"Access_Anomaly",
"Usage_Anomaly")
.emailAccountAdmins(true)
.emailAddresses("testSecurityAlert@microsoft.com")
.resourceGroupName("securityalert-4799")
.retentionDays(5)
.securityAlertPolicyName("Default")
.serverName("securityalert-6440")
.state("Enabled")
.storageAccountAccessKey("sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==")
.storageEndpoint("https://mystorage.blob.core.windows.net")
.build());
}
}
Update a server's threat detection policy with minimal parameters
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var serverSecurityAlertPolicy = new AzureNative.DBforPostgreSQL.ServerSecurityAlertPolicy("serverSecurityAlertPolicy", new()
{
EmailAccountAdmins = true,
ResourceGroupName = "securityalert-4799",
SecurityAlertPolicyName = "Default",
ServerName = "securityalert-6440",
State = AzureNative.DBforPostgreSQL.ServerSecurityAlertPolicyState.Disabled,
});
});
package main
import (
dbforpostgresql "github.com/pulumi/pulumi-azure-native-sdk/dbforpostgresql"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := dbforpostgresql.NewServerSecurityAlertPolicy(ctx, "serverSecurityAlertPolicy", &dbforpostgresql.ServerSecurityAlertPolicyArgs{
EmailAccountAdmins: pulumi.Bool(true),
ResourceGroupName: pulumi.String("securityalert-4799"),
SecurityAlertPolicyName: pulumi.String("Default"),
ServerName: pulumi.String("securityalert-6440"),
State: dbforpostgresql.ServerSecurityAlertPolicyStateDisabled,
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.dbforpostgresql.ServerSecurityAlertPolicy;
import com.pulumi.azurenative.dbforpostgresql.ServerSecurityAlertPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var serverSecurityAlertPolicy = new ServerSecurityAlertPolicy("serverSecurityAlertPolicy", ServerSecurityAlertPolicyArgs.builder()
.emailAccountAdmins(true)
.resourceGroupName("securityalert-4799")
.securityAlertPolicyName("Default")
.serverName("securityalert-6440")
.state("Disabled")
.build());
}
}
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:dbforpostgresql:ServerSecurityAlertPolicy Default /subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.DBforPostgreSQL/servers/securityalert-6440/securityAlertPolicies/default
Constructors
Properties
Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly
Specifies that the alert is sent to the account administrators.
Specifies an array of e-mail addresses to which the alert is sent.
The name of the resource group. The name is case insensitive.
Specifies the number of days to keep in the Threat Detection audit logs.
The name of the threat detection policy.
The name of the server.
Specifies the state of the policy, whether it is enabled or disabled.
Specifies the identifier key of the Threat Detection audit storage account.
Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.