SqlPoolExtendedAuditingPolicyArgs

data class SqlPoolExtendedAuditingPolicyArgs(val logMonitoringEnabled: Output<Boolean>? = null, val retentionInDays: Output<Int>? = null, val sqlPoolId: Output<String>? = null, val storageAccountAccessKey: Output<String>? = null, val storageAccountAccessKeyIsSecondary: Output<Boolean>? = null, val storageEndpoint: Output<String>? = null) : ConvertibleToJava<SqlPoolExtendedAuditingPolicyArgs>

Manages a Synapse SQL Pool Extended Auditing Policy.

Example Usage

package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.storage.Account;
import com.pulumi.azure.storage.AccountArgs;
import com.pulumi.azure.storage.DataLakeGen2Filesystem;
import com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;
import com.pulumi.azure.synapse.Workspace;
import com.pulumi.azure.synapse.WorkspaceArgs;
import com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;
import com.pulumi.azure.synapse.SqlPool;
import com.pulumi.azure.synapse.SqlPoolArgs;
import com.pulumi.azure.synapse.SqlPoolExtendedAuditingPolicy;
import com.pulumi.azure.synapse.SqlPoolExtendedAuditingPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ResourceGroup("example", ResourceGroupArgs.builder()
.name("example-resources")
.location("West Europe")
.build());
var exampleAccount = new Account("exampleAccount", AccountArgs.builder()
.name("examplestorageacc")
.resourceGroupName(example.name())
.location(example.location())
.accountTier("Standard")
.accountReplicationType("LRS")
.accountKind("BlobStorage")
.build());
var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem("exampleDataLakeGen2Filesystem", DataLakeGen2FilesystemArgs.builder()
.name("example")
.storageAccountId(exampleAccount.id())
.build());
var exampleWorkspace = new Workspace("exampleWorkspace", WorkspaceArgs.builder()
.name("example")
.resourceGroupName(example.name())
.location(example.location())
.storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())
.sqlAdministratorLogin("sqladminuser")
.sqlAdministratorLoginPassword("H@Sh1CoR3!")
.identity(WorkspaceIdentityArgs.builder()
.type("SystemAssigned")
.build())
.build());
var exampleSqlPool = new SqlPool("exampleSqlPool", SqlPoolArgs.builder()
.name("examplesqlpool")
.synapseWorkspaceId(exampleWorkspace.id())
.skuName("DW100c")
.createMode("Default")
.build());
var auditLogs = new Account("auditLogs", AccountArgs.builder()
.name("examplesa")
.resourceGroupName(example.name())
.location(example.location())
.accountTier("Standard")
.accountReplicationType("LRS")
.build());
var exampleSqlPoolExtendedAuditingPolicy = new SqlPoolExtendedAuditingPolicy("exampleSqlPoolExtendedAuditingPolicy", SqlPoolExtendedAuditingPolicyArgs.builder()
.sqlPoolId(exampleSqlPool.id())
.storageEndpoint(auditLogs.primaryBlobEndpoint())
.storageAccountAccessKey(auditLogs.primaryAccessKey())
.storageAccountAccessKeyIsSecondary(false)
.retentionInDays(6)
.build());
}
}

Import

Synapse SQL Pool Extended Auditing Policys can be imported using the resource id, e.g.

$ pulumi import azure:synapse/sqlPoolExtendedAuditingPolicy:SqlPoolExtendedAuditingPolicy example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1/sqlPools/sqlPool1/extendedAuditingSettings/default

Constructors

Link copied to clipboard
fun SqlPoolExtendedAuditingPolicyArgs(logMonitoringEnabled: Output<Boolean>? = null, retentionInDays: Output<Int>? = null, sqlPoolId: Output<String>? = null, storageAccountAccessKey: Output<String>? = null, storageAccountAccessKeyIsSecondary: Output<Boolean>? = null, storageEndpoint: Output<String>? = null)

Functions

Link copied to clipboard
open override fun toJava(): SqlPoolExtendedAuditingPolicyArgs

Properties

Link copied to clipboard
val logMonitoringEnabled: Output<Boolean>? = null

Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its master database audit events to Azure Monitor. Defaults to true.

Link copied to clipboard
val retentionInDays: Output<Int>? = null

The number of days to retain logs for in the storage account. Defaults to 0.

Link copied to clipboard
val sqlPoolId: Output<String>? = null

The ID of the Synapse SQL pool to set the extended auditing policy. Changing this forces a new resource to be created.

Link copied to clipboard
val storageAccountAccessKey: Output<String>? = null

The access key to use for the auditing storage account.

Link copied to clipboard

Is storage_account_access_key value the storage's secondary key?

Link copied to clipboard
val storageEndpoint: Output<String>? = null

The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs.