Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
27 changes: 17 additions & 10 deletions settings/remarks/microsoft.aadiam/remarks.json
Original file line number Diff line number Diff line change
@@ -1,10 +1,17 @@
{
"$schema": "../../schemas/remarks.schema.json",
"TerraformSamples": [
{
"ResourceType": "Microsoft.AADIAM/diagnosticSettings",
"Path": "samples/diagnosticsettings/main.tf",
"Description": "A basic example of deploying Azure Active Directory Diagnostic Setting for Azure Monitor."
}
]
}
{
"$schema": "../../schemas/remarks.schema.json",
"TerraformSamples": [
{
"ResourceType": "Microsoft.AADIAM/diagnosticSettings",
"Path": "samples/diagnosticsettings/main.tf",
"Description": "A basic example of deploying Azure Active Directory Diagnostic Setting for Azure Monitor."
}
],
"BicepSamples": [
{
"ResourceType": "Microsoft.AADIAM/diagnosticSettings",
"Path": "samples/diagnosticsettings/main.bicep",
"Description": "A basic example of deploying Azure Active Directory Diagnostic Setting for Azure Monitor."
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
targetScope = 'tenant'

param resourceName string = 'acctest0001'
param location string = 'westus'

resource diagnosticSetting 'Microsoft.AADIAM/diagnosticSettings@2017-04-01' = {
name: '${resourceName}-DS-unique'
properties: {
logs: [
{
category: 'RiskyUsers'
enabled: true
}
{
category: 'ServicePrincipalSignInLogs'
enabled: true
}
{
category: 'SignInLogs'
enabled: true
}
{
category: 'B2CRequestLogs'
enabled: true
}
{
category: 'UserRiskEvents'
enabled: true
}
{
category: 'NonInteractiveUserSignInLogs'
enabled: true
}
{
category: 'AuditLogs'
enabled: true
}
]
}
}
27 changes: 17 additions & 10 deletions settings/remarks/microsoft.advisor/remarks.json
Original file line number Diff line number Diff line change
@@ -1,10 +1,17 @@
{
"$schema": "../../schemas/remarks.schema.json",
"TerraformSamples": [
{
"ResourceType": "Microsoft.Advisor/recommendations/suppressions",
"Path": "samples/recommendations/suppressions/main.tf",
"Description": "A basic example of deploying Specifies a suppression for an Azure Advisor recommendation."
}
]
}
{
"$schema": "../../schemas/remarks.schema.json",
"TerraformSamples": [
{
"ResourceType": "Microsoft.Advisor/recommendations/suppressions",
"Path": "samples/recommendations/suppressions/main.tf",
"Description": "A basic example of deploying Specifies a suppression for an Azure Advisor recommendation."
}
],
"BicepSamples": [
{
"ResourceType": "Microsoft.Advisor/recommendations/suppressions",
"Path": "samples/recommendations/suppressions/main.bicep",
"Description": "A basic example of deploying Specifies a suppression for an Azure Advisor recommendation."
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
param location string = 'westus'
param recommendationId string
param resourceName string = 'acctest0001'

resource suppression 'Microsoft.Advisor/recommendations/suppressions@2023-01-01' = {
name: resourceName
properties: {
suppressionId: ''
ttl: '00:30:00'
}
}
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
param resourceName string = 'acctest0001'
param location string = 'westeurope'

resource actionRule 'Microsoft.AlertsManagement/actionRules@2021-08-08' = {
name: resourceName
Expand All @@ -11,8 +12,6 @@ resource actionRule 'Microsoft.AlertsManagement/actionRules@2021-08-08' = {
]
description: ''
enabled: true
scopes: [
resourceGroup().id
]
scopes: []
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -5,19 +5,19 @@ resource actionGroup 'Microsoft.Insights/actionGroups@2023-01-01' = {
name: resourceName
location: 'global'
properties: {
armRoleReceivers: []
automationRunbookReceivers: []
azureAppPushReceivers: []
azureFunctionReceivers: []
emailReceivers: []
enabled: true
eventHubReceivers: []
groupShortName: 'acctestag'
itsmReceivers: []
logicAppReceivers: []
smsReceivers: []
voiceReceivers: []
webhookReceivers: []
armRoleReceivers: []
automationRunbookReceivers: []
azureAppPushReceivers: []
azureFunctionReceivers: []
eventHubReceivers: []
smsReceivers: []
}
}

Expand All @@ -26,13 +26,13 @@ resource component 'Microsoft.Insights/components@2020-02-02' = {
location: location
kind: 'web'
properties: {
Application_Type: 'web'
DisableIpMasking: false
DisableLocalAuth: false
ForceCustomerStorageForProfiler: false
RetentionInDays: 90
SamplingPercentage: 100
publicNetworkAccessForIngestion: 'Enabled'
Application_Type: 'web'
DisableLocalAuth: false
SamplingPercentage: 100
publicNetworkAccessForQuery: 'Enabled'
}
}
Expand All @@ -41,13 +41,6 @@ resource smartDetectorAlertRule 'microsoft.alertsManagement/smartDetectorAlertRu
name: resourceName
location: 'global'
properties: {
actionGroups: {
customEmailSubject: ''
customWebhookPayload: ''
groupIds: [
actionGroup.id
]
}
description: ''
detector: {
id: 'FailureAnomaliesDetector'
Expand All @@ -58,5 +51,12 @@ resource smartDetectorAlertRule 'microsoft.alertsManagement/smartDetectorAlertRu
]
severity: 'Sev0'
state: 'Enabled'
actionGroups: {
customWebhookPayload: ''
groupIds: [
actionGroup.id
]
customEmailSubject: ''
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,16 +4,16 @@ param location string = 'westeurope'
resource server 'Microsoft.AnalysisServices/servers@2017-08-01' = {
name: resourceName
location: location
sku: {
name: 'B1'
}
properties: {
asAdministrators: {
members: []
}
ipV4FirewallSettings: {
enablePowerBIService: false
firewallRules: []
}
}
sku: {
name: 'B1'
asAdministrators: {
members: []
}
}
}
Original file line number Diff line number Diff line change
@@ -1,49 +1,33 @@
param resourceName string = 'acctest0001'
param location string = 'westeurope'

resource component 'Microsoft.Insights/components@2020-02-02' = {
name: resourceName
location: location
kind: 'web'
properties: {
Application_Type: 'web'
DisableIpMasking: false
DisableLocalAuth: false
ForceCustomerStorageForProfiler: false
RetentionInDays: 90
SamplingPercentage: 100
publicNetworkAccessForIngestion: 'Enabled'
publicNetworkAccessForQuery: 'Enabled'
}
}

resource service 'Microsoft.ApiManagement/service@2021-08-01' = {
name: resourceName
location: location
sku: {
capacity: 0
name: 'Consumption'
}
properties: {
certificates: []
customProperties: {
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false'
}
disableGateway: false
publicNetworkAccess: 'Enabled'
publisherEmail: 'pub1@email.com'
publisherName: 'pub1'
virtualNetworkType: 'None'
}
sku: {
capacity: 0
name: 'Consumption'
certificates: []
}
}

resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = {
parent: service
name: '${resourceName};rev=1'
parent: service
properties: {
apiType: 'http'
apiVersion: ''
Expand All @@ -55,8 +39,8 @@ resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = {
}

resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = {
parent: service
name: resourceName
parent: service
properties: {
credentials: {
instrumentationKey: component.properties.InstrumentationKey
Expand All @@ -68,10 +52,26 @@ resource logger 'Microsoft.ApiManagement/service/loggers@2021-08-01' = {
}

resource diagnostic 'Microsoft.ApiManagement/service/apis/diagnostics@2021-08-01' = {
parent: api
name: 'applicationinsights'
parent: api
properties: {
loggerId: logger.id
operationNameFormat: 'Name'
}
}

resource component 'Microsoft.Insights/components@2020-02-02' = {
name: resourceName
location: location
kind: 'web'
properties: {
Application_Type: 'web'
DisableLocalAuth: false
ForceCustomerStorageForProfiler: false
SamplingPercentage: 100
publicNetworkAccessForQuery: 'Enabled'
DisableIpMasking: false
RetentionInDays: 90
publicNetworkAccessForIngestion: 'Enabled'
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,38 +4,38 @@ param location string = 'westeurope'
resource service 'Microsoft.ApiManagement/service@2021-08-01' = {
name: resourceName
location: location
sku: {
capacity: 0
name: 'Consumption'
}
properties: {
certificates: []
customProperties: {
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls10': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Tls11': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls10': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Protocols.Tls11': 'false'
'Microsoft.WindowsAzure.ApiManagement.Gateway.Security.Backend.Protocols.Ssl30': 'false'
}
disableGateway: false
publicNetworkAccess: 'Enabled'
publisherEmail: 'pub1@email.com'
publisherName: 'pub1'
virtualNetworkType: 'None'
}
sku: {
capacity: 0
name: 'Consumption'
}
}

resource api 'Microsoft.ApiManagement/service/apis@2021-08-01' = {
parent: service
name: '${resourceName};rev=1'
parent: service
properties: {
apiRevisionDescription: ''
apiType: 'http'
apiVersion: ''
apiVersionDescription: ''
authenticationSettings: {}
description: ''
displayName: 'api1'
apiRevisionDescription: ''
apiVersion: ''
apiVersionDescription: ''
path: 'api1'
protocols: [
'https'
Expand Down
Loading
Loading