1. Packages
  2. Azure Classic
  3. API Docs
  4. synapse
  5. SqlPoolVulnerabilityAssessment

We recommend using Azure Native.

Azure Classic v5.73.0 published on Monday, Apr 22, 2024 by Pulumi

azure.synapse.SqlPoolVulnerabilityAssessment

Explore with Pulumi AI

azure logo

We recommend using Azure Native.

Azure Classic v5.73.0 published on Monday, Apr 22, 2024 by Pulumi

    Manages the Vulnerability Assessment for a Synapse SQL Pool.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as azure from "@pulumi/azure";
    
    const example = new azure.core.ResourceGroup("example", {
        name: "example-resources",
        location: "West Europe",
    });
    const exampleAccount = new azure.storage.Account("example", {
        name: "examplestorageacc",
        resourceGroupName: example.name,
        location: example.location,
        accountTier: "Standard",
        accountReplicationType: "LRS",
        accountKind: "StorageV2",
        isHnsEnabled: true,
    });
    const exampleContainer = new azure.storage.Container("example", {
        name: "example",
        storageAccountName: exampleAccount.name,
    });
    const exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem("example", {
        name: "example",
        storageAccountId: exampleAccount.id,
    });
    const exampleWorkspace = new azure.synapse.Workspace("example", {
        name: "example",
        resourceGroupName: example.name,
        location: example.location,
        storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,
        sqlAdministratorLogin: "sqladminuser",
        sqlAdministratorLoginPassword: "H@Sh1CoR3!",
        aadAdmin: {
            login: "AzureAD Admin",
            objectId: "00000000-0000-0000-0000-000000000000",
            tenantId: "00000000-0000-0000-0000-000000000000",
        },
        identity: {
            type: "SystemAssigned",
        },
        tags: {
            Env: "production",
        },
    });
    const exampleSqlPool = new azure.synapse.SqlPool("example", {
        name: "examplesqlpool",
        synapseWorkspaceId: exampleWorkspace.id,
        skuName: "DW100c",
        createMode: "Default",
    });
    const auditLogs = new azure.storage.Account("audit_logs", {
        name: "examplesa",
        resourceGroupName: example.name,
        location: example.location,
        accountTier: "Standard",
        accountReplicationType: "LRS",
    });
    const exampleSqlPoolSecurityAlertPolicy = new azure.synapse.SqlPoolSecurityAlertPolicy("example", {
        sqlPoolId: exampleSqlPool.id,
        policyState: "Enabled",
        storageEndpoint: auditLogs.primaryBlobEndpoint,
        storageAccountAccessKey: auditLogs.primaryAccessKey,
        disabledAlerts: [
            "Sql_Injection",
            "Data_Exfiltration",
        ],
        retentionDays: 20,
    });
    const exampleSqlPoolVulnerabilityAssessment = new azure.synapse.SqlPoolVulnerabilityAssessment("example", {
        sqlPoolSecurityAlertPolicyId: exampleSqlPoolSecurityAlertPolicy.id,
        storageContainerPath: pulumi.interpolate`${exampleAccount.primaryBlobEndpoint}${exampleContainer.name}/`,
        storageAccountAccessKey: exampleAccount.primaryAccessKey,
        recurringScans: {
            enabled: true,
            emailSubscriptionAdminsEnabled: true,
            emails: [
                "email@example1.com",
                "email@example2.com",
            ],
        },
    });
    
    import pulumi
    import pulumi_azure as azure
    
    example = azure.core.ResourceGroup("example",
        name="example-resources",
        location="West Europe")
    example_account = azure.storage.Account("example",
        name="examplestorageacc",
        resource_group_name=example.name,
        location=example.location,
        account_tier="Standard",
        account_replication_type="LRS",
        account_kind="StorageV2",
        is_hns_enabled=True)
    example_container = azure.storage.Container("example",
        name="example",
        storage_account_name=example_account.name)
    example_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem("example",
        name="example",
        storage_account_id=example_account.id)
    example_workspace = azure.synapse.Workspace("example",
        name="example",
        resource_group_name=example.name,
        location=example.location,
        storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,
        sql_administrator_login="sqladminuser",
        sql_administrator_login_password="H@Sh1CoR3!",
        aad_admin=azure.synapse.WorkspaceAadAdminArgs(
            login="AzureAD Admin",
            object_id="00000000-0000-0000-0000-000000000000",
            tenant_id="00000000-0000-0000-0000-000000000000",
        ),
        identity=azure.synapse.WorkspaceIdentityArgs(
            type="SystemAssigned",
        ),
        tags={
            "Env": "production",
        })
    example_sql_pool = azure.synapse.SqlPool("example",
        name="examplesqlpool",
        synapse_workspace_id=example_workspace.id,
        sku_name="DW100c",
        create_mode="Default")
    audit_logs = azure.storage.Account("audit_logs",
        name="examplesa",
        resource_group_name=example.name,
        location=example.location,
        account_tier="Standard",
        account_replication_type="LRS")
    example_sql_pool_security_alert_policy = azure.synapse.SqlPoolSecurityAlertPolicy("example",
        sql_pool_id=example_sql_pool.id,
        policy_state="Enabled",
        storage_endpoint=audit_logs.primary_blob_endpoint,
        storage_account_access_key=audit_logs.primary_access_key,
        disabled_alerts=[
            "Sql_Injection",
            "Data_Exfiltration",
        ],
        retention_days=20)
    example_sql_pool_vulnerability_assessment = azure.synapse.SqlPoolVulnerabilityAssessment("example",
        sql_pool_security_alert_policy_id=example_sql_pool_security_alert_policy.id,
        storage_container_path=pulumi.Output.all(example_account.primary_blob_endpoint, example_container.name).apply(lambda primary_blob_endpoint, name: f"{primary_blob_endpoint}{name}/"),
        storage_account_access_key=example_account.primary_access_key,
        recurring_scans=azure.synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs(
            enabled=True,
            email_subscription_admins_enabled=True,
            emails=[
                "email@example1.com",
                "email@example2.com",
            ],
        ))
    
    package main
    
    import (
    	"fmt"
    
    	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
    	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/storage"
    	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/synapse"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
    			Name:     pulumi.String("example-resources"),
    			Location: pulumi.String("West Europe"),
    		})
    		if err != nil {
    			return err
    		}
    		exampleAccount, err := storage.NewAccount(ctx, "example", &storage.AccountArgs{
    			Name:                   pulumi.String("examplestorageacc"),
    			ResourceGroupName:      example.Name,
    			Location:               example.Location,
    			AccountTier:            pulumi.String("Standard"),
    			AccountReplicationType: pulumi.String("LRS"),
    			AccountKind:            pulumi.String("StorageV2"),
    			IsHnsEnabled:           pulumi.Bool(true),
    		})
    		if err != nil {
    			return err
    		}
    		exampleContainer, err := storage.NewContainer(ctx, "example", &storage.ContainerArgs{
    			Name:               pulumi.String("example"),
    			StorageAccountName: exampleAccount.Name,
    		})
    		if err != nil {
    			return err
    		}
    		exampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, "example", &storage.DataLakeGen2FilesystemArgs{
    			Name:             pulumi.String("example"),
    			StorageAccountId: exampleAccount.ID(),
    		})
    		if err != nil {
    			return err
    		}
    		exampleWorkspace, err := synapse.NewWorkspace(ctx, "example", &synapse.WorkspaceArgs{
    			Name:                            pulumi.String("example"),
    			ResourceGroupName:               example.Name,
    			Location:                        example.Location,
    			StorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),
    			SqlAdministratorLogin:           pulumi.String("sqladminuser"),
    			SqlAdministratorLoginPassword:   pulumi.String("H@Sh1CoR3!"),
    			AadAdmin: &synapse.WorkspaceAadAdminTypeArgs{
    				Login:    pulumi.String("AzureAD Admin"),
    				ObjectId: pulumi.String("00000000-0000-0000-0000-000000000000"),
    				TenantId: pulumi.String("00000000-0000-0000-0000-000000000000"),
    			},
    			Identity: &synapse.WorkspaceIdentityArgs{
    				Type: pulumi.String("SystemAssigned"),
    			},
    			Tags: pulumi.StringMap{
    				"Env": pulumi.String("production"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		exampleSqlPool, err := synapse.NewSqlPool(ctx, "example", &synapse.SqlPoolArgs{
    			Name:               pulumi.String("examplesqlpool"),
    			SynapseWorkspaceId: exampleWorkspace.ID(),
    			SkuName:            pulumi.String("DW100c"),
    			CreateMode:         pulumi.String("Default"),
    		})
    		if err != nil {
    			return err
    		}
    		auditLogs, err := storage.NewAccount(ctx, "audit_logs", &storage.AccountArgs{
    			Name:                   pulumi.String("examplesa"),
    			ResourceGroupName:      example.Name,
    			Location:               example.Location,
    			AccountTier:            pulumi.String("Standard"),
    			AccountReplicationType: pulumi.String("LRS"),
    		})
    		if err != nil {
    			return err
    		}
    		exampleSqlPoolSecurityAlertPolicy, err := synapse.NewSqlPoolSecurityAlertPolicy(ctx, "example", &synapse.SqlPoolSecurityAlertPolicyArgs{
    			SqlPoolId:               exampleSqlPool.ID(),
    			PolicyState:             pulumi.String("Enabled"),
    			StorageEndpoint:         auditLogs.PrimaryBlobEndpoint,
    			StorageAccountAccessKey: auditLogs.PrimaryAccessKey,
    			DisabledAlerts: pulumi.StringArray{
    				pulumi.String("Sql_Injection"),
    				pulumi.String("Data_Exfiltration"),
    			},
    			RetentionDays: pulumi.Int(20),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = synapse.NewSqlPoolVulnerabilityAssessment(ctx, "example", &synapse.SqlPoolVulnerabilityAssessmentArgs{
    			SqlPoolSecurityAlertPolicyId: exampleSqlPoolSecurityAlertPolicy.ID(),
    			StorageContainerPath: pulumi.All(exampleAccount.PrimaryBlobEndpoint, exampleContainer.Name).ApplyT(func(_args []interface{}) (string, error) {
    				primaryBlobEndpoint := _args[0].(string)
    				name := _args[1].(string)
    				return fmt.Sprintf("%v%v/", primaryBlobEndpoint, name), nil
    			}).(pulumi.StringOutput),
    			StorageAccountAccessKey: exampleAccount.PrimaryAccessKey,
    			RecurringScans: &synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs{
    				Enabled:                        pulumi.Bool(true),
    				EmailSubscriptionAdminsEnabled: pulumi.Bool(true),
    				Emails: pulumi.StringArray{
    					pulumi.String("email@example1.com"),
    					pulumi.String("email@example2.com"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Azure = Pulumi.Azure;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Azure.Core.ResourceGroup("example", new()
        {
            Name = "example-resources",
            Location = "West Europe",
        });
    
        var exampleAccount = new Azure.Storage.Account("example", new()
        {
            Name = "examplestorageacc",
            ResourceGroupName = example.Name,
            Location = example.Location,
            AccountTier = "Standard",
            AccountReplicationType = "LRS",
            AccountKind = "StorageV2",
            IsHnsEnabled = true,
        });
    
        var exampleContainer = new Azure.Storage.Container("example", new()
        {
            Name = "example",
            StorageAccountName = exampleAccount.Name,
        });
    
        var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem("example", new()
        {
            Name = "example",
            StorageAccountId = exampleAccount.Id,
        });
    
        var exampleWorkspace = new Azure.Synapse.Workspace("example", new()
        {
            Name = "example",
            ResourceGroupName = example.Name,
            Location = example.Location,
            StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,
            SqlAdministratorLogin = "sqladminuser",
            SqlAdministratorLoginPassword = "H@Sh1CoR3!",
            AadAdmin = new Azure.Synapse.Inputs.WorkspaceAadAdminArgs
            {
                Login = "AzureAD Admin",
                ObjectId = "00000000-0000-0000-0000-000000000000",
                TenantId = "00000000-0000-0000-0000-000000000000",
            },
            Identity = new Azure.Synapse.Inputs.WorkspaceIdentityArgs
            {
                Type = "SystemAssigned",
            },
            Tags = 
            {
                { "Env", "production" },
            },
        });
    
        var exampleSqlPool = new Azure.Synapse.SqlPool("example", new()
        {
            Name = "examplesqlpool",
            SynapseWorkspaceId = exampleWorkspace.Id,
            SkuName = "DW100c",
            CreateMode = "Default",
        });
    
        var auditLogs = new Azure.Storage.Account("audit_logs", new()
        {
            Name = "examplesa",
            ResourceGroupName = example.Name,
            Location = example.Location,
            AccountTier = "Standard",
            AccountReplicationType = "LRS",
        });
    
        var exampleSqlPoolSecurityAlertPolicy = new Azure.Synapse.SqlPoolSecurityAlertPolicy("example", new()
        {
            SqlPoolId = exampleSqlPool.Id,
            PolicyState = "Enabled",
            StorageEndpoint = auditLogs.PrimaryBlobEndpoint,
            StorageAccountAccessKey = auditLogs.PrimaryAccessKey,
            DisabledAlerts = new[]
            {
                "Sql_Injection",
                "Data_Exfiltration",
            },
            RetentionDays = 20,
        });
    
        var exampleSqlPoolVulnerabilityAssessment = new Azure.Synapse.SqlPoolVulnerabilityAssessment("example", new()
        {
            SqlPoolSecurityAlertPolicyId = exampleSqlPoolSecurityAlertPolicy.Id,
            StorageContainerPath = Output.Tuple(exampleAccount.PrimaryBlobEndpoint, exampleContainer.Name).Apply(values =>
            {
                var primaryBlobEndpoint = values.Item1;
                var name = values.Item2;
                return $"{primaryBlobEndpoint}{name}/";
            }),
            StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,
            RecurringScans = new Azure.Synapse.Inputs.SqlPoolVulnerabilityAssessmentRecurringScansArgs
            {
                Enabled = true,
                EmailSubscriptionAdminsEnabled = true,
                Emails = new[]
                {
                    "email@example1.com",
                    "email@example2.com",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.azure.core.ResourceGroup;
    import com.pulumi.azure.core.ResourceGroupArgs;
    import com.pulumi.azure.storage.Account;
    import com.pulumi.azure.storage.AccountArgs;
    import com.pulumi.azure.storage.Container;
    import com.pulumi.azure.storage.ContainerArgs;
    import com.pulumi.azure.storage.DataLakeGen2Filesystem;
    import com.pulumi.azure.storage.DataLakeGen2FilesystemArgs;
    import com.pulumi.azure.synapse.Workspace;
    import com.pulumi.azure.synapse.WorkspaceArgs;
    import com.pulumi.azure.synapse.inputs.WorkspaceAadAdminArgs;
    import com.pulumi.azure.synapse.inputs.WorkspaceIdentityArgs;
    import com.pulumi.azure.synapse.SqlPool;
    import com.pulumi.azure.synapse.SqlPoolArgs;
    import com.pulumi.azure.synapse.SqlPoolSecurityAlertPolicy;
    import com.pulumi.azure.synapse.SqlPoolSecurityAlertPolicyArgs;
    import com.pulumi.azure.synapse.SqlPoolVulnerabilityAssessment;
    import com.pulumi.azure.synapse.SqlPoolVulnerabilityAssessmentArgs;
    import com.pulumi.azure.synapse.inputs.SqlPoolVulnerabilityAssessmentRecurringScansArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new ResourceGroup("example", ResourceGroupArgs.builder()        
                .name("example-resources")
                .location("West Europe")
                .build());
    
            var exampleAccount = new Account("exampleAccount", AccountArgs.builder()        
                .name("examplestorageacc")
                .resourceGroupName(example.name())
                .location(example.location())
                .accountTier("Standard")
                .accountReplicationType("LRS")
                .accountKind("StorageV2")
                .isHnsEnabled("true")
                .build());
    
            var exampleContainer = new Container("exampleContainer", ContainerArgs.builder()        
                .name("example")
                .storageAccountName(exampleAccount.name())
                .build());
    
            var exampleDataLakeGen2Filesystem = new DataLakeGen2Filesystem("exampleDataLakeGen2Filesystem", DataLakeGen2FilesystemArgs.builder()        
                .name("example")
                .storageAccountId(exampleAccount.id())
                .build());
    
            var exampleWorkspace = new Workspace("exampleWorkspace", WorkspaceArgs.builder()        
                .name("example")
                .resourceGroupName(example.name())
                .location(example.location())
                .storageDataLakeGen2FilesystemId(exampleDataLakeGen2Filesystem.id())
                .sqlAdministratorLogin("sqladminuser")
                .sqlAdministratorLoginPassword("H@Sh1CoR3!")
                .aadAdmin(WorkspaceAadAdminArgs.builder()
                    .login("AzureAD Admin")
                    .objectId("00000000-0000-0000-0000-000000000000")
                    .tenantId("00000000-0000-0000-0000-000000000000")
                    .build())
                .identity(WorkspaceIdentityArgs.builder()
                    .type("SystemAssigned")
                    .build())
                .tags(Map.of("Env", "production"))
                .build());
    
            var exampleSqlPool = new SqlPool("exampleSqlPool", SqlPoolArgs.builder()        
                .name("examplesqlpool")
                .synapseWorkspaceId(exampleWorkspace.id())
                .skuName("DW100c")
                .createMode("Default")
                .build());
    
            var auditLogs = new Account("auditLogs", AccountArgs.builder()        
                .name("examplesa")
                .resourceGroupName(example.name())
                .location(example.location())
                .accountTier("Standard")
                .accountReplicationType("LRS")
                .build());
    
            var exampleSqlPoolSecurityAlertPolicy = new SqlPoolSecurityAlertPolicy("exampleSqlPoolSecurityAlertPolicy", SqlPoolSecurityAlertPolicyArgs.builder()        
                .sqlPoolId(exampleSqlPool.id())
                .policyState("Enabled")
                .storageEndpoint(auditLogs.primaryBlobEndpoint())
                .storageAccountAccessKey(auditLogs.primaryAccessKey())
                .disabledAlerts(            
                    "Sql_Injection",
                    "Data_Exfiltration")
                .retentionDays(20)
                .build());
    
            var exampleSqlPoolVulnerabilityAssessment = new SqlPoolVulnerabilityAssessment("exampleSqlPoolVulnerabilityAssessment", SqlPoolVulnerabilityAssessmentArgs.builder()        
                .sqlPoolSecurityAlertPolicyId(exampleSqlPoolSecurityAlertPolicy.id())
                .storageContainerPath(Output.tuple(exampleAccount.primaryBlobEndpoint(), exampleContainer.name()).applyValue(values -> {
                    var primaryBlobEndpoint = values.t1;
                    var name = values.t2;
                    return String.format("%s%s/", primaryBlobEndpoint,name);
                }))
                .storageAccountAccessKey(exampleAccount.primaryAccessKey())
                .recurringScans(SqlPoolVulnerabilityAssessmentRecurringScansArgs.builder()
                    .enabled(true)
                    .emailSubscriptionAdminsEnabled(true)
                    .emails(                
                        "email@example1.com",
                        "email@example2.com")
                    .build())
                .build());
    
        }
    }
    
    resources:
      example:
        type: azure:core:ResourceGroup
        properties:
          name: example-resources
          location: West Europe
      exampleAccount:
        type: azure:storage:Account
        name: example
        properties:
          name: examplestorageacc
          resourceGroupName: ${example.name}
          location: ${example.location}
          accountTier: Standard
          accountReplicationType: LRS
          accountKind: StorageV2
          isHnsEnabled: 'true'
      exampleContainer:
        type: azure:storage:Container
        name: example
        properties:
          name: example
          storageAccountName: ${exampleAccount.name}
      exampleDataLakeGen2Filesystem:
        type: azure:storage:DataLakeGen2Filesystem
        name: example
        properties:
          name: example
          storageAccountId: ${exampleAccount.id}
      exampleWorkspace:
        type: azure:synapse:Workspace
        name: example
        properties:
          name: example
          resourceGroupName: ${example.name}
          location: ${example.location}
          storageDataLakeGen2FilesystemId: ${exampleDataLakeGen2Filesystem.id}
          sqlAdministratorLogin: sqladminuser
          sqlAdministratorLoginPassword: H@Sh1CoR3!
          aadAdmin:
            login: AzureAD Admin
            objectId: 00000000-0000-0000-0000-000000000000
            tenantId: 00000000-0000-0000-0000-000000000000
          identity:
            type: SystemAssigned
          tags:
            Env: production
      exampleSqlPool:
        type: azure:synapse:SqlPool
        name: example
        properties:
          name: examplesqlpool
          synapseWorkspaceId: ${exampleWorkspace.id}
          skuName: DW100c
          createMode: Default
      auditLogs:
        type: azure:storage:Account
        name: audit_logs
        properties:
          name: examplesa
          resourceGroupName: ${example.name}
          location: ${example.location}
          accountTier: Standard
          accountReplicationType: LRS
      exampleSqlPoolSecurityAlertPolicy:
        type: azure:synapse:SqlPoolSecurityAlertPolicy
        name: example
        properties:
          sqlPoolId: ${exampleSqlPool.id}
          policyState: Enabled
          storageEndpoint: ${auditLogs.primaryBlobEndpoint}
          storageAccountAccessKey: ${auditLogs.primaryAccessKey}
          disabledAlerts:
            - Sql_Injection
            - Data_Exfiltration
          retentionDays: 20
      exampleSqlPoolVulnerabilityAssessment:
        type: azure:synapse:SqlPoolVulnerabilityAssessment
        name: example
        properties:
          sqlPoolSecurityAlertPolicyId: ${exampleSqlPoolSecurityAlertPolicy.id}
          storageContainerPath: ${exampleAccount.primaryBlobEndpoint}${exampleContainer.name}/
          storageAccountAccessKey: ${exampleAccount.primaryAccessKey}
          recurringScans:
            enabled: true
            emailSubscriptionAdminsEnabled: true
            emails:
              - email@example1.com
              - email@example2.com
    

    Create SqlPoolVulnerabilityAssessment Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SqlPoolVulnerabilityAssessment(name: string, args: SqlPoolVulnerabilityAssessmentArgs, opts?: CustomResourceOptions);
    @overload
    def SqlPoolVulnerabilityAssessment(resource_name: str,
                                       args: SqlPoolVulnerabilityAssessmentArgs,
                                       opts: Optional[ResourceOptions] = None)
    
    @overload
    def SqlPoolVulnerabilityAssessment(resource_name: str,
                                       opts: Optional[ResourceOptions] = None,
                                       sql_pool_security_alert_policy_id: Optional[str] = None,
                                       storage_container_path: Optional[str] = None,
                                       recurring_scans: Optional[SqlPoolVulnerabilityAssessmentRecurringScansArgs] = None,
                                       storage_account_access_key: Optional[str] = None,
                                       storage_container_sas_key: Optional[str] = None)
    func NewSqlPoolVulnerabilityAssessment(ctx *Context, name string, args SqlPoolVulnerabilityAssessmentArgs, opts ...ResourceOption) (*SqlPoolVulnerabilityAssessment, error)
    public SqlPoolVulnerabilityAssessment(string name, SqlPoolVulnerabilityAssessmentArgs args, CustomResourceOptions? opts = null)
    public SqlPoolVulnerabilityAssessment(String name, SqlPoolVulnerabilityAssessmentArgs args)
    public SqlPoolVulnerabilityAssessment(String name, SqlPoolVulnerabilityAssessmentArgs args, CustomResourceOptions options)
    
    type: azure:synapse:SqlPoolVulnerabilityAssessment
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SqlPoolVulnerabilityAssessmentArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SqlPoolVulnerabilityAssessmentArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SqlPoolVulnerabilityAssessmentArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SqlPoolVulnerabilityAssessmentArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SqlPoolVulnerabilityAssessmentArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var sqlPoolVulnerabilityAssessmentResource = new Azure.Synapse.SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource", new()
    {
        SqlPoolSecurityAlertPolicyId = "string",
        StorageContainerPath = "string",
        RecurringScans = new Azure.Synapse.Inputs.SqlPoolVulnerabilityAssessmentRecurringScansArgs
        {
            EmailSubscriptionAdminsEnabled = false,
            Emails = new[]
            {
                "string",
            },
            Enabled = false,
        },
        StorageAccountAccessKey = "string",
        StorageContainerSasKey = "string",
    });
    
    example, err := synapse.NewSqlPoolVulnerabilityAssessment(ctx, "sqlPoolVulnerabilityAssessmentResource", &synapse.SqlPoolVulnerabilityAssessmentArgs{
    	SqlPoolSecurityAlertPolicyId: pulumi.String("string"),
    	StorageContainerPath:         pulumi.String("string"),
    	RecurringScans: &synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs{
    		EmailSubscriptionAdminsEnabled: pulumi.Bool(false),
    		Emails: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Enabled: pulumi.Bool(false),
    	},
    	StorageAccountAccessKey: pulumi.String("string"),
    	StorageContainerSasKey:  pulumi.String("string"),
    })
    
    var sqlPoolVulnerabilityAssessmentResource = new SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource", SqlPoolVulnerabilityAssessmentArgs.builder()        
        .sqlPoolSecurityAlertPolicyId("string")
        .storageContainerPath("string")
        .recurringScans(SqlPoolVulnerabilityAssessmentRecurringScansArgs.builder()
            .emailSubscriptionAdminsEnabled(false)
            .emails("string")
            .enabled(false)
            .build())
        .storageAccountAccessKey("string")
        .storageContainerSasKey("string")
        .build());
    
    sql_pool_vulnerability_assessment_resource = azure.synapse.SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource",
        sql_pool_security_alert_policy_id="string",
        storage_container_path="string",
        recurring_scans=azure.synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs(
            email_subscription_admins_enabled=False,
            emails=["string"],
            enabled=False,
        ),
        storage_account_access_key="string",
        storage_container_sas_key="string")
    
    const sqlPoolVulnerabilityAssessmentResource = new azure.synapse.SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource", {
        sqlPoolSecurityAlertPolicyId: "string",
        storageContainerPath: "string",
        recurringScans: {
            emailSubscriptionAdminsEnabled: false,
            emails: ["string"],
            enabled: false,
        },
        storageAccountAccessKey: "string",
        storageContainerSasKey: "string",
    });
    
    type: azure:synapse:SqlPoolVulnerabilityAssessment
    properties:
        recurringScans:
            emailSubscriptionAdminsEnabled: false
            emails:
                - string
            enabled: false
        sqlPoolSecurityAlertPolicyId: string
        storageAccountAccessKey: string
        storageContainerPath: string
        storageContainerSasKey: string
    

    SqlPoolVulnerabilityAssessment Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The SqlPoolVulnerabilityAssessment resource accepts the following input properties:

    SqlPoolSecurityAlertPolicyId string
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    StorageContainerPath string
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    RecurringScans SqlPoolVulnerabilityAssessmentRecurringScans
    The recurring scans settings. The recurring_scans block supports fields documented below.
    StorageAccountAccessKey string
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    StorageContainerSasKey string
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    SqlPoolSecurityAlertPolicyId string
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    StorageContainerPath string
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    RecurringScans SqlPoolVulnerabilityAssessmentRecurringScansArgs
    The recurring scans settings. The recurring_scans block supports fields documented below.
    StorageAccountAccessKey string
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    StorageContainerSasKey string
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    sqlPoolSecurityAlertPolicyId String
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storageContainerPath String
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    recurringScans SqlPoolVulnerabilityAssessmentRecurringScans
    The recurring scans settings. The recurring_scans block supports fields documented below.
    storageAccountAccessKey String
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storageContainerSasKey String
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    sqlPoolSecurityAlertPolicyId string
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storageContainerPath string
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    recurringScans SqlPoolVulnerabilityAssessmentRecurringScans
    The recurring scans settings. The recurring_scans block supports fields documented below.
    storageAccountAccessKey string
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storageContainerSasKey string
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    sql_pool_security_alert_policy_id str
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storage_container_path str
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    recurring_scans SqlPoolVulnerabilityAssessmentRecurringScansArgs
    The recurring scans settings. The recurring_scans block supports fields documented below.
    storage_account_access_key str
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storage_container_sas_key str
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    sqlPoolSecurityAlertPolicyId String
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storageContainerPath String
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    recurringScans Property Map
    The recurring scans settings. The recurring_scans block supports fields documented below.
    storageAccountAccessKey String
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storageContainerSasKey String
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SqlPoolVulnerabilityAssessment resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing SqlPoolVulnerabilityAssessment Resource

    Get an existing SqlPoolVulnerabilityAssessment resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SqlPoolVulnerabilityAssessmentState, opts?: CustomResourceOptions): SqlPoolVulnerabilityAssessment
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            recurring_scans: Optional[SqlPoolVulnerabilityAssessmentRecurringScansArgs] = None,
            sql_pool_security_alert_policy_id: Optional[str] = None,
            storage_account_access_key: Optional[str] = None,
            storage_container_path: Optional[str] = None,
            storage_container_sas_key: Optional[str] = None) -> SqlPoolVulnerabilityAssessment
    func GetSqlPoolVulnerabilityAssessment(ctx *Context, name string, id IDInput, state *SqlPoolVulnerabilityAssessmentState, opts ...ResourceOption) (*SqlPoolVulnerabilityAssessment, error)
    public static SqlPoolVulnerabilityAssessment Get(string name, Input<string> id, SqlPoolVulnerabilityAssessmentState? state, CustomResourceOptions? opts = null)
    public static SqlPoolVulnerabilityAssessment get(String name, Output<String> id, SqlPoolVulnerabilityAssessmentState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    RecurringScans SqlPoolVulnerabilityAssessmentRecurringScans
    The recurring scans settings. The recurring_scans block supports fields documented below.
    SqlPoolSecurityAlertPolicyId string
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    StorageAccountAccessKey string
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    StorageContainerPath string
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    StorageContainerSasKey string
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    RecurringScans SqlPoolVulnerabilityAssessmentRecurringScansArgs
    The recurring scans settings. The recurring_scans block supports fields documented below.
    SqlPoolSecurityAlertPolicyId string
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    StorageAccountAccessKey string
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    StorageContainerPath string
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    StorageContainerSasKey string
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    recurringScans SqlPoolVulnerabilityAssessmentRecurringScans
    The recurring scans settings. The recurring_scans block supports fields documented below.
    sqlPoolSecurityAlertPolicyId String
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storageAccountAccessKey String
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storageContainerPath String
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    storageContainerSasKey String
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    recurringScans SqlPoolVulnerabilityAssessmentRecurringScans
    The recurring scans settings. The recurring_scans block supports fields documented below.
    sqlPoolSecurityAlertPolicyId string
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storageAccountAccessKey string
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storageContainerPath string
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    storageContainerSasKey string
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    recurring_scans SqlPoolVulnerabilityAssessmentRecurringScansArgs
    The recurring scans settings. The recurring_scans block supports fields documented below.
    sql_pool_security_alert_policy_id str
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storage_account_access_key str
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storage_container_path str
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    storage_container_sas_key str
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.
    recurringScans Property Map
    The recurring scans settings. The recurring_scans block supports fields documented below.
    sqlPoolSecurityAlertPolicyId String
    The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
    storageAccountAccessKey String
    Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required.
    storageContainerPath String
    A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/).
    storageContainerSasKey String
    A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required.

    Supporting Types

    SqlPoolVulnerabilityAssessmentRecurringScans, SqlPoolVulnerabilityAssessmentRecurringScansArgs

    EmailSubscriptionAdminsEnabled bool
    Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
    Emails List<string>
    Specifies an array of email addresses to which the scan notification is sent.
    Enabled bool
    Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.
    EmailSubscriptionAdminsEnabled bool
    Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
    Emails []string
    Specifies an array of email addresses to which the scan notification is sent.
    Enabled bool
    Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.
    emailSubscriptionAdminsEnabled Boolean
    Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
    emails List<String>
    Specifies an array of email addresses to which the scan notification is sent.
    enabled Boolean
    Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.
    emailSubscriptionAdminsEnabled boolean
    Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
    emails string[]
    Specifies an array of email addresses to which the scan notification is sent.
    enabled boolean
    Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.
    email_subscription_admins_enabled bool
    Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
    emails Sequence[str]
    Specifies an array of email addresses to which the scan notification is sent.
    enabled bool
    Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.
    emailSubscriptionAdminsEnabled Boolean
    Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to false.
    emails List<String>
    Specifies an array of email addresses to which the scan notification is sent.
    enabled Boolean
    Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to false.

    Import

    Synapse SQL Pool Vulnerability Assessment can be imported using the resource id, e.g.

    $ pulumi import azure:synapse/sqlPoolVulnerabilityAssessment:SqlPoolVulnerabilityAssessment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1/sqlPools/sqlPool1/vulnerabilityAssessments/default
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Azure Classic pulumi/pulumi-azure
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the azurerm Terraform Provider.
    azure logo

    We recommend using Azure Native.

    Azure Classic v5.73.0 published on Monday, Apr 22, 2024 by Pulumi