Attestation At Resource Group
    An attestation resource. Azure REST API version: 2022-09-01. Prior API version in Azure Native 1.x: 2021-01-01.
Example Usage
Create attestation at resource group scope
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
    var attestationAtResourceGroup = new AzureNative.PolicyInsights.AttestationAtResourceGroup("attestationAtResourceGroup", new()
    {
        AssessmentDate = "2021-06-10T00:00:00Z",
        AttestationName = "790996e6-9871-4b1f-9cd9-ec42cd6ced1e",
        Comments = "This subscription has passed a security audit.",
        ComplianceState = "Compliant",
        Evidence = new[]
        {
            new AzureNative.PolicyInsights.Inputs.AttestationEvidenceArgs
            {
                Description = "The results of the security audit.",
                SourceUri = "https://gist.github.com/contoso/9573e238762c60166c090ae16b814011",
            },
        },
        ExpiresOn = "2021-06-15T00:00:00Z",
        Metadata =
        {
            { "departmentId", "NYC-MARKETING-1" },
        },
        Owner = "55a32e28-3aa5-4eea-9b5a-4cd85153b966",
        PolicyAssignmentId = "/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5",
        PolicyDefinitionReferenceId = "0b158b46-ff42-4799-8e39-08a5c23b4551",
        ResourceGroupName = "myRg",
    });
});Content copied to clipboard
package main
import (
	"github.com/pulumi/pulumi-azure-native-sdk/policyinsights/v2"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := policyinsights.NewAttestationAtResourceGroup(ctx, "attestationAtResourceGroup", &policyinsights.AttestationAtResourceGroupArgs{
			AssessmentDate:  pulumi.String("2021-06-10T00:00:00Z"),
			AttestationName: pulumi.String("790996e6-9871-4b1f-9cd9-ec42cd6ced1e"),
			Comments:        pulumi.String("This subscription has passed a security audit."),
			ComplianceState: pulumi.String("Compliant"),
			Evidence: []policyinsights.AttestationEvidenceArgs{
				{
					Description: pulumi.String("The results of the security audit."),
					SourceUri:   pulumi.String("https://gist.github.com/contoso/9573e238762c60166c090ae16b814011"),
				},
			},
			ExpiresOn: pulumi.String("2021-06-15T00:00:00Z"),
			Metadata: pulumi.Any{
				DepartmentId: "NYC-MARKETING-1",
			},
			Owner:                       pulumi.String("55a32e28-3aa5-4eea-9b5a-4cd85153b966"),
			PolicyAssignmentId:          pulumi.String("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5"),
			PolicyDefinitionReferenceId: pulumi.String("0b158b46-ff42-4799-8e39-08a5c23b4551"),
			ResourceGroupName:           pulumi.String("myRg"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}Content copied to clipboard
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.policyinsights.AttestationAtResourceGroup;
import com.pulumi.azurenative.policyinsights.AttestationAtResourceGroupArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var attestationAtResourceGroup = new AttestationAtResourceGroup("attestationAtResourceGroup", AttestationAtResourceGroupArgs.builder()
            .assessmentDate("2021-06-10T00:00:00Z")
            .attestationName("790996e6-9871-4b1f-9cd9-ec42cd6ced1e")
            .comments("This subscription has passed a security audit.")
            .complianceState("Compliant")
            .evidence(Map.ofEntries(
                Map.entry("description", "The results of the security audit."),
                Map.entry("sourceUri", "https://gist.github.com/contoso/9573e238762c60166c090ae16b814011")
            ))
            .expiresOn("2021-06-15T00:00:00Z")
            .metadata(Map.of("departmentId", "NYC-MARKETING-1"))
            .owner("55a32e28-3aa5-4eea-9b5a-4cd85153b966")
            .policyAssignmentId("/subscriptions/35ee058e-5fa0-414c-8145-3ebb8d09b6e2/providers/microsoft.authorization/policyassignments/b101830944f246d8a14088c5")
            .policyDefinitionReferenceId("0b158b46-ff42-4799-8e39-08a5c23b4551")
            .resourceGroupName("myRg")
            .build());
    }
}Content copied to clipboard
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:policyinsights:AttestationAtResourceGroup 790996e6-9871-4b1f-9cd9-ec42cd6ced1e /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PolicyInsights/attestations/{attestationName}Content copied to clipboard
Properties
Link copied to clipboard
                Link copied to clipboard
                Link copied to clipboard
                The policy definition reference ID from a policy set definition that the attestation is setting the state for. If the policy assignment assigns a policy set definition the attestation can choose a definition within the set definition with this property or omit this and set the state for the entire set definition.
Link copied to clipboard