We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_mssql_server_vulnerability_assessment does not have the possibility of implementing logging functionality to log analytics workspace but only in storage accounts
resource "azurerm_resource_group" "example" { name = "example-resources" location = "East US" } resource "azurerm_log_analytics_workspace" "example" { name = "log-analytics-workspace" location = azurerm_resource_group.example.location resource_group_name = azurerm_resource_group.example.name sku = "PerGB2018" retention_in_days = 90 } resource "azurerm_mssql_server_security_alert_policy" "example" { resource_group_name = azurerm_resource_group.example.name server_name = azurerm_sql_server.example.name state = "Enabled" } resource "azurerm_mssql_server_vulnerability_assessment" "example" { server_security_alert_policy_id = azurerm_mssql_server_security_alert_policy.example.id log_analytics_workspace_workspace_id = azurerm_log_analytics_workspace.example.workspace_id recurring_scans { enabled = true email_subscription_admins = true emails = [ "email@example1.com", "email@example2.com" ] } }
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Community Note
Description
azurerm_mssql_server_vulnerability_assessment does not have the possibility of implementing logging functionality to log analytics workspace but only in storage accounts
New or Affected Resource(s)
Potential Terraform Configuration
The text was updated successfully, but these errors were encountered: