Database Sql Vulnerability Assessment Rule Baseline Args
A database sql vulnerability assessment rule baseline. Uses Azure REST API version 2023-08-01. In version 2.x of the Azure Native provider, it used API version 2022-11-01-preview. Other available API versions: 2022-02-01-preview, 2022-05-01-preview, 2022-08-01-preview, 2022-11-01-preview, 2023-02-01-preview, 2023-05-01-preview, 2023-08-01-preview, 2024-05-01-preview. These can be accessed by generating a local SDK package using the CLI command pulumi package add azure-native sql [ApiVersion]
. See the ../../../version-guide/#accessing-any-api-version-via-local-packages for details.
Example Usage
Creates or updates a database's vulnerability assessment rule baseline.
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var databaseSqlVulnerabilityAssessmentRuleBaseline = new AzureNative.Sql.DatabaseSqlVulnerabilityAssessmentRuleBaseline("databaseSqlVulnerabilityAssessmentRuleBaseline", new()
{
BaselineName = "default",
DatabaseName = "testdb",
LatestScan = false,
ResourceGroupName = "vulnerabilityaseessmenttest-4799",
Results = new[]
{
new[]
{
"userA",
"SELECT",
},
new[]
{
"userB",
"SELECT",
},
new[]
{
"userC",
"SELECT",
},
},
RuleId = "VA1001",
ServerName = "vulnerabilityaseessmenttest-6440",
VulnerabilityAssessmentName = "default",
});
});
package main
import (
sql "github.com/pulumi/pulumi-azure-native-sdk/sql/v3"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := sql.NewDatabaseSqlVulnerabilityAssessmentRuleBaseline(ctx, "databaseSqlVulnerabilityAssessmentRuleBaseline", &sql.DatabaseSqlVulnerabilityAssessmentRuleBaselineArgs{
BaselineName: pulumi.String("default"),
DatabaseName: pulumi.String("testdb"),
LatestScan: pulumi.Bool(false),
ResourceGroupName: pulumi.String("vulnerabilityaseessmenttest-4799"),
Results: pulumi.StringArrayArray{
pulumi.StringArray{
pulumi.String("userA"),
pulumi.String("SELECT"),
},
pulumi.StringArray{
pulumi.String("userB"),
pulumi.String("SELECT"),
},
pulumi.StringArray{
pulumi.String("userC"),
pulumi.String("SELECT"),
},
},
RuleId: pulumi.String("VA1001"),
ServerName: pulumi.String("vulnerabilityaseessmenttest-6440"),
VulnerabilityAssessmentName: pulumi.String("default"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.sql.DatabaseSqlVulnerabilityAssessmentRuleBaseline;
import com.pulumi.azurenative.sql.DatabaseSqlVulnerabilityAssessmentRuleBaselineArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var databaseSqlVulnerabilityAssessmentRuleBaseline = new DatabaseSqlVulnerabilityAssessmentRuleBaseline("databaseSqlVulnerabilityAssessmentRuleBaseline", DatabaseSqlVulnerabilityAssessmentRuleBaselineArgs.builder()
.baselineName("default")
.databaseName("testdb")
.latestScan(false)
.resourceGroupName("vulnerabilityaseessmenttest-4799")
.results(
"userA",
"SELECT",
"userB",
"SELECT",
"userC",
"SELECT")
.ruleId("VA1001")
.serverName("vulnerabilityaseessmenttest-6440")
.vulnerabilityAssessmentName("default")
.build());
}
}
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:sql:DatabaseSqlVulnerabilityAssessmentRuleBaseline Scan123 /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/sqlVulnerabilityAssessments/{vulnerabilityAssessmentName}/baselines/{baselineName}/rules/{ruleId}
Constructors
Properties
The name of the database.
The latest scan flag
The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.
The name of the server.
The name of the vulnerability assessment.