-
Notifications
You must be signed in to change notification settings - Fork 5k
Closed
Labels
Milestone
Description
Is there an existing issue for this?
- I have searched the existing issues
Community Note
- Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
- Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
- If you are interested in working on this issue or have submitted a pull request, please leave a comment
Description
Azure SQL now supports express configuration for SQL Server vulnerability assessments which no longer requires a storage account as this is now managed by the express configuration and the storage account version is now considered classic configuration.
Please can we look to support the express configuration for azurerm_mssql_server_vulnerability_assessment
New or Affected Resource(s)/Data Source(s)
azurerm_mssql_server_vulnerability_assessment
Potential Terraform Configuration
resource "azurerm_sql_server" "example" {
name = "mysqlserver"
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
version = "12.0"
administrator_login = "4dm1n157r470r"
administrator_login_password = "4-v3ry-53cr37-p455w0rd"
}
resource "azurerm_mssql_server_vulnerability_assessment" "example" {
server_id = azurerm_sql_server.example.id
assessment_type = "express"
}
resource "azurerm_mssql_server_vulnerability_assessment_rule_baseline" "example" {
server_vulnerability_assessment_id = azurerm_mssql_server_vulnerability_assessment.example.id
latestScan = false
baseline_result {
result = {
VA2063 = [
"AllowAll",
"0.0.0.0",
"255.255.255.255"
]
}
}
baseline_result {
result = {
VA2065 = [
"allowedip2",
"255.255.255.255",
"255.255.255.255"
]
}
}
}References
Terraform AzAPI example:
Enable Express mode:
Baseline Creation:
REST API Create Example:
Rest API Spec:
Reactions are currently unavailable