Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for azurerm_mssql_server_vulnerability_assessment --> Only storage account can hold logs #9082

Open
maonat opened this issue Oct 29, 2020 · 0 comments
Labels
enhancement service/mssql Microsoft SQL Server

Comments

@maonat
Copy link
Contributor

maonat commented Oct 29, 2020

Community Note

  • Please vote on this issue by adding a 馃憤 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

azurerm_mssql_server_vulnerability_assessment does not have the possibility of implementing logging functionality to log analytics workspace but only in storage accounts

New or Affected Resource(s)

  • azurerm_mssql_server_vulnerability_assessment

Potential Terraform Configuration

resource "azurerm_resource_group" "example" {
  name     = "example-resources"
  location = "East US"
}

resource "azurerm_log_analytics_workspace" "example" {
  name                = "log-analytics-workspace"
  location            = azurerm_resource_group.example.location
  resource_group_name = azurerm_resource_group.example.name
  sku                 = "PerGB2018"
  retention_in_days   = 90
}

resource "azurerm_mssql_server_security_alert_policy" "example" {
  resource_group_name = azurerm_resource_group.example.name
  server_name         = azurerm_sql_server.example.name
  state               = "Enabled"
}

resource "azurerm_mssql_server_vulnerability_assessment" "example" {
  server_security_alert_policy_id      = azurerm_mssql_server_security_alert_policy.example.id
  log_analytics_workspace_workspace_id = azurerm_log_analytics_workspace.example.workspace_id

  recurring_scans {
    enabled                   = true
    email_subscription_admins = true
    emails = [
      "email@example1.com",
      "email@example2.com"
    ]
  }
}
@katbyte katbyte added bug service/mssql Microsoft SQL Server labels Jun 24, 2021
@rcskosir rcskosir added enhancement and removed bug labels Aug 2, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement service/mssql Microsoft SQL Server
Projects
None yet
Development

No branches or pull requests

3 participants