Single Server Server Security Alert Policy
A server security alert policy. Uses Azure REST API version 2017-12-01.
Example Usage
Update a server's threat detection policy with all parameters
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var singleServerServerSecurityAlertPolicy = new AzureNative.DBforPostgreSQL.SingleServerServerSecurityAlertPolicy("singleServerServerSecurityAlertPolicy", new()
{
DisabledAlerts = new[]
{
"Access_Anomaly",
"Usage_Anomaly",
},
EmailAccountAdmins = true,
EmailAddresses = new[]
{
"testSecurityAlert@microsoft.com",
},
ResourceGroupName = "securityalert-4799",
RetentionDays = 5,
SecurityAlertPolicyName = "Default",
ServerName = "securityalert-6440",
State = AzureNative.DBforPostgreSQL.ServerSecurityAlertPolicyState.Enabled,
StorageAccountAccessKey = "sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==",
StorageEndpoint = "https://mystorage.blob.core.windows.net",
});
});
Content copied to clipboard
package main
import (
dbforpostgresql "github.com/pulumi/pulumi-azure-native-sdk/dbforpostgresql/v3"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := dbforpostgresql.NewSingleServerServerSecurityAlertPolicy(ctx, "singleServerServerSecurityAlertPolicy", &dbforpostgresql.SingleServerServerSecurityAlertPolicyArgs{
DisabledAlerts: pulumi.StringArray{
pulumi.String("Access_Anomaly"),
pulumi.String("Usage_Anomaly"),
},
EmailAccountAdmins: pulumi.Bool(true),
EmailAddresses: pulumi.StringArray{
pulumi.String("testSecurityAlert@microsoft.com"),
},
ResourceGroupName: pulumi.String("securityalert-4799"),
RetentionDays: pulumi.Int(5),
SecurityAlertPolicyName: pulumi.String("Default"),
ServerName: pulumi.String("securityalert-6440"),
State: dbforpostgresql.ServerSecurityAlertPolicyStateEnabled,
StorageAccountAccessKey: pulumi.String("sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD=="),
StorageEndpoint: pulumi.String("https://mystorage.blob.core.windows.net"),
})
if err != nil {
return err
}
return nil
})
}
Content copied to clipboard
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.dbforpostgresql.SingleServerServerSecurityAlertPolicy;
import com.pulumi.azurenative.dbforpostgresql.SingleServerServerSecurityAlertPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var singleServerServerSecurityAlertPolicy = new SingleServerServerSecurityAlertPolicy("singleServerServerSecurityAlertPolicy", SingleServerServerSecurityAlertPolicyArgs.builder()
.disabledAlerts(
"Access_Anomaly",
"Usage_Anomaly")
.emailAccountAdmins(true)
.emailAddresses("testSecurityAlert@microsoft.com")
.resourceGroupName("securityalert-4799")
.retentionDays(5)
.securityAlertPolicyName("Default")
.serverName("securityalert-6440")
.state("Enabled")
.storageAccountAccessKey("sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==")
.storageEndpoint("https://mystorage.blob.core.windows.net")
.build());
}
}
Content copied to clipboard
Update a server's threat detection policy with minimal parameters
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var singleServerServerSecurityAlertPolicy = new AzureNative.DBforPostgreSQL.SingleServerServerSecurityAlertPolicy("singleServerServerSecurityAlertPolicy", new()
{
EmailAccountAdmins = true,
ResourceGroupName = "securityalert-4799",
SecurityAlertPolicyName = "Default",
ServerName = "securityalert-6440",
State = AzureNative.DBforPostgreSQL.ServerSecurityAlertPolicyState.Disabled,
});
});
Content copied to clipboard
package main
import (
dbforpostgresql "github.com/pulumi/pulumi-azure-native-sdk/dbforpostgresql/v3"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := dbforpostgresql.NewSingleServerServerSecurityAlertPolicy(ctx, "singleServerServerSecurityAlertPolicy", &dbforpostgresql.SingleServerServerSecurityAlertPolicyArgs{
EmailAccountAdmins: pulumi.Bool(true),
ResourceGroupName: pulumi.String("securityalert-4799"),
SecurityAlertPolicyName: pulumi.String("Default"),
ServerName: pulumi.String("securityalert-6440"),
State: dbforpostgresql.ServerSecurityAlertPolicyStateDisabled,
})
if err != nil {
return err
}
return nil
})
}
Content copied to clipboard
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.dbforpostgresql.SingleServerServerSecurityAlertPolicy;
import com.pulumi.azurenative.dbforpostgresql.SingleServerServerSecurityAlertPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var singleServerServerSecurityAlertPolicy = new SingleServerServerSecurityAlertPolicy("singleServerServerSecurityAlertPolicy", SingleServerServerSecurityAlertPolicyArgs.builder()
.emailAccountAdmins(true)
.resourceGroupName("securityalert-4799")
.securityAlertPolicyName("Default")
.serverName("securityalert-6440")
.state("Disabled")
.build());
}
}
Content copied to clipboard
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:dbforpostgresql:SingleServerServerSecurityAlertPolicy Default /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/servers/{serverName}/securityAlertPolicies/{securityAlertPolicyName}
Content copied to clipboard
Properties
Link copied to clipboard
The Azure API version of the resource.
Link copied to clipboard
Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly
Link copied to clipboard
Specifies that the alert is sent to the account administrators.
Link copied to clipboard
Specifies an array of e-mail addresses to which the alert is sent.
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Specifies the number of days to keep in the Threat Detection audit logs.
Link copied to clipboard
Specifies the identifier key of the Threat Detection audit storage account.
Link copied to clipboard
Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.