standard
turbot/azure_compliance
Get Involved
Version
Pipeline: Correct PostgreSQL servers allowing access to Azure services
Disable access to Azure services for PostgreSQL servers with enabled access to Azure services.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run azure_compliance.pipeline.correct_postgresql_servers_with_allow_access_to_azure_services_enabled \ --arg 'items=<list(object({ id = string title = string name = string resource_group = string subscription_id = string conn = string }))>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = azure_compliance.pipeline.correct_postgresql_servers_with_allow_access_to_azure_services_enabled args = { items = <list(object({ id = string title = string name = string resource_group = string subscription_id = string conn = string }))> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
items | list(object({ id = string title = string name = string resource_group = string subscription_id = string conn = string })) | Yes | A collection of detected resources to run corrective actions against. | - |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'. | info |
approvers | list(notifier) | Yes | List of notifiers to be used for obtaining action/approval decisions. | notifier.default |
default_action | string notify , skip , delete_allow_all_windows_azure_ips_firewall_rule | Yes | The default action to use when there are no approvers. | notify |
enabled_actions | list(string) skip , delete_allow_all_windows_azure_ips_firewall_rule | Yes | The list of enabled actions to provide to approvers for selection. |
|
Outputs
This pipeline has no outputs.
Tags
category = Compliance
folder = Internal
plugin = azure
service = Azure/PostgreSQL