We recommend using Azure Native.
published on Monday, Mar 9, 2026 by Pulumi
We recommend using Azure Native.
published on Monday, Mar 9, 2026 by Pulumi
Manages the Vulnerability Assessment for a Synapse SQL Pool.
Example Usage
using Pulumi;
using Azure = Pulumi.Azure;
class MyStack : Stack
{
public MyStack()
{
var exampleResourceGroup = new Azure.Core.ResourceGroup("exampleResourceGroup", new Azure.Core.ResourceGroupArgs
{
Location = "West Europe",
});
var exampleAccount = new Azure.Storage.Account("exampleAccount", new Azure.Storage.AccountArgs
{
ResourceGroupName = exampleResourceGroup.Name,
Location = exampleResourceGroup.Location,
AccountTier = "Standard",
AccountReplicationType = "LRS",
AccountKind = "StorageV2",
IsHnsEnabled = true,
});
var exampleDataLakeGen2Filesystem = new Azure.Storage.DataLakeGen2Filesystem("exampleDataLakeGen2Filesystem", new Azure.Storage.DataLakeGen2FilesystemArgs
{
StorageAccountId = exampleAccount.Id,
});
var exampleWorkspace = new Azure.Synapse.Workspace("exampleWorkspace", new Azure.Synapse.WorkspaceArgs
{
ResourceGroupName = exampleResourceGroup.Name,
Location = exampleResourceGroup.Location,
StorageDataLakeGen2FilesystemId = exampleDataLakeGen2Filesystem.Id,
SqlAdministratorLogin = "sqladminuser",
SqlAdministratorLoginPassword = "H@Sh1CoR3!",
AadAdmin = new Azure.Synapse.Inputs.WorkspaceAadAdminArgs
{
Login = "AzureAD Admin",
ObjectId = "00000000-0000-0000-0000-000000000000",
TenantId = "00000000-0000-0000-0000-000000000000",
},
Tags =
{
{ "Env", "production" },
},
});
var exampleSqlPool = new Azure.Synapse.SqlPool("exampleSqlPool", new Azure.Synapse.SqlPoolArgs
{
SynapseWorkspaceId = exampleWorkspace.Id,
SkuName = "DW100c",
CreateMode = "Default",
});
var auditLogs = new Azure.Storage.Account("auditLogs", new Azure.Storage.AccountArgs
{
ResourceGroupName = exampleResourceGroup.Name,
Location = exampleResourceGroup.Location,
AccountTier = "Standard",
AccountReplicationType = "LRS",
});
var exampleSqlPoolSecurityAlertPolicy = new Azure.Synapse.SqlPoolSecurityAlertPolicy("exampleSqlPoolSecurityAlertPolicy", new Azure.Synapse.SqlPoolSecurityAlertPolicyArgs
{
SqlPoolId = exampleSqlPool.Id,
PolicyState = "Enabled",
StorageEndpoint = auditLogs.PrimaryBlobEndpoint,
StorageAccountAccessKey = auditLogs.PrimaryAccessKey,
DisabledAlerts =
{
"Sql_Injection",
"Data_Exfiltration",
},
RetentionDays = 20,
});
var exampleSqlPoolVulnerabilityAssessment = new Azure.Synapse.SqlPoolVulnerabilityAssessment("exampleSqlPoolVulnerabilityAssessment", new Azure.Synapse.SqlPoolVulnerabilityAssessmentArgs
{
SqlPoolSecurityAlertPolicyId = exampleSqlPoolSecurityAlertPolicy.Id,
StorageContainerPath = exampleAccount.PrimaryBlobEndpoint.Apply(primaryBlobEndpoint => $"{primaryBlobEndpoint}{azurerm_storage_container.Example.Name}/"),
StorageAccountAccessKey = exampleAccount.PrimaryAccessKey,
RecurringScans = new Azure.Synapse.Inputs.SqlPoolVulnerabilityAssessmentRecurringScansArgs
{
Enabled = true,
EmailSubscriptionAdminsEnabled = true,
Emails =
{
"email@example1.com",
"email@example2.com",
},
},
});
}
}
package main
import (
"fmt"
"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/core"
"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/storage"
"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/synapse"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
exampleResourceGroup, err := core.NewResourceGroup(ctx, "exampleResourceGroup", &core.ResourceGroupArgs{
Location: pulumi.String("West Europe"),
})
if err != nil {
return err
}
exampleAccount, err := storage.NewAccount(ctx, "exampleAccount", &storage.AccountArgs{
ResourceGroupName: exampleResourceGroup.Name,
Location: exampleResourceGroup.Location,
AccountTier: pulumi.String("Standard"),
AccountReplicationType: pulumi.String("LRS"),
AccountKind: pulumi.String("StorageV2"),
IsHnsEnabled: pulumi.Bool(true),
})
if err != nil {
return err
}
exampleDataLakeGen2Filesystem, err := storage.NewDataLakeGen2Filesystem(ctx, "exampleDataLakeGen2Filesystem", &storage.DataLakeGen2FilesystemArgs{
StorageAccountId: exampleAccount.ID(),
})
if err != nil {
return err
}
exampleWorkspace, err := synapse.NewWorkspace(ctx, "exampleWorkspace", &synapse.WorkspaceArgs{
ResourceGroupName: exampleResourceGroup.Name,
Location: exampleResourceGroup.Location,
StorageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.ID(),
SqlAdministratorLogin: pulumi.String("sqladminuser"),
SqlAdministratorLoginPassword: pulumi.String("H@Sh1CoR3!"),
AadAdmin: &synapse.WorkspaceAadAdminArgs{
Login: pulumi.String("AzureAD Admin"),
ObjectId: pulumi.String("00000000-0000-0000-0000-000000000000"),
TenantId: pulumi.String("00000000-0000-0000-0000-000000000000"),
},
Tags: pulumi.StringMap{
"Env": pulumi.String("production"),
},
})
if err != nil {
return err
}
exampleSqlPool, err := synapse.NewSqlPool(ctx, "exampleSqlPool", &synapse.SqlPoolArgs{
SynapseWorkspaceId: exampleWorkspace.ID(),
SkuName: pulumi.String("DW100c"),
CreateMode: pulumi.String("Default"),
})
if err != nil {
return err
}
auditLogs, err := storage.NewAccount(ctx, "auditLogs", &storage.AccountArgs{
ResourceGroupName: exampleResourceGroup.Name,
Location: exampleResourceGroup.Location,
AccountTier: pulumi.String("Standard"),
AccountReplicationType: pulumi.String("LRS"),
})
if err != nil {
return err
}
exampleSqlPoolSecurityAlertPolicy, err := synapse.NewSqlPoolSecurityAlertPolicy(ctx, "exampleSqlPoolSecurityAlertPolicy", &synapse.SqlPoolSecurityAlertPolicyArgs{
SqlPoolId: exampleSqlPool.ID(),
PolicyState: pulumi.String("Enabled"),
StorageEndpoint: auditLogs.PrimaryBlobEndpoint,
StorageAccountAccessKey: auditLogs.PrimaryAccessKey,
DisabledAlerts: pulumi.StringArray{
pulumi.String("Sql_Injection"),
pulumi.String("Data_Exfiltration"),
},
RetentionDays: pulumi.Int(20),
})
if err != nil {
return err
}
_, err = synapse.NewSqlPoolVulnerabilityAssessment(ctx, "exampleSqlPoolVulnerabilityAssessment", &synapse.SqlPoolVulnerabilityAssessmentArgs{
SqlPoolSecurityAlertPolicyId: exampleSqlPoolSecurityAlertPolicy.ID(),
StorageContainerPath: exampleAccount.PrimaryBlobEndpoint.ApplyT(func(primaryBlobEndpoint string) (string, error) {
return fmt.Sprintf("%v%v%v", primaryBlobEndpoint, azurerm_storage_container.Example.Name, "/"), nil
}).(pulumi.StringOutput),
StorageAccountAccessKey: exampleAccount.PrimaryAccessKey,
RecurringScans: &synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs{
Enabled: pulumi.Bool(true),
EmailSubscriptionAdminsEnabled: pulumi.Bool(true),
Emails: pulumi.StringArray{
pulumi.String("email@example1.com"),
pulumi.String("email@example2.com"),
},
},
})
if err != nil {
return err
}
return nil
})
}
Example coming soon!
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const exampleResourceGroup = new azure.core.ResourceGroup("exampleResourceGroup", {location: "West Europe"});
const exampleAccount = new azure.storage.Account("exampleAccount", {
resourceGroupName: exampleResourceGroup.name,
location: exampleResourceGroup.location,
accountTier: "Standard",
accountReplicationType: "LRS",
accountKind: "StorageV2",
isHnsEnabled: "true",
});
const exampleDataLakeGen2Filesystem = new azure.storage.DataLakeGen2Filesystem("exampleDataLakeGen2Filesystem", {storageAccountId: exampleAccount.id});
const exampleWorkspace = new azure.synapse.Workspace("exampleWorkspace", {
resourceGroupName: exampleResourceGroup.name,
location: exampleResourceGroup.location,
storageDataLakeGen2FilesystemId: exampleDataLakeGen2Filesystem.id,
sqlAdministratorLogin: "sqladminuser",
sqlAdministratorLoginPassword: "H@Sh1CoR3!",
aadAdmin: {
login: "AzureAD Admin",
objectId: "00000000-0000-0000-0000-000000000000",
tenantId: "00000000-0000-0000-0000-000000000000",
},
tags: {
Env: "production",
},
});
const exampleSqlPool = new azure.synapse.SqlPool("exampleSqlPool", {
synapseWorkspaceId: exampleWorkspace.id,
skuName: "DW100c",
createMode: "Default",
});
const auditLogs = new azure.storage.Account("auditLogs", {
resourceGroupName: exampleResourceGroup.name,
location: exampleResourceGroup.location,
accountTier: "Standard",
accountReplicationType: "LRS",
});
const exampleSqlPoolSecurityAlertPolicy = new azure.synapse.SqlPoolSecurityAlertPolicy("exampleSqlPoolSecurityAlertPolicy", {
sqlPoolId: exampleSqlPool.id,
policyState: "Enabled",
storageEndpoint: auditLogs.primaryBlobEndpoint,
storageAccountAccessKey: auditLogs.primaryAccessKey,
disabledAlerts: [
"Sql_Injection",
"Data_Exfiltration",
],
retentionDays: 20,
});
const exampleSqlPoolVulnerabilityAssessment = new azure.synapse.SqlPoolVulnerabilityAssessment("exampleSqlPoolVulnerabilityAssessment", {
sqlPoolSecurityAlertPolicyId: exampleSqlPoolSecurityAlertPolicy.id,
storageContainerPath: pulumi.interpolate`${exampleAccount.primaryBlobEndpoint}${azurerm_storage_container.example.name}/`,
storageAccountAccessKey: exampleAccount.primaryAccessKey,
recurringScans: {
enabled: true,
emailSubscriptionAdminsEnabled: true,
emails: [
"email@example1.com",
"email@example2.com",
],
},
});
import pulumi
import pulumi_azure as azure
example_resource_group = azure.core.ResourceGroup("exampleResourceGroup", location="West Europe")
example_account = azure.storage.Account("exampleAccount",
resource_group_name=example_resource_group.name,
location=example_resource_group.location,
account_tier="Standard",
account_replication_type="LRS",
account_kind="StorageV2",
is_hns_enabled=True)
example_data_lake_gen2_filesystem = azure.storage.DataLakeGen2Filesystem("exampleDataLakeGen2Filesystem", storage_account_id=example_account.id)
example_workspace = azure.synapse.Workspace("exampleWorkspace",
resource_group_name=example_resource_group.name,
location=example_resource_group.location,
storage_data_lake_gen2_filesystem_id=example_data_lake_gen2_filesystem.id,
sql_administrator_login="sqladminuser",
sql_administrator_login_password="H@Sh1CoR3!",
aad_admin=azure.synapse.WorkspaceAadAdminArgs(
login="AzureAD Admin",
object_id="00000000-0000-0000-0000-000000000000",
tenant_id="00000000-0000-0000-0000-000000000000",
),
tags={
"Env": "production",
})
example_sql_pool = azure.synapse.SqlPool("exampleSqlPool",
synapse_workspace_id=example_workspace.id,
sku_name="DW100c",
create_mode="Default")
audit_logs = azure.storage.Account("auditLogs",
resource_group_name=example_resource_group.name,
location=example_resource_group.location,
account_tier="Standard",
account_replication_type="LRS")
example_sql_pool_security_alert_policy = azure.synapse.SqlPoolSecurityAlertPolicy("exampleSqlPoolSecurityAlertPolicy",
sql_pool_id=example_sql_pool.id,
policy_state="Enabled",
storage_endpoint=audit_logs.primary_blob_endpoint,
storage_account_access_key=audit_logs.primary_access_key,
disabled_alerts=[
"Sql_Injection",
"Data_Exfiltration",
],
retention_days=20)
example_sql_pool_vulnerability_assessment = azure.synapse.SqlPoolVulnerabilityAssessment("exampleSqlPoolVulnerabilityAssessment",
sql_pool_security_alert_policy_id=example_sql_pool_security_alert_policy.id,
storage_container_path=example_account.primary_blob_endpoint.apply(lambda primary_blob_endpoint: f"{primary_blob_endpoint}{azurerm_storage_container['example']['name']}/"),
storage_account_access_key=example_account.primary_access_key,
recurring_scans=azure.synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs(
enabled=True,
email_subscription_admins_enabled=True,
emails=[
"email@example1.com",
"email@example2.com",
],
))
Example coming soon!
Create SqlPoolVulnerabilityAssessment Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SqlPoolVulnerabilityAssessment(name: string, args: SqlPoolVulnerabilityAssessmentArgs, opts?: CustomResourceOptions);@overload
def SqlPoolVulnerabilityAssessment(resource_name: str,
args: SqlPoolVulnerabilityAssessmentArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SqlPoolVulnerabilityAssessment(resource_name: str,
opts: Optional[ResourceOptions] = None,
sql_pool_security_alert_policy_id: Optional[str] = None,
storage_container_path: Optional[str] = None,
recurring_scans: Optional[SqlPoolVulnerabilityAssessmentRecurringScansArgs] = None,
storage_account_access_key: Optional[str] = None,
storage_container_sas_key: Optional[str] = None)func NewSqlPoolVulnerabilityAssessment(ctx *Context, name string, args SqlPoolVulnerabilityAssessmentArgs, opts ...ResourceOption) (*SqlPoolVulnerabilityAssessment, error)public SqlPoolVulnerabilityAssessment(string name, SqlPoolVulnerabilityAssessmentArgs args, CustomResourceOptions? opts = null)
public SqlPoolVulnerabilityAssessment(String name, SqlPoolVulnerabilityAssessmentArgs args)
public SqlPoolVulnerabilityAssessment(String name, SqlPoolVulnerabilityAssessmentArgs args, CustomResourceOptions options)
type: azure:synapse:SqlPoolVulnerabilityAssessment
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SqlPoolVulnerabilityAssessmentArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SqlPoolVulnerabilityAssessmentArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SqlPoolVulnerabilityAssessmentArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SqlPoolVulnerabilityAssessmentArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SqlPoolVulnerabilityAssessmentArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var sqlPoolVulnerabilityAssessmentResource = new Azure.Synapse.SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource", new()
{
SqlPoolSecurityAlertPolicyId = "string",
StorageContainerPath = "string",
RecurringScans = new Azure.Synapse.Inputs.SqlPoolVulnerabilityAssessmentRecurringScansArgs
{
EmailSubscriptionAdminsEnabled = false,
Emails = new[]
{
"string",
},
Enabled = false,
},
StorageAccountAccessKey = "string",
StorageContainerSasKey = "string",
});
example, err := synapse.NewSqlPoolVulnerabilityAssessment(ctx, "sqlPoolVulnerabilityAssessmentResource", &synapse.SqlPoolVulnerabilityAssessmentArgs{
SqlPoolSecurityAlertPolicyId: pulumi.String("string"),
StorageContainerPath: pulumi.String("string"),
RecurringScans: &synapse.SqlPoolVulnerabilityAssessmentRecurringScansArgs{
EmailSubscriptionAdminsEnabled: pulumi.Bool(false),
Emails: pulumi.StringArray{
pulumi.String("string"),
},
Enabled: pulumi.Bool(false),
},
StorageAccountAccessKey: pulumi.String("string"),
StorageContainerSasKey: pulumi.String("string"),
})
var sqlPoolVulnerabilityAssessmentResource = new SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource", SqlPoolVulnerabilityAssessmentArgs.builder()
.sqlPoolSecurityAlertPolicyId("string")
.storageContainerPath("string")
.recurringScans(SqlPoolVulnerabilityAssessmentRecurringScansArgs.builder()
.emailSubscriptionAdminsEnabled(false)
.emails("string")
.enabled(false)
.build())
.storageAccountAccessKey("string")
.storageContainerSasKey("string")
.build());
sql_pool_vulnerability_assessment_resource = azure.synapse.SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource",
sql_pool_security_alert_policy_id="string",
storage_container_path="string",
recurring_scans={
"email_subscription_admins_enabled": False,
"emails": ["string"],
"enabled": False,
},
storage_account_access_key="string",
storage_container_sas_key="string")
const sqlPoolVulnerabilityAssessmentResource = new azure.synapse.SqlPoolVulnerabilityAssessment("sqlPoolVulnerabilityAssessmentResource", {
sqlPoolSecurityAlertPolicyId: "string",
storageContainerPath: "string",
recurringScans: {
emailSubscriptionAdminsEnabled: false,
emails: ["string"],
enabled: false,
},
storageAccountAccessKey: "string",
storageContainerSasKey: "string",
});
type: azure:synapse:SqlPoolVulnerabilityAssessment
properties:
recurringScans:
emailSubscriptionAdminsEnabled: false
emails:
- string
enabled: false
sqlPoolSecurityAlertPolicyId: string
storageAccountAccessKey: string
storageContainerPath: string
storageContainerSasKey: string
SqlPoolVulnerabilityAssessment Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SqlPoolVulnerabilityAssessment resource accepts the following input properties:
- Sql
Pool stringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- Storage
Container stringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- Recurring
Scans SqlPool Vulnerability Assessment Recurring Scans - The recurring scans settings. The
recurring_scansblock supports fields documented below. - Storage
Account stringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - Storage
Container stringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- Sql
Pool stringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- Storage
Container stringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- Recurring
Scans SqlPool Vulnerability Assessment Recurring Scans Args - The recurring scans settings. The
recurring_scansblock supports fields documented below. - Storage
Account stringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - Storage
Container stringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- sql
Pool StringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage
Container StringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- recurring
Scans SqlPool Vulnerability Assessment Recurring Scans - The recurring scans settings. The
recurring_scansblock supports fields documented below. - storage
Account StringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage
Container StringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- sql
Pool stringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage
Container stringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- recurring
Scans SqlPool Vulnerability Assessment Recurring Scans - The recurring scans settings. The
recurring_scansblock supports fields documented below. - storage
Account stringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage
Container stringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- sql_
pool_ strsecurity_ alert_ policy_ id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage_
container_ strpath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- recurring_
scans SqlPool Vulnerability Assessment Recurring Scans Args - The recurring scans settings. The
recurring_scansblock supports fields documented below. - storage_
account_ straccess_ key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage_
container_ strsas_ key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- sql
Pool StringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage
Container StringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- recurring
Scans Property Map - The recurring scans settings. The
recurring_scansblock supports fields documented below. - storage
Account StringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage
Container StringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
Outputs
All input properties are implicitly available as output properties. Additionally, the SqlPoolVulnerabilityAssessment resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SqlPoolVulnerabilityAssessment Resource
Get an existing SqlPoolVulnerabilityAssessment resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SqlPoolVulnerabilityAssessmentState, opts?: CustomResourceOptions): SqlPoolVulnerabilityAssessment@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
recurring_scans: Optional[SqlPoolVulnerabilityAssessmentRecurringScansArgs] = None,
sql_pool_security_alert_policy_id: Optional[str] = None,
storage_account_access_key: Optional[str] = None,
storage_container_path: Optional[str] = None,
storage_container_sas_key: Optional[str] = None) -> SqlPoolVulnerabilityAssessmentfunc GetSqlPoolVulnerabilityAssessment(ctx *Context, name string, id IDInput, state *SqlPoolVulnerabilityAssessmentState, opts ...ResourceOption) (*SqlPoolVulnerabilityAssessment, error)public static SqlPoolVulnerabilityAssessment Get(string name, Input<string> id, SqlPoolVulnerabilityAssessmentState? state, CustomResourceOptions? opts = null)public static SqlPoolVulnerabilityAssessment get(String name, Output<String> id, SqlPoolVulnerabilityAssessmentState state, CustomResourceOptions options)resources: _: type: azure:synapse:SqlPoolVulnerabilityAssessment get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Recurring
Scans SqlPool Vulnerability Assessment Recurring Scans - The recurring scans settings. The
recurring_scansblock supports fields documented below. - Sql
Pool stringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- Storage
Account stringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - Storage
Container stringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- Storage
Container stringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- Recurring
Scans SqlPool Vulnerability Assessment Recurring Scans Args - The recurring scans settings. The
recurring_scansblock supports fields documented below. - Sql
Pool stringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- Storage
Account stringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - Storage
Container stringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- Storage
Container stringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- recurring
Scans SqlPool Vulnerability Assessment Recurring Scans - The recurring scans settings. The
recurring_scansblock supports fields documented below. - sql
Pool StringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage
Account StringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage
Container StringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- storage
Container StringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- recurring
Scans SqlPool Vulnerability Assessment Recurring Scans - The recurring scans settings. The
recurring_scansblock supports fields documented below. - sql
Pool stringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage
Account stringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage
Container stringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- storage
Container stringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- recurring_
scans SqlPool Vulnerability Assessment Recurring Scans Args - The recurring scans settings. The
recurring_scansblock supports fields documented below. - sql_
pool_ strsecurity_ alert_ policy_ id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage_
account_ straccess_ key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage_
container_ strpath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- storage_
container_ strsas_ key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
- recurring
Scans Property Map - The recurring scans settings. The
recurring_scansblock supports fields documented below. - sql
Pool StringSecurity Alert Policy Id - The ID of the security alert policy of the Synapse SQL Pool. Changing this forces a new resource to be created.
- storage
Account StringAccess Key - Specifies the identifier key of the storage account for vulnerability assessment scan results. If
storage_container_sas_keyisn't specified,storage_account_access_keyis required. - storage
Container StringPath - A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/).
- storage
Container StringSas Key - A shared access signature (SAS Key) that has write access to the blob container specified in
storage_container_pathparameter. Ifstorage_account_access_keyisn't specified,storage_container_sas_keyis required.
Supporting Types
SqlPoolVulnerabilityAssessmentRecurringScans, SqlPoolVulnerabilityAssessmentRecurringScansArgs
- Email
Subscription boolAdmins Enabled - Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to
false. - Emails List<string>
- Specifies an array of e-mail addresses to which the scan notification is sent.
- Enabled bool
- Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to
false.
- Email
Subscription boolAdmins Enabled - Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to
false. - Emails []string
- Specifies an array of e-mail addresses to which the scan notification is sent.
- Enabled bool
- Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to
false.
- email
Subscription BooleanAdmins Enabled - Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to
false. - emails List<String>
- Specifies an array of e-mail addresses to which the scan notification is sent.
- enabled Boolean
- Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to
false.
- email
Subscription booleanAdmins Enabled - Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to
false. - emails string[]
- Specifies an array of e-mail addresses to which the scan notification is sent.
- enabled boolean
- Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to
false.
- email_
subscription_ booladmins_ enabled - Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to
false. - emails Sequence[str]
- Specifies an array of e-mail addresses to which the scan notification is sent.
- enabled bool
- Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to
false.
- email
Subscription BooleanAdmins Enabled - Boolean flag which specifies if the schedule scan notification will be sent to the subscription administrators. Defaults to
false. - emails List<String>
- Specifies an array of e-mail addresses to which the scan notification is sent.
- enabled Boolean
- Boolean flag which specifies if recurring scans is enabled or disabled. Defaults to
false.
Import
Synapse SQL Pool Vulnerability Assessment can be imported using the resource id, e.g.
$ pulumi import azure:synapse/sqlPoolVulnerabilityAssessment:SqlPoolVulnerabilityAssessment example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Synapse/workspaces/workspace1/sqlPools/sqlPool1/vulnerabilityAssessments/default
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Classic pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
azurermTerraform Provider.
We recommend using Azure Native.
published on Monday, Mar 9, 2026 by Pulumi
