Skip to content

Commit

Permalink
Release microsoft.sql 2020-11-01 preview API version (Azure#13332)
Browse files Browse the repository at this point in the history
* Adds base for updating Microsoft.Sql from version preview/2020-08-01-preview to version 2020-11-01-preview

* Updates readme

* Updates API version in new specs and examples

* Add updated 2020-11-01-preview versions of LongTermRetenionBackups.json and Databases.json (Azure#12146)

* add updated databases.json swagger

* update readme with new package

* v4 -> v5

* add missing chunk in readme

* add correct swaggeR

* add examples

* add correct examplese

* remove unreferenced examples

* update swagger and examples. add 2020-11 pure package

* Fix reference to 2020-08-01 reference to ElasticPools.json

* update Databases.json name

* update examples

* remove nonexistant swagger

* fixed reference capitals in readme

* update package composite and fix ref to ManagedInstances.jsON

* make backupstorageredundancy settings consistent

* add requestedBackupStorageRedundancy to properties object in example

* add LTR swagger and examples

* add LTR Policies swagger and examples

* make v5 match v4

* add updated Databses.json

* merge conflicts in LTR Policies swagger'

* take out comments in readme

* taking ImportExport.json out from 2020-11 package

* remove duplicate 2020-11 tag in readme

* modify Databases_legacy.json to exclude ImportExport-related APIs

* add servers.json for IE APIS and remove unused databases examples

* fix model & prettier errors; add missing server example

* add missing servers examples

* fix example to exclude property from server obj

* change RecommendedActions definitoins

* change tag to composite v4

* Add missing properties for api version 2020-02-02-preview of securityAlertPolicies (Azure#13117)

* Add missing properties for api version 2020-02-02-preview

* fix checks

* fix according to prettier check

* Add the change to version 2020-08-01-preview and version 2020-11-01-preview

* remove changes in package-lock

* Add new line at the end of file

* update version 2020-11-01-preview

* Update the ref to system data in serverdevopsaudit

* add missing point

* fix the validation errors (Azure#13325)

* fix the validation errors

* Delete ServerDevOpsAudit.json

* fix the validation errors

* re add ServerDevOpsAudit.json

Co-authored-by: xaliciayang <59986952+xaliciayang@users.noreply.github.com>
Co-authored-by: ayeletshpigelman <ayshpige@microsoft.com>
  • Loading branch information
3 people authored and mkarmark committed Jul 20, 2021
1 parent 55d0236 commit f37a0a5
Show file tree
Hide file tree
Showing 605 changed files with 68,602 additions and 24 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,10 @@
},
"x-ms-examples": {
"Update a database's threat detection policy with minimal parameters": {
"$ref": "./examples/DatabaseSecurityAlertCreate.json"
"$ref": "./examples/DatabaseSecurityAlertCreateMin.json"
},
"Update a database's threat detection policy with all parameters": {
"$ref": "./examples/DatabaseSecurityAlertCreateMax.json"
}
}
}
Expand Down Expand Up @@ -231,6 +234,37 @@
"modelAsString": false
}
},
"disabledAlerts": {
"description": "Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly, Data_Exfiltration, Unsafe_Action",
"type": "array",
"items": {
"type": "string"
}
},
"emailAddresses": {
"description": "Specifies an array of e-mail addresses to which the alert is sent.",
"type": "array",
"items": {
"type": "string"
}
},
"emailAccountAdmins": {
"description": "Specifies that the alert is sent to the account administrators.",
"type": "boolean"
},
"storageEndpoint": {
"description": "Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.",
"type": "string"
},
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the Threat Detection audit storage account.",
"type": "string"
},
"retentionDays": {
"format": "int32",
"description": "Specifies the number of days to keep in the Threat Detection audit logs.",
"type": "integer"
},
"creationTime": {
"format": "date-time",
"description": "Specifies the UTC creation time of the policy.",
Expand All @@ -248,6 +282,10 @@
}
],
"properties": {
"systemData": {
"readOnly": true,
"$ref": "../../../../../common-types/resource-management/v1/types.json#/definitions/systemData"
},
"properties": {
"$ref": "#/definitions/SecurityAlertsPolicyProperties",
"description": "Resource properties.",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -127,8 +127,11 @@
},
"x-ms-long-running-operation": true,
"x-ms-examples": {
"Update a server's threat detection policy with minimal parameters": {
"$ref": "./examples/ManagedServerSecurityAlertCreateMin.json"
},
"Update a server's threat detection policy with all parameters": {
"$ref": "./examples/ManagedServerSecurityAlertCreate.json"
"$ref": "./examples/ManagedServerSecurityAlertCreateMax.json"
}
}
}
Expand Down Expand Up @@ -196,6 +199,37 @@
"modelAsString": false
}
},
"disabledAlerts": {
"description": "Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly, Data_Exfiltration, Unsafe_Action",
"type": "array",
"items": {
"type": "string"
}
},
"emailAddresses": {
"description": "Specifies an array of e-mail addresses to which the alert is sent.",
"type": "array",
"items": {
"type": "string"
}
},
"emailAccountAdmins": {
"description": "Specifies that the alert is sent to the account administrators.",
"type": "boolean"
},
"storageEndpoint": {
"description": "Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.",
"type": "string"
},
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the Threat Detection audit storage account.",
"type": "string"
},
"retentionDays": {
"format": "int32",
"description": "Specifies the number of days to keep in the Threat Detection audit logs.",
"type": "integer"
},
"creationTime": {
"format": "date-time",
"description": "Specifies the UTC creation time of the policy.",
Expand All @@ -213,6 +247,10 @@
}
],
"properties": {
"systemData": {
"readOnly": true,
"$ref": "../../../../../common-types/resource-management/v1/types.json#/definitions/systemData"
},
"properties": {
"$ref": "#/definitions/SecurityAlertsPolicyProperties",
"description": "Resource properties.",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -127,8 +127,11 @@
},
"x-ms-long-running-operation": true,
"x-ms-examples": {
"Update a server's threat detection policy with all parameters": {
"$ref": "./examples/ServerSecurityAlertsCreateMax.json"
},
"Update a server's threat detection policy with minimal parameters": {
"$ref": "./examples/ServerSecurityAlertsCreate.json"
"$ref": "./examples/ServerSecurityAlertsCreateMin.json"
}
}
}
Expand Down Expand Up @@ -196,6 +199,37 @@
"modelAsString": false
}
},
"disabledAlerts": {
"description": "Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly, Data_Exfiltration, Unsafe_Action",
"type": "array",
"items": {
"type": "string"
}
},
"emailAddresses": {
"description": "Specifies an array of e-mail addresses to which the alert is sent.",
"type": "array",
"items": {
"type": "string"
}
},
"emailAccountAdmins": {
"description": "Specifies that the alert is sent to the account administrators.",
"type": "boolean"
},
"storageEndpoint": {
"description": "Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.",
"type": "string"
},
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the Threat Detection audit storage account.",
"type": "string"
},
"retentionDays": {
"format": "int32",
"description": "Specifies the number of days to keep in the Threat Detection audit logs.",
"type": "integer"
},
"creationTime": {
"format": "date-time",
"description": "Specifies the UTC creation time of the policy.",
Expand All @@ -213,6 +247,10 @@
}
],
"properties": {
"systemData": {
"readOnly": true,
"$ref": "../../../../../common-types/resource-management/v1/types.json#/definitions/systemData"
},
"properties": {
"$ref": "#/definitions/SecurityAlertsPolicyProperties",
"description": "Resource properties.",
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,89 @@
{
"parameters": {
"subscriptionId": "00000000-1111-2222-3333-444444444444",
"resourceGroupName": "securityalert-4799",
"serverName": "securityalert-6440",
"databaseName": "testdb",
"securityAlertPolicyName": "default",
"api-version": "2020-02-02-preview",
"parameters": {
"properties": {
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [
"test@microsoft.com",
"user@microsoft.com"
],
"disabledAlerts": [
"Sql_Injection",
"Usage_Anomaly"
],
"retentionDays": 6,
"storageAccountAccessKey": "sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==",
"storageEndpoint": "https://mystorage.blob.core.windows.net"
}
}
},
"responses": {
"200": {
"body": {
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
"name": "default",
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
"systemData": {
"createdBy": "string",
"createdByType": "User",
"createdAt": "2020-04-03T04:41:33.937Z",
"lastModifiedBy": "string",
"lastModifiedByType": "User",
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
},
"properties": {
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [
"test@microsoft.com",
"user@microsoft.com"
],
"disabledAlerts": [
"Sql_Injection",
"Usage_Anomaly"
],
"retentionDays": 6,
"storageAccountAccessKey": "",
"storageEndpoint": "https://mystorage.blob.core.windows.net"
}
}
},
"201": {
"body": {
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
"name": "default",
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
"systemData": {
"createdBy": "string",
"createdByType": "User",
"createdAt": "2020-04-03T04:41:33.937Z",
"lastModifiedBy": "string",
"lastModifiedByType": "User",
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
},
"properties": {
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [
"test@microsoft.com",
"user@microsoft.com"
],
"disabledAlerts": [
"Access_Anomaly",
"Usage_Anomaly"
],
"retentionDays": 6,
"storageAccountAccessKey": "sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==",
"storageEndpoint": "https://mystorage.blob.core.windows.net"
}
}
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,22 @@
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
"name": "default",
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
"systemData": {
"createdBy": "string",
"createdByType": "User",
"createdAt": "2020-04-03T04:41:33.937Z",
"lastModifiedBy": "string",
"lastModifiedByType": "User",
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
},
"properties": {
"state": "Enabled"
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [],
"disabledAlerts": [],
"retentionDays": 0,
"storageAccountAccessKey": "",
"storageEndpoint": ""
}
}
},
Expand All @@ -28,8 +42,22 @@
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
"name": "default",
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
"systemData": {
"createdBy": "string",
"createdByType": "User",
"createdAt": "2020-04-03T04:41:33.937Z",
"lastModifiedBy": "string",
"lastModifiedByType": "User",
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
},
"properties": {
"state": "Enabled"
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [],
"disabledAlerts": [],
"retentionDays": 0,
"storageAccountAccessKey": "",
"storageEndpoint": ""
}
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,26 @@
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-6852/providers/Microsoft.Sql/servers/securityalert-2080/databases/testdb",
"name": "default",
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
"systemData": {
"createdBy": "string",
"createdByType": "User",
"createdAt": "2020-04-03T04:41:33.937Z",
"lastModifiedBy": "string",
"lastModifiedByType": "User",
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
},
"properties": {
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [
"test@microsoft.com",
"user@microsoft.com"
],
"disabledAlerts": [
"Usage_Anomaly"
],
"retentionDays": 0,
"storageAccountAccessKey": "",
"creationTime": "2020-04-03T04:41:33.937Z"
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,27 @@
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-6852/providers/Microsoft.Sql/servers/securityalert-2080/databases/testdb",
"name": "default",
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
"systemData": {
"createdBy": "string",
"createdByType": "User",
"createdAt": "2020-04-03T04:41:33.937Z",
"lastModifiedBy": "string",
"lastModifiedByType": "User",
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
},
"properties": {
"state": "Enabled",
"emailAccountAdmins": true,
"emailAddresses": [
"test@microsoft.com",
"user@microsoft.com"
],
"disabledAlerts": [
"Usage_Anomaly"
],
"retentionDays": 0,
"storageAccountAccessKey": "",
"storageEndpoint": "",
"creationTime": "2020-04-03T04:41:33.937Z"
}
}
Expand Down
Loading

0 comments on commit f37a0a5

Please sign in to comment.