-
Notifications
You must be signed in to change notification settings - Fork 1.1k
/
AMG_PrivateEndpoints_Audit.json
56 lines (56 loc) · 1.74 KB
/
AMG_PrivateEndpoints_Audit.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
{
"properties": {
"displayName": "Azure Managed Grafana workspaces should use private link",
"policyType": "BuiltIn",
"mode": "Indexed",
"description": "Azure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Managed Grafana, you can reduce data leakage risks.",
"metadata": {
"version": "1.0.1",
"category": "Managed Grafana"
},
"version": "1.0.1",
"parameters": {
"effect": {
"type": "String",
"metadata": {
"displayName": "Effect",
"description": "Enable or disable the execution of the policy"
},
"allowedValues": [
"Audit",
"Disabled"
],
"defaultValue": "Audit"
}
},
"policyRule": {
"if": {
"allOf": [
{
"field": "type",
"equals": "Microsoft.Dashboard/grafana"
},
{
"count": {
"field": "Microsoft.Dashboard/grafana/privateEndpointConnections[*]",
"where": {
"field": "Microsoft.Dashboard/grafana/privateEndpointConnections[*].privateLinkServiceConnectionState.status",
"equals": "Approved"
}
},
"less": 1
}
]
},
"then": {
"effect": "[parameters('effect')]"
}
},
"versions": [
"1.0.1",
"1.0.0"
]
},
"id": "/providers/Microsoft.Authorization/policyDefinitions/3a97e513-f75e-4230-8137-1efad4eadbbc",
"name": "3a97e513-f75e-4230-8137-1efad4eadbbc"
}