Skip to content

Commit 9f537d8

Browse files
ericshapexaliciayangayeletshpigelman
authored
Release microsoft.sql 2020-11-01 preview API version (#13332)
* Adds base for updating Microsoft.Sql from version preview/2020-08-01-preview to version 2020-11-01-preview * Updates readme * Updates API version in new specs and examples * Add updated 2020-11-01-preview versions of LongTermRetenionBackups.json and Databases.json (#12146) * add updated databases.json swagger * update readme with new package * v4 -> v5 * add missing chunk in readme * add correct swaggeR * add examples * add correct examplese * remove unreferenced examples * update swagger and examples. add 2020-11 pure package * Fix reference to 2020-08-01 reference to ElasticPools.json * update Databases.json name * update examples * remove nonexistant swagger * fixed reference capitals in readme * update package composite and fix ref to ManagedInstances.jsON * make backupstorageredundancy settings consistent * add requestedBackupStorageRedundancy to properties object in example * add LTR swagger and examples * add LTR Policies swagger and examples * make v5 match v4 * add updated Databses.json * merge conflicts in LTR Policies swagger' * take out comments in readme * taking ImportExport.json out from 2020-11 package * remove duplicate 2020-11 tag in readme * modify Databases_legacy.json to exclude ImportExport-related APIs * add servers.json for IE APIS and remove unused databases examples * fix model & prettier errors; add missing server example * add missing servers examples * fix example to exclude property from server obj * change RecommendedActions definitoins * change tag to composite v4 * Add missing properties for api version 2020-02-02-preview of securityAlertPolicies (#13117) * Add missing properties for api version 2020-02-02-preview * fix checks * fix according to prettier check * Add the change to version 2020-08-01-preview and version 2020-11-01-preview * remove changes in package-lock * Add new line at the end of file * update version 2020-11-01-preview * Update the ref to system data in serverdevopsaudit * add missing point * fix the validation errors (#13325) * fix the validation errors * Delete ServerDevOpsAudit.json * fix the validation errors * re add ServerDevOpsAudit.json Co-authored-by: xaliciayang <[email protected]> Co-authored-by: ayeletshpigelman <[email protected]>
1 parent d26d0ae commit 9f537d8

File tree

605 files changed

+68602
-24
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

605 files changed

+68602
-24
lines changed

specification/sql/resource-manager/Microsoft.Sql/preview/2020-02-02-preview/DatabaseSecurityAlertPolicies.json

Lines changed: 39 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,10 @@
152152
},
153153
"x-ms-examples": {
154154
"Update a database's threat detection policy with minimal parameters": {
155-
"$ref": "./examples/DatabaseSecurityAlertCreate.json"
155+
"$ref": "./examples/DatabaseSecurityAlertCreateMin.json"
156+
},
157+
"Update a database's threat detection policy with all parameters": {
158+
"$ref": "./examples/DatabaseSecurityAlertCreateMax.json"
156159
}
157160
}
158161
}
@@ -231,6 +234,37 @@
231234
"modelAsString": false
232235
}
233236
},
237+
"disabledAlerts": {
238+
"description": "Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly, Data_Exfiltration, Unsafe_Action",
239+
"type": "array",
240+
"items": {
241+
"type": "string"
242+
}
243+
},
244+
"emailAddresses": {
245+
"description": "Specifies an array of e-mail addresses to which the alert is sent.",
246+
"type": "array",
247+
"items": {
248+
"type": "string"
249+
}
250+
},
251+
"emailAccountAdmins": {
252+
"description": "Specifies that the alert is sent to the account administrators.",
253+
"type": "boolean"
254+
},
255+
"storageEndpoint": {
256+
"description": "Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.",
257+
"type": "string"
258+
},
259+
"storageAccountAccessKey": {
260+
"description": "Specifies the identifier key of the Threat Detection audit storage account.",
261+
"type": "string"
262+
},
263+
"retentionDays": {
264+
"format": "int32",
265+
"description": "Specifies the number of days to keep in the Threat Detection audit logs.",
266+
"type": "integer"
267+
},
234268
"creationTime": {
235269
"format": "date-time",
236270
"description": "Specifies the UTC creation time of the policy.",
@@ -248,6 +282,10 @@
248282
}
249283
],
250284
"properties": {
285+
"systemData": {
286+
"readOnly": true,
287+
"$ref": "../../../../../common-types/resource-management/v1/types.json#/definitions/systemData"
288+
},
251289
"properties": {
252290
"$ref": "#/definitions/SecurityAlertsPolicyProperties",
253291
"description": "Resource properties.",

specification/sql/resource-manager/Microsoft.Sql/preview/2020-02-02-preview/ManagedServerSecurityAlertPolicies.json

Lines changed: 39 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,11 @@
127127
},
128128
"x-ms-long-running-operation": true,
129129
"x-ms-examples": {
130+
"Update a server's threat detection policy with minimal parameters": {
131+
"$ref": "./examples/ManagedServerSecurityAlertCreateMin.json"
132+
},
130133
"Update a server's threat detection policy with all parameters": {
131-
"$ref": "./examples/ManagedServerSecurityAlertCreate.json"
134+
"$ref": "./examples/ManagedServerSecurityAlertCreateMax.json"
132135
}
133136
}
134137
}
@@ -196,6 +199,37 @@
196199
"modelAsString": false
197200
}
198201
},
202+
"disabledAlerts": {
203+
"description": "Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly, Data_Exfiltration, Unsafe_Action",
204+
"type": "array",
205+
"items": {
206+
"type": "string"
207+
}
208+
},
209+
"emailAddresses": {
210+
"description": "Specifies an array of e-mail addresses to which the alert is sent.",
211+
"type": "array",
212+
"items": {
213+
"type": "string"
214+
}
215+
},
216+
"emailAccountAdmins": {
217+
"description": "Specifies that the alert is sent to the account administrators.",
218+
"type": "boolean"
219+
},
220+
"storageEndpoint": {
221+
"description": "Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.",
222+
"type": "string"
223+
},
224+
"storageAccountAccessKey": {
225+
"description": "Specifies the identifier key of the Threat Detection audit storage account.",
226+
"type": "string"
227+
},
228+
"retentionDays": {
229+
"format": "int32",
230+
"description": "Specifies the number of days to keep in the Threat Detection audit logs.",
231+
"type": "integer"
232+
},
199233
"creationTime": {
200234
"format": "date-time",
201235
"description": "Specifies the UTC creation time of the policy.",
@@ -213,6 +247,10 @@
213247
}
214248
],
215249
"properties": {
250+
"systemData": {
251+
"readOnly": true,
252+
"$ref": "../../../../../common-types/resource-management/v1/types.json#/definitions/systemData"
253+
},
216254
"properties": {
217255
"$ref": "#/definitions/SecurityAlertsPolicyProperties",
218256
"description": "Resource properties.",

specification/sql/resource-manager/Microsoft.Sql/preview/2020-02-02-preview/ServerSecurityAlertPolicies.json

Lines changed: 39 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,11 @@
127127
},
128128
"x-ms-long-running-operation": true,
129129
"x-ms-examples": {
130+
"Update a server's threat detection policy with all parameters": {
131+
"$ref": "./examples/ServerSecurityAlertsCreateMax.json"
132+
},
130133
"Update a server's threat detection policy with minimal parameters": {
131-
"$ref": "./examples/ServerSecurityAlertsCreate.json"
134+
"$ref": "./examples/ServerSecurityAlertsCreateMin.json"
132135
}
133136
}
134137
}
@@ -196,6 +199,37 @@
196199
"modelAsString": false
197200
}
198201
},
202+
"disabledAlerts": {
203+
"description": "Specifies an array of alerts that are disabled. Allowed values are: Sql_Injection, Sql_Injection_Vulnerability, Access_Anomaly, Data_Exfiltration, Unsafe_Action",
204+
"type": "array",
205+
"items": {
206+
"type": "string"
207+
}
208+
},
209+
"emailAddresses": {
210+
"description": "Specifies an array of e-mail addresses to which the alert is sent.",
211+
"type": "array",
212+
"items": {
213+
"type": "string"
214+
}
215+
},
216+
"emailAccountAdmins": {
217+
"description": "Specifies that the alert is sent to the account administrators.",
218+
"type": "boolean"
219+
},
220+
"storageEndpoint": {
221+
"description": "Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs.",
222+
"type": "string"
223+
},
224+
"storageAccountAccessKey": {
225+
"description": "Specifies the identifier key of the Threat Detection audit storage account.",
226+
"type": "string"
227+
},
228+
"retentionDays": {
229+
"format": "int32",
230+
"description": "Specifies the number of days to keep in the Threat Detection audit logs.",
231+
"type": "integer"
232+
},
199233
"creationTime": {
200234
"format": "date-time",
201235
"description": "Specifies the UTC creation time of the policy.",
@@ -213,6 +247,10 @@
213247
}
214248
],
215249
"properties": {
250+
"systemData": {
251+
"readOnly": true,
252+
"$ref": "../../../../../common-types/resource-management/v1/types.json#/definitions/systemData"
253+
},
216254
"properties": {
217255
"$ref": "#/definitions/SecurityAlertsPolicyProperties",
218256
"description": "Resource properties.",
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
{
2+
"parameters": {
3+
"subscriptionId": "00000000-1111-2222-3333-444444444444",
4+
"resourceGroupName": "securityalert-4799",
5+
"serverName": "securityalert-6440",
6+
"databaseName": "testdb",
7+
"securityAlertPolicyName": "default",
8+
"api-version": "2020-02-02-preview",
9+
"parameters": {
10+
"properties": {
11+
"state": "Enabled",
12+
"emailAccountAdmins": true,
13+
"emailAddresses": [
14+
15+
16+
],
17+
"disabledAlerts": [
18+
"Sql_Injection",
19+
"Usage_Anomaly"
20+
],
21+
"retentionDays": 6,
22+
"storageAccountAccessKey": "sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==",
23+
"storageEndpoint": "https://mystorage.blob.core.windows.net"
24+
}
25+
}
26+
},
27+
"responses": {
28+
"200": {
29+
"body": {
30+
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
31+
"name": "default",
32+
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
33+
"systemData": {
34+
"createdBy": "string",
35+
"createdByType": "User",
36+
"createdAt": "2020-04-03T04:41:33.937Z",
37+
"lastModifiedBy": "string",
38+
"lastModifiedByType": "User",
39+
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
40+
},
41+
"properties": {
42+
"state": "Enabled",
43+
"emailAccountAdmins": true,
44+
"emailAddresses": [
45+
46+
47+
],
48+
"disabledAlerts": [
49+
"Sql_Injection",
50+
"Usage_Anomaly"
51+
],
52+
"retentionDays": 6,
53+
"storageAccountAccessKey": "",
54+
"storageEndpoint": "https://mystorage.blob.core.windows.net"
55+
}
56+
}
57+
},
58+
"201": {
59+
"body": {
60+
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
61+
"name": "default",
62+
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
63+
"systemData": {
64+
"createdBy": "string",
65+
"createdByType": "User",
66+
"createdAt": "2020-04-03T04:41:33.937Z",
67+
"lastModifiedBy": "string",
68+
"lastModifiedByType": "User",
69+
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
70+
},
71+
"properties": {
72+
"state": "Enabled",
73+
"emailAccountAdmins": true,
74+
"emailAddresses": [
75+
76+
77+
],
78+
"disabledAlerts": [
79+
"Access_Anomaly",
80+
"Usage_Anomaly"
81+
],
82+
"retentionDays": 6,
83+
"storageAccountAccessKey": "sdlfkjabc+sdlfkjsdlkfsjdfLDKFTERLKFDFKLjsdfksjdflsdkfD2342309432849328476458/3RSD==",
84+
"storageEndpoint": "https://mystorage.blob.core.windows.net"
85+
}
86+
}
87+
}
88+
}
89+
}
Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,22 @@
1818
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
1919
"name": "default",
2020
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
21+
"systemData": {
22+
"createdBy": "string",
23+
"createdByType": "User",
24+
"createdAt": "2020-04-03T04:41:33.937Z",
25+
"lastModifiedBy": "string",
26+
"lastModifiedByType": "User",
27+
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
28+
},
2129
"properties": {
22-
"state": "Enabled"
30+
"state": "Enabled",
31+
"emailAccountAdmins": true,
32+
"emailAddresses": [],
33+
"disabledAlerts": [],
34+
"retentionDays": 0,
35+
"storageAccountAccessKey": "",
36+
"storageEndpoint": ""
2337
}
2438
}
2539
},
@@ -28,8 +42,22 @@
2842
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-4799/providers/Microsoft.Sql/servers/securityalert-6440/databases/testdb",
2943
"name": "default",
3044
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
45+
"systemData": {
46+
"createdBy": "string",
47+
"createdByType": "User",
48+
"createdAt": "2020-04-03T04:41:33.937Z",
49+
"lastModifiedBy": "string",
50+
"lastModifiedByType": "User",
51+
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
52+
},
3153
"properties": {
32-
"state": "Enabled"
54+
"state": "Enabled",
55+
"emailAccountAdmins": true,
56+
"emailAddresses": [],
57+
"disabledAlerts": [],
58+
"retentionDays": 0,
59+
"storageAccountAccessKey": "",
60+
"storageEndpoint": ""
3361
}
3462
}
3563
}

specification/sql/resource-manager/Microsoft.Sql/preview/2020-02-02-preview/examples/DatabaseSecurityAlertGet.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,26 @@
1313
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-6852/providers/Microsoft.Sql/servers/securityalert-2080/databases/testdb",
1414
"name": "default",
1515
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
16+
"systemData": {
17+
"createdBy": "string",
18+
"createdByType": "User",
19+
"createdAt": "2020-04-03T04:41:33.937Z",
20+
"lastModifiedBy": "string",
21+
"lastModifiedByType": "User",
22+
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
23+
},
1624
"properties": {
1725
"state": "Enabled",
26+
"emailAccountAdmins": true,
27+
"emailAddresses": [
28+
29+
30+
],
31+
"disabledAlerts": [
32+
"Usage_Anomaly"
33+
],
34+
"retentionDays": 0,
35+
"storageAccountAccessKey": "",
1836
"creationTime": "2020-04-03T04:41:33.937Z"
1937
}
2038
}

specification/sql/resource-manager/Microsoft.Sql/preview/2020-02-02-preview/examples/DatabaseSecurityAlertListByDatabase.json

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,27 @@
1414
"id": "/subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/securityalert-6852/providers/Microsoft.Sql/servers/securityalert-2080/databases/testdb",
1515
"name": "default",
1616
"type": "Microsoft.Sql/servers/databases/securityAlertPolicies",
17+
"systemData": {
18+
"createdBy": "string",
19+
"createdByType": "User",
20+
"createdAt": "2020-04-03T04:41:33.937Z",
21+
"lastModifiedBy": "string",
22+
"lastModifiedByType": "User",
23+
"lastModifiedAt": "2020-04-03T04:41:33.937Z"
24+
},
1725
"properties": {
1826
"state": "Enabled",
27+
"emailAccountAdmins": true,
28+
"emailAddresses": [
29+
30+
31+
],
32+
"disabledAlerts": [
33+
"Usage_Anomaly"
34+
],
35+
"retentionDays": 0,
36+
"storageAccountAccessKey": "",
37+
"storageEndpoint": "",
1938
"creationTime": "2020-04-03T04:41:33.937Z"
2039
}
2140
}

0 commit comments

Comments
 (0)